]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #626 from mozilla/MasterPassword
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
572
573 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
574 **CCK2 Equivalent:** N/A\
575 **Preferences Affected:** `security.enterprise_roots.enabled`
576
577 #### Windows (GPO)
578 ```
579 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
580 ```
581 #### Windows (Intune)
582 OMA-URI:
583 ```
584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
585 ```
586 Value (string):
587 ```
588 <enabled/> or <disabled/>
589 ```
590 #### macOS
591 ```
592 <dict>
593 <key>Certificates</key>
594 <dict>
595 <key>ImportEnterpriseRoots</key>
596 <true/> | <false/>
597 </dict>
598 </dict>
599 ```
600 #### policies.json
601 ```
602 {
603 "policies": {
604 "Certificates": {
605 "ImportEnterpriseRoots": true | false
606 }
607 }
608 }
609 ```
610 ### Certificates | Install
611
612 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
613
614 - Windows
615 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
616 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
617 - macOS
618 - /Library/Application Support/Mozilla/Certificates
619 - ~/Library/Application Support/Mozilla/Certificates
620 - Linux
621 - /usr/lib/mozilla/certificates
622 - /usr/lib64/mozilla/certificates
623 - ~/.mozilla/certificates
624
625 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
626
627 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
628
629 Certificates are installed using the trust string `CT,CT,`.
630
631 Binary (DER) and ASCII (PEM) certificates are both supported.
632
633 **Compatibility:** Firefox 64, Firefox ESR 64\
634 **CCK2 Equivalent:** `certs.ca`\
635 **Preferences Affected:** N/A
636
637 #### Windows (GPO)
638 ```
639 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
640 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
641 ```
642 #### Windows (Intune)
643 OMA-URI:
644 ```
645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
646 ```
647 Value (string):
648 ```
649 <enabled/>
650 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
651 ```
652 #### macOS
653 ```
654 <dict>
655 <key>Certificates</key>
656 <dict>
657 <key>Install</key>
658 <array>
659 <string>cert1.der</string>
660 <string>/Users/username/cert2.pem</string>
661 </array>
662 </dict>
663 </dict>
664 ```
665 #### policies.json
666 ```
667 {
668 "policies": {
669 "Certificates": {
670 "Install": ["cert1.der", "/home/username/cert2.pem"]
671 }
672 }
673 }
674 ```
675 ### Cookies
676 Configure cookie preferences.
677
678 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
679
680 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
681
682 `Default` determines whether cookies are accepted at all.
683
684 `AcceptThirdParty` determines how third-party cookies are handled.
685
686 `ExpireAtSessionEnd` determines when cookies expire.
687
688 `RejectTracker` only rejects cookies for trackers.
689
690 `Locked` prevents the user from changing cookie preferences.
691
692 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
693 **CCK2 Equivalent:** N/A\
694 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
695
696 #### Windows (GPO)
697 ```
698 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
699 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
700 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
701 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
702 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
705 ```
706 #### Windows (Intune)
707 OMA-URI:
708 ```
709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
710 ```
711 Value (string):
712 ```
713 <enabled/>
714 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
715 ```
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
719 ```
720 Value (string):
721 ```
722 <enabled/>
723 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
724 ```
725 OMA-URI:
726 ```
727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
728 ```
729 Value (string):
730 ```
731 <enabled/> or <disabled/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
736 ```
737 Value (string):
738 ```
739 <enabled/>
740 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
741 ```
742 OMA-URI:
743 ```
744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
745 ```
746 Value (string):
747 ```
748 <enabled/> or <disabled/>
749 ```
750 OMA-URI:
751 ```
752 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
753 ```
754 Value (string):
755 ```
756 <enabled/> or <disabled/>
757 ```
758 OMA-URI:
759 ```
760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
761 ```
762 Value (string):
763 ```
764 <enabled/> or <disabled/>
765 ```
766 #### macOS
767 ```
768 <dict>
769 <key>Cookies</key>
770 <dict>
771 <key>Allow</key>
772 <array>
773 <string>http://example.com</string>
774 </array>
775 <key>Block</key>
776 <array>
777 <string>http://example.org</string>
778 </array>
779 <key>Default</key>
780 <true/> | <false/>
781 <key>AcceptThirdParty</key>
782 <string>always | never | from-visited</string>
783 <key>ExpireAtSessionEnd</key>
784 <true/> | <false/>
785 <key>RejectTracker</key>
786 <true/> | <false/>
787 <key>Locked</key>
788 <true/> | <false/>
789 </dict>
790 </dict>
791 ```
792 #### policies.json
793 ```
794 {
795 "policies": {
796 "Cookies": {
797 "Allow": ["http://example.org/"],
798 "Block": ["http://example.edu/"],
799 "Default": true | false,
800 "AcceptThirdParty": "always" | "never" | "from-visited",
801 "ExpireAtSessionEnd": true | false,
802 "RejectTracker": true | false,
803 "Locked": true | false
804 }
805 }
806 }
807 ```
808 ### DisableSetDesktopBackground
809 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
810
811 **Compatibility:** Firefox 60, Firefox ESR 60\
812 **CCK2 Equivalent:** `removeSetDesktopBackground`\
813 **Preferences Affected:** N/A
814
815 #### Windows (GPO)
816 ```
817 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
818 ```
819 #### Windows (Intune)
820 OMA-URI:
821 ```
822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
823 ```
824 Value (string):
825 ```
826 <enabled/> or <disabled/>
827 ```
828 #### macOS
829 ```
830 <dict>
831 <key>DisableSetDesktopBackground</key>
832 <true/> | <false/>
833 </dict>
834 ```
835 #### policies.json
836 ```
837 {
838 "policies": {
839 "DisableSetDesktopBackground": true | false
840 }
841 }
842 ```
843 ### DisableMasterPasswordCreation
844 Remove the master password functionality.
845
846 **Compatibility:** Firefox 60, Firefox ESR 60\
847 **CCK2 Equivalent:** `noMasterPassword`\
848 **Preferences Affected:** N/A
849
850 #### Windows (GPO)
851 ```
852 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
853 ```
854 #### Windows (Intune)
855 OMA-URI:
856 ```
857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
858 ```
859 Value (string):
860 ```
861 <enabled/> or <disabled/>
862 ```
863 #### macOS
864 ```
865 <dict>
866 <key>DisableMasterPasswordCreation</key>
867 <true/> | <false/>
868 </dict>
869 ```
870 #### policies.json
871 ```
872 {
873 "policies": {
874 "DisableMasterPasswordCreation": true | false
875 }
876 }
877 ```
878 ### DisableAppUpdate
879 Turn off application updates.
880
881 **Compatibility:** Firefox 60, Firefox ESR 60\
882 **CCK2 Equivalent:** `disableFirefoxUpdates`\
883 **Preferences Affected:** N/A
884
885 #### Windows (GPO)
886 ```
887 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
888 ```
889 #### Windows (Intune)
890 OMA-URI:
891 ```
892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
893 ```
894 Value (string):
895 ```
896 <enabled/> or <disabled/>
897 ```
898 #### macOS
899 ```
900 <dict>
901 <key>DisableAppUpdate</key>
902 <true/> | <false/>
903 </dict>
904 ```
905 #### policies.json
906 ```
907 {
908 "policies": {
909 "DisableAppUpdate": true | false
910 }
911 }
912 ```
913 ### DisableBuiltinPDFViewer
914 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
915
916 **Compatibility:** Firefox 60, Firefox ESR 60\
917 **CCK2 Equivalent:** `disablePDFjs`\
918 **Preferences Affected:** `pdfjs.disabled`
919
920 #### Windows (GPO)
921 ```
922 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
923 ```
924 #### Windows (Intune)
925 OMA-URI:
926 ```
927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
928 ```
929 Value (string):
930 ```
931 <enabled/> or <disabled/>
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>DisableBuiltinPDFViewer</key>
937 <true/> | <false/>
938 </dict>
939 ```
940 #### policies.json
941 ```
942 {
943 "policies": {
944 "DisableBuiltinPDFViewer": true | false
945 }
946 }
947 ```
948 ### DisabledCiphers
949 Disable specific cryptographic ciphers.
950
951 **Compatibility:** Firefox 76, Firefox ESR 68.8\
952 **CCK2 Equivalent:** N/A\
953 **Preferences Affected:** N/A
954
955 #### Windows (GPO)
956 ```
957 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
958 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
959 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
961 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
962 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
963 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
966 ```
967 #### Windows (Intune)
968 OMA-URI:
969 ```
970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
972 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
979 ```
980 Value (string):
981 ```
982 <enabled/> or <disabled/>
983 ```
984 #### macOS
985 ```
986 <dict>
987 <key>DisabledCiphers</key>
988 <dict>
989 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
990 <true/> | <false/>
991 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
992 <true/> | <false/>
993 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
994 <true/> | <false/>
995 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
996 <true/> | <false/>
997 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
998 <true/> | <false/>
999 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1000 <true/> | <false/>
1001 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1006 <true/> | <false/>
1007 </dict>
1008 </dict>
1009 ```
1010 #### policies.json
1011 ```
1012 {
1013 "policies": {
1014 "DisabledCiphers" {
1015 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1016 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1017 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1018 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1019 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1020 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1021 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1022 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1023 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1024 }
1025 }
1026 }
1027 ```
1028 ### DisableDefaultBrowserAgent
1029 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1030
1031 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1032 **CCK2 Equivalent:** N/A\
1033 **Preferences Affected:** N/A
1034
1035 #### Windows (GPO)
1036 ```
1037 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1038 ```
1039 #### Windows (Intune)
1040 OMA-URI:
1041 ```
1042 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1043 ```
1044 Value (string):
1045 ```
1046 <enabled/> or <disabled/>
1047 ```
1048 #### policies.json
1049 ```
1050 {
1051 "policies": {
1052 "DisableDefaultBrowserAgent": true | false
1053 }
1054 }
1055 ```
1056 ### DisableDeveloperTools
1057 Remove access to all developer tools.
1058
1059 **Compatibility:** Firefox 60, Firefox ESR 60\
1060 **CCK2 Equivalent:** `removeDeveloperTools`\
1061 **Preferences Affected:** `devtools.policy.disabled`
1062
1063 #### Windows (GPO)
1064 ```
1065 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1066 ```
1067 #### Windows (Intune)
1068 OMA-URI:
1069 ```
1070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1071 ```
1072 Value (string):
1073 ```
1074 <enabled/> or <disabled/>
1075 ```
1076 #### macOS
1077 ```
1078 <dict>
1079 <key>DisableDeveloperTools</key>
1080 <true/> | <false/>
1081 </dict>
1082 ```
1083 #### policies.json
1084 ```
1085 {
1086 "policies": {
1087 "DisableDeveloperTools": true | false
1088 }
1089 }
1090 ```
1091 ### DisableFeedbackCommands
1092 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1093
1094 **Compatibility:** Firefox 60, Firefox ESR 60\
1095 **CCK2 Equivalent:** N/A\
1096 **Preferences Affected:** N/A
1097
1098 #### Windows (GPO)
1099 ```
1100 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1101 ```
1102 #### Windows (Intune)
1103 OMA-URI:
1104 ```
1105 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1106 ```
1107 Value (string):
1108 ```
1109 <enabled/> or <disabled/>
1110 ```
1111 #### macOS
1112 ```
1113 <dict>
1114 <key>DisableFeedbackCommands</key>
1115 <true/> | <false/>
1116 </dict>
1117 ```
1118 #### policies.json
1119 ```
1120 {
1121 "policies": {
1122 "DisableFeedbackCommands": true | false
1123 }
1124 }
1125 ```
1126 ### DisableFirefoxScreenshots
1127 Remove access to Firefox Screenshots.
1128
1129 **Compatibility:** Firefox 60, Firefox ESR 60\
1130 **CCK2 Equivalent:** N/A\
1131 **Preferences Affected:** `extensions.screenshots.disabled`
1132
1133 #### Windows (GPO)
1134 ```
1135 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1136 ```
1137 #### Windows (Intune)
1138 OMA-URI:
1139 ```
1140 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1141 ```
1142 Value (string):
1143 ```
1144 <enabled/> or <disabled/>
1145 ```
1146 #### macOS
1147 ```
1148 <dict>
1149 <key>DisableFirefoxScreenshots</key>
1150 <true/> | <false/>
1151 </dict>
1152 ```
1153 #### policies.json
1154 ```
1155 {
1156 "policies": {
1157 "DisableFirefoxScreenshots": true | false
1158 }
1159 }
1160 ```
1161 ### DisableFirefoxAccounts
1162 Disable Firefox Accounts integration (Sync).
1163
1164 **Compatibility:** Firefox 60, Firefox ESR 60\
1165 **CCK2 Equivalent:** `disableSync`\
1166 **Preferences Affected:** `identity.fxaccounts.enabled`
1167
1168 #### Windows (GPO)
1169 ```
1170 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1171 ```
1172 #### Windows (Intune)
1173 OMA-URI:
1174 ```
1175 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1176 ```
1177 Value (string):
1178 ```
1179 <enabled/> or <disabled/>
1180 ```
1181 #### macOS
1182 ```
1183 <dict>
1184 <key>DisableFirefoxAccounts</key>
1185 <true/> | <false/>
1186 </dict>
1187 ```
1188 #### policies.json
1189 ```
1190 {
1191 "policies": {
1192 "DisableFirefoxAccounts": true | false
1193 }
1194 }
1195 ```
1196 ### DisableFirefoxStudies
1197 Disable Firefox studies (Shield).
1198
1199 **Compatibility:** Firefox 60, Firefox ESR 60\
1200 **CCK2 Equivalent:** N/A\
1201 **Preferences Affected:** N/A
1202
1203 #### Windows (GPO)
1204 ```
1205 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1206 ```
1207 #### Windows (Intune)
1208 OMA-URI:
1209 ```
1210 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1211 ```
1212 Value (string):
1213 ```
1214 <enabled/> or <disabled/>
1215 ```
1216 #### macOS
1217 ```
1218 <dict>
1219 <key>DisableFirefoxStudies</key>
1220 <true/> | <false/>
1221 </dict>
1222 ```
1223 #### policies.json
1224 ```
1225 {
1226 "policies": {
1227 "DisableFirefoxStudies": true | false
1228 }
1229 }
1230 ```
1231 ### DisableForgetButton
1232 Disable the "Forget" button.
1233
1234 **Compatibility:** Firefox 60, Firefox ESR 60\
1235 **CCK2 Equivalent:** `disableForget`\
1236 **Preferences Affected:** N/A
1237
1238 #### Windows (GPO)
1239 ```
1240 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1241 ```
1242 #### Windows (Intune)
1243 OMA-URI:
1244 ```
1245 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1246 ```
1247 Value (string):
1248 ```
1249 <enabled/> or <disabled/>
1250 ```
1251 #### macOS
1252 ```
1253 <dict>
1254 <key>DisableForgetButton</key>
1255 <true/> | <false/>
1256 </dict>
1257 ```
1258 #### policies.json
1259 ```
1260 {
1261 "policies": {
1262 "DisableForgetButton": true | false
1263 }
1264 }
1265 ```
1266 ### DisableFormHistory
1267 Turn off saving information on web forms and the search bar.
1268
1269 **Compatibility:** Firefox 60, Firefox ESR 60\
1270 **CCK2 Equivalent:** `disableFormFill`\
1271 **Preferences Affected:** ` browser.formfill.enable`
1272
1273 #### Windows (GPO)
1274 ```
1275 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1276 ```
1277 #### Windows (Intune)
1278 OMA-URI:
1279 ```
1280 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1281 ```
1282 Value (string):
1283 ```
1284 <enabled/> or <disabled/>
1285 ```
1286 #### macOS
1287 ```
1288 <dict>
1289 <key>DisableFormHistory</key>
1290 <true/> | <false/>
1291 </dict>
1292 ```
1293 #### policies.json
1294 ```
1295 {
1296 "policies": {
1297 "DisableFormHistory": true | false
1298 }
1299 }
1300 ```
1301 ### DisablePasswordReveal
1302 Do not allow passwords to be shown in saved logins
1303
1304 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1305 **CCK2 Equivalent:** N/A
1306 **Preferences Affected:** N/A
1307
1308 #### Windows (GPO)
1309 ```
1310 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1311 ```
1312 #### Windows (Intune)
1313 OMA-URI:
1314 ```
1315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1316 ```
1317 Value (string):
1318 ```
1319 <enabled/> or <disabled/>
1320 ```
1321 #### macOS
1322 ```
1323 <dict>
1324 <key>DisablePasswordReveal</key>
1325 <true/> | <false/>
1326 </dict>
1327 ```
1328 #### policies.json
1329 ```
1330 {
1331 "policies": {
1332 "DisablePasswordReveal": true | false
1333 }
1334 }
1335 ```
1336 ### DisablePocket
1337 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1338
1339 **Compatibility:** Firefox 60, Firefox ESR 60\
1340 **CCK2 Equivalent:** `disablePocket`\
1341 **Preferences Affected:** `extensions.pocket.enabled`
1342
1343 #### Windows (GPO)
1344 ```
1345 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1346 ```
1347 #### Windows (Intune)
1348 OMA-URI:
1349 ```
1350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1351 ```
1352 Value (string):
1353 ```
1354 <enabled/> or <disabled/>
1355 ```
1356 #### macOS
1357 ```
1358 <dict>
1359 <key>DisablePocket</key>
1360 <true/> | <false/>
1361 </dict>
1362 ```
1363 #### policies.json
1364 ```
1365 {
1366 "policies": {
1367 "DisablePocket": true | false
1368 }
1369 }
1370 ```
1371 ### DisablePrivateBrowsing
1372 Remove access to private browsing.
1373
1374 **Compatibility:** Firefox 60, Firefox ESR 60\
1375 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1376 **Preferences Affected:** N/A
1377
1378 #### Windows (GPO)
1379 ```
1380 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1381 ```
1382 #### Windows (Intune)
1383 OMA-URI:
1384 ```
1385 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1386 ```
1387 Value (string):
1388 ```
1389 <enabled/> or <disabled/>
1390 ```
1391 #### macOS
1392 ```
1393 <dict>
1394 <key>DisablePrivateBrowsing</key>
1395 <true/> | <false/>
1396 </dict>
1397 ```
1398 #### policies.json
1399 ```
1400 {
1401 "policies": {
1402 "DisablePrivateBrowsing": true | false
1403 }
1404 }
1405 ```
1406 ### DisableProfileImport
1407 Disables the "Import data from another browser" option in the bookmarks window.
1408
1409 **Compatibility:** Firefox 60, Firefox ESR 60\
1410 **CCK2 Equivalent:** N/A\
1411 **Preferences Affected:** N/A
1412
1413 #### Windows (GPO)
1414 ```
1415 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1416 ```
1417 #### Windows (Intune)
1418 OMA-URI:
1419 ```
1420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1421 ```
1422 Value (string):
1423 ```
1424 <enabled/> or <disabled/>
1425 ```
1426 #### macOS
1427 ```
1428 <dict>
1429 <key>DisableProfileImport</key>
1430 <true/> | <false/>
1431 </dict>
1432 ```
1433 #### policies.json
1434 ```
1435 {
1436 "policies": {
1437 "DisableProfileImport": true | false
1438 }
1439 }
1440 ```
1441 ### DisableProfileRefresh
1442 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1443
1444 **Compatibility:** Firefox 60, Firefox ESR 60\
1445 **CCK2 Equivalent:** `disableResetFirefox`\
1446 **Preferences Affected:** `browser.disableResetPrompt`
1447
1448 #### Windows (GPO)
1449 ```
1450 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1451 ```
1452 #### Windows (Intune)
1453 OMA-URI:
1454 ```
1455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1456 ```
1457 Value (string):
1458 ```
1459 <enabled/> or <disabled/>
1460 ```
1461 #### macOS
1462 ```
1463 <dict>
1464 <key>DisableProfileRefresh</key>
1465 <true/> | <false/>
1466 </dict>
1467 ```
1468 #### policies.json
1469 ```
1470 {
1471 "policies": {
1472 "DisableProfileRefresh": true | false
1473 }
1474 }
1475 ```
1476 ### DisableSafeMode
1477 Disable safe mode within the browser.
1478
1479 On Windows, this disables safe mode via the command line as well.
1480
1481 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1482 **CCK2 Equivalent:** `disableSafeMode`\
1483 **Preferences Affected:** N/A
1484
1485 #### Windows (GPO)
1486 ```
1487 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1488 ```
1489 #### Windows (Intune)
1490 OMA-URI:
1491 ```
1492 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1493 ```
1494 Value (string):
1495 ```
1496 <enabled/> or <disabled/>
1497 ```
1498 #### macOS
1499 ```
1500 <dict>
1501 <key>DisableSafeMode</key>
1502 <true/> | <false/>
1503 </dict>
1504 ```
1505 #### policies.json
1506 ```
1507 {
1508 "policies": {
1509 "DisableSafeMode": true | false
1510 }
1511 }
1512 ```
1513 ### DisableSecurityBypass
1514 Prevent the user from bypassing security in certain cases.
1515
1516 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1517
1518 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1519
1520 **Compatibility:** Firefox 60, Firefox ESR 60\
1521 **CCK2 Equivalent:** N/A\
1522 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1523
1524 #### Windows (GPO)
1525 ```
1526 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1527 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1528 ```
1529 #### Windows (Intune)
1530 OMA-URI:
1531 ```
1532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1533 ```
1534 Value (string):
1535 ```
1536 <enabled/> or <disabled/>
1537 ```
1538 OMA-URI:
1539 ```
1540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1541 ```
1542 Value (string):
1543 ```
1544 <enabled/> or <disabled/>
1545 ```
1546
1547 #### macOS
1548 ```
1549 <dict>
1550 <key>DisableSecurityBypass</key>
1551 <dict>
1552 <key>InvalidCertificate</key>
1553 <true/> | <false/>
1554 <key><SafeBrowsing/key>
1555 <true/> | <false/>
1556 </dict>
1557 </dict>
1558 ```
1559 #### policies.json
1560 ```
1561 {
1562 "policies": {
1563 "DisableSecurityBypass": {
1564 "InvalidCertificate": true | false,
1565 "SafeBrowsing": true | false
1566 }
1567 }
1568 }
1569 ```
1570 ### DisableSystemAddonUpdate
1571 Prevent system add-ons from being installed or update.
1572
1573 **Compatibility:** Firefox 60, Firefox ESR 60\
1574 **CCK2 Equivalent:** N/A\
1575 **Preferences Affected:** N/A
1576
1577 #### Windows (GPO)
1578 ```
1579 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1580 ```
1581 #### Windows (Intune)
1582 OMA-URI:
1583 ```
1584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1585 ```
1586 Value (string):
1587 ```
1588 <enabled/> or <disabled/>
1589 ```
1590 #### macOS
1591 ```
1592 <dict>
1593 <key>DisableSystemAddonUpdate</key>
1594 <true/> | <false/>
1595 </dict>
1596 ```
1597 #### policies.json
1598 ```
1599 {
1600 "policies": {
1601 "DisableSystemAddonUpdate": true | false
1602 }
1603 }
1604 ```
1605 ### DisableTelemetry
1606 Prevent the upload of telemetry data.
1607
1608 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1609
1610 **Compatibility:** Firefox 60, Firefox ESR 60\
1611 **CCK2 Equivalent:** `disableTelemetry`\
1612 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1613
1614 #### Windows (GPO)
1615 ```
1616 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1617 ```
1618 #### Windows (Intune)
1619 OMA-URI:
1620 ```
1621 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1622 ```
1623 Value (string):
1624 ```
1625 <enabled/> or <disabled/>
1626 ```
1627 #### macOS
1628 ```
1629 <dict>
1630 <key>DisableTelemetry</key>
1631 <true/> | <false/>
1632 </dict>
1633 ```
1634 #### policies.json
1635 ```
1636 {
1637 "policies": {
1638 "DisableTelemetry": true | false
1639 }
1640 }
1641 ```
1642 ### DisplayBookmarksToolbar
1643 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1644
1645 **Compatibility:** Firefox 60, Firefox ESR 60\
1646 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1647 **Preferences Affected:** N/A
1648
1649 #### Windows (GPO)
1650 ```
1651 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1652 ```
1653 #### Windows (Intune)
1654 OMA-URI:
1655 ```
1656 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1657 ```
1658 Value (string):
1659 ```
1660 <enabled/> or <disabled/>
1661 ```
1662 #### macOS
1663 ```
1664 <dict>
1665 <key>DisplayBookmarksToolbar</key>
1666 <true/> | <false/>
1667 </dict>
1668 ```
1669 #### policies.json
1670 ```
1671 {
1672 "policies": {
1673 "DisplayBookmarksToolbar": true | false
1674 }
1675 }
1676 ```
1677 ### DisplayMenuBar (Deprecated)
1678 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1679
1680 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1681 **CCK2 Equivalent:** `displayMenuBar`\
1682 **Preferences Affected:** N/A
1683
1684 #### Windows (GPO)
1685 ```
1686 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1687 ```
1688 #### macOS
1689 ```
1690 <dict>
1691 <key>DisplayMenuBar</key>
1692 <true/> | <false/>
1693 </dict>
1694 ```
1695 #### policies.json
1696 ```
1697 {
1698 "policies": {
1699 "DisplayMenuBar": true | false
1700 }
1701 }
1702 ```
1703 ### DisplayMenuBar
1704 Set the state of the menubar.
1705
1706 `always` means the menubar is shown and cannot be hidden.
1707
1708 `never` means the menubar is hidden and cannot be shown.
1709
1710 `default-on` means the menubar is on by default but can be hidden.
1711
1712 `default-off` means the menubar is off by default but can be shown.
1713
1714 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1715 **CCK2 Equivalent:** `displayMenuBar`\
1716 **Preferences Affected:** N/A
1717
1718 #### Windows (GPO)
1719 ```
1720 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1721 ```
1722 #### Windows (Intune)
1723 OMA-URI:
1724 ```
1725 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1726 ```
1727 Value (string):
1728 ```
1729 <enabled/>
1730 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1731 ```
1732 #### macOS
1733 ```
1734 <dict>
1735 <key>DisplayMenuBar</key>
1736 <string>always | never | default-on | default-off</string>
1737 </dict>
1738 ```
1739 #### policies.json
1740 ```
1741 {
1742 "policies": {
1743 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1744 }
1745 }
1746 ```
1747 ### DNSOverHTTPS
1748 Configure DNS over HTTPS.
1749
1750 `Enabled` determines whether DNS over HTTPS is enabled
1751
1752 `ProviderURL` is a URL to another provider.
1753
1754 `Locked` prevents the user from changing DNS over HTTPS preferences.
1755
1756 `ExcludedDomains` excludes domains from DNS over HTTPS.
1757
1758 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1759 **CCK2 Equivalent:** N/A\
1760 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1761
1762 #### Windows (GPO)
1763 ```
1764 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1765 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1766 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1767 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1768 ```
1769 #### Windows (Intune)
1770 OMA-URI:
1771 ```
1772 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1773 ```
1774 Value (string):
1775 ```
1776 <enabled/> or <disabled/>
1777 ```
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/>
1785 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1786 ```
1787 OMA-URI:
1788 ```
1789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1790 ```
1791 Value (string):
1792 ```
1793 <enabled/> or <disabled/>
1794 ```
1795 OMA-URI:
1796 ```
1797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1798 ```
1799 Value (string):
1800 ```
1801 <enabled/>
1802 <data id="List" value="1&#xF000;example.com"/>
1803 ```
1804 #### macOS
1805 ```
1806 <dict>
1807 <key>DNSOverHTTPS</key>
1808 <dict>
1809 <key>Enabled</key>
1810 <true/> | <false/>
1811 <key>ProviderURL</key>
1812 <string>URL_TO_ALTERNATE_PROVIDER</string>
1813 <key>Locked</key>
1814 <true/> | <false/>
1815 <key>ExcludedDomains</key>
1816 <array>
1817 <string>example.com</string>
1818 </array>
1819 </dict>
1820 </dict>
1821 ```
1822 #### policies.json
1823 ```
1824 {
1825 "policies": {
1826 "DNSOverHTTPS": {
1827 "Enabled": true | false,
1828 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1829 "Locked": true | false,
1830 "ExcludedDomains": ["example.com"]
1831 }
1832 }
1833 }
1834 ```
1835 ### DontCheckDefaultBrowser
1836 Don't check if Firefox is the default browser at startup.
1837
1838 **Compatibility:** Firefox 60, Firefox ESR 60\
1839 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1840 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1841
1842 #### Windows (GPO)
1843 ```
1844 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1845 ```
1846 #### Windows (Intune)
1847 OMA-URI:
1848 ```
1849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1850 ```
1851 Value (string):
1852 ```
1853 <enabled/> or <disabled/>
1854 ```
1855 #### macOS
1856 ```
1857 <dict>
1858 <key>DontCheckDefaultBrowser</key>
1859 <true/> | <false/>
1860 </dict>
1861 ```
1862 #### policies.json
1863 ```
1864 {
1865 "policies": {
1866 "DontCheckDefaultBrowser": true | false
1867 }
1868 }
1869 ```
1870 ### DefaultDownloadDirectory
1871 Set the default download directory.
1872
1873 You can use ${home} for the native home directory.
1874
1875 **Compatibility:** Firefox 68, Firefox ESR 68\
1876 **CCK2 Equivalent:** N/A\
1877 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1878
1879 #### Windows (GPO)
1880 ```
1881 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1882 ```
1883 #### Windows (Intune)
1884 OMA-URI:
1885 ```
1886 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1887 ```
1888 Value (string):
1889 ```
1890 <enabled/>
1891 <data id="Preferences_String" value="${home}\Downloads"/>
1892 ```
1893 #### macOS
1894 ```
1895 <dict>
1896 <key>DefaultDownloadDirectory</key>
1897 <string>${home}/Downloads</string>
1898 </dict>
1899 ```
1900 #### policies.json (macOS and Linux)
1901 ```
1902 {
1903 "policies": {
1904 "DefaultDownloadDirectory": "${home}/Downloads"
1905 }
1906 ```
1907 #### policies.json (Windows)
1908 ```
1909 {
1910 "policies": {
1911 "DefaultDownloadDirectory": "${home}\\Downloads"
1912 }
1913 ```
1914 ### DownloadDirectory
1915 Set and lock the download directory.
1916
1917 You can use ${home} for the native home directory.
1918
1919 **Compatibility:** Firefox 68, Firefox ESR 68\
1920 **CCK2 Equivalent:** N/A\
1921 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1922
1923 #### Windows (GPO)
1924 ```
1925 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1926 ```
1927 #### Windows (Intune)
1928 OMA-URI:
1929 ```
1930 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1931 ```
1932 Value (string):
1933 ```
1934 <enabled/>
1935 <data id="Preferences_String" value="${home}\Downloads"/>
1936 ```
1937 #### macOS
1938 ```
1939 <dict>
1940 <key>DownloadDirectory</key>
1941 <string>${home}/Downloads</string>
1942 </dict>
1943 ```
1944 #### policies.json (macOS and Linux)
1945 ```
1946 {
1947 "policies": {
1948 "DownloadDirectory": "${home}/Downloads"
1949 }
1950 ```
1951 #### policies.json (Windows)
1952 ```
1953 {
1954 "policies": {
1955 "DownloadDirectory": "${home}\\Downloads"
1956 }
1957 ```
1958 ### EnableTrackingProtection
1959 Configure tracking protection.
1960
1961 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1962
1963 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1964
1965 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1966
1967 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1968
1969 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1970
1971 `Exceptions` are origins for which tracking protection is not enabled.
1972
1973 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1974 **CCK2 Equivalent:** N/A\
1975 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1976
1977 #### Windows (GPO)
1978 ```
1979 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1980 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1981 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1982 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1983 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1984 ```
1985 #### Windows (Intune)
1986 OMA-URI:
1987 ```
1988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1989 ```
1990 Value (string):
1991 ```
1992 <enabled/>
1993 <data id="TrackingProtectionLocked" value="true | false"/>
1994 <data id="Cryptomining" value="true | false"/>
1995 <data id="Fingerprinting" value="true | false"/>
1996 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1997 ```
1998 #### macOS
1999 ```
2000 <dict>
2001 <key>EnableTrackingProtection</key>
2002 <dict>
2003 <key>Value</key>
2004 <true/> | <false/>
2005 <key><Locked</key>
2006 <true/> | <false/>
2007 <key><Cryptomining</key>
2008 <true/> | <false/>
2009 <key><Fingerprinting</key>
2010 <true/> | <false/>
2011 <key>Exceptions</key>
2012 <array>
2013 <string>https://example.com</string>
2014 </array>
2015 </dict>
2016 </dict>
2017 ```
2018 #### policies.json
2019 ```
2020 {
2021 "policies": {
2022 "EnableTrackingProtection": {
2023 "Value": true | false,
2024 "Locked": true | false,
2025 "Cryptomining": true | false,
2026 "Fingerprinting": true | false,
2027 "Exceptions": ["https://example.com"]
2028 }
2029 }
2030 ```
2031 ### EncryptedMediaExtensions
2032 Enable or disable Encrypted Media Extensions and optionally lock it.
2033
2034 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2035
2036 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2037
2038 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2039 **CCK2 Equivalent:** N/A\
2040 **Preferences Affected:** `media.eme.enabled`
2041
2042 #### Windows (GPO)
2043 ```
2044 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2045 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2046 ```
2047 #### Windows (Intune)
2048 OMA-URI:
2049 ```
2050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2051 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2052 ```
2053 Value (string):
2054 ```
2055 <enabled/>or <disabled/>
2056 ```
2057 #### macOS
2058 ```
2059 <dict>
2060 <key>EncryptedMediaExtensions</key>
2061 <dict>
2062 <key>Enabled</key>
2063 <true/> | <false/>
2064 <key><Locked</key>
2065 <true/> | <false/>
2066 </dict>
2067 </dict>
2068 ```
2069 #### policies.json
2070 ```
2071 {
2072 "policies": {
2073 "EncryptedMediaExtensions": {
2074 "Enabled": true | false,
2075 "Locked": true | false
2076 }
2077 }
2078 ```
2079 ### EnterprisePoliciesEnabled
2080 Enable policy support on macOS.
2081
2082 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2083 **CCK2 Equivalent:** N/A\
2084 **Preferences Affected:** N/A
2085
2086 #### macOS
2087 ```
2088 <dict>
2089 <key>EnterprisePoliciesEnabled</key>
2090 <true/>
2091 </dict>
2092 ```
2093 ### Extensions
2094 Control the installation, uninstallation and locking of extensions.
2095
2096 `Install` is a list of URLs or native paths for extensions to be installed.
2097
2098 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2099
2100 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2101
2102 **Compatibility:** Firefox 60, Firefox ESR 60\
2103 **CCK2 Equivalent:** `addons`\
2104 **Preferences Affected:** N/A
2105
2106 #### Windows (GPO)
2107 ```
2108 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2109 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2110 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2111 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2112 ```
2113 #### macOS
2114 ```
2115 <dict>
2116 <key>Extensions</key>
2117 <dict>
2118 <key>Install</key>
2119 <array>
2120 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2121 <string>//path/to/xpi</string>
2122 </array>
2123 <key>Uninstall</key>
2124 <array>
2125 <string>bad_addon_id@mozilla.org</string>
2126 </array>
2127 <key>Locked</key>
2128 <array>
2129 <string>addon_id@mozilla.org</string>
2130 </array>
2131 </dict>
2132 </dict>
2133 ```
2134 #### policies.json
2135 ```
2136 {
2137 "policies": {
2138 "Extensions": {
2139 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2140 "Uninstall": ["bad_addon_id@mozilla.org"],
2141 "Locked": ["addon_id@mozilla.org"]
2142 }
2143 }
2144 }
2145 ```
2146 ### ExtensionSettings
2147 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2148
2149 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2150
2151 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2152
2153 The configuration for each extension is another dictionary that can contain the fields documented below.
2154
2155 | Name | Description |
2156 | --- | --- |
2157 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2158 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2159 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2160 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2161 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2162 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2163 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2164 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2165 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2166
2167 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2168 **CCK2 Equivalent:** N/A\
2169 **Preferences Affected:** N/A
2170
2171 #### Windows (GPO)
2172 ```
2173 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2174 {
2175 "*": {
2176 "blocked_install_message": "Custom error message.",
2177 "install_sources": ["https://addons.mozilla.org/"],
2178 "installation_mode": "blocked",
2179 "allowed_types": ["extension"]
2180 },
2181 "uBlock0@raymondhill.net": {
2182 "installation_mode": "force_installed",
2183 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2184 }
2185 }
2186 ```
2187 #### Windows (Intune)
2188 OMA-URI:
2189 ```
2190 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2191 ```
2192 Value (string):
2193 ```
2194 <enabled/>
2195 <data id="ExtensionSettings" value='
2196 "*": {
2197 "blocked_install_message": "Custom error message.",
2198 "install_sources": ["https://addons.mozilla.org/"],
2199 "installation_mode": "blocked",
2200 "allowed_types": ["extension"]
2201 },
2202 "uBlock0@raymondhill.net": {
2203 "installation_mode": "force_installed",
2204 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2205 }'/>
2206 ```
2207 #### macOS
2208 ```
2209 <dict>
2210 <key>ExtensionSettings</key>
2211 <dict>
2212 <key>*</key>
2213 <dict>
2214 <key>blocked_install_message</key>
2215 <string>Custom error message.</string>
2216 <key>install_sources</key>
2217 <array>
2218 <string>https://addons.mozilla.org/</string>
2219 </array>
2220 <key>installation_mode</key>
2221 <string>blocked</string>
2222 <key>allowed_types</key>
2223 <array>
2224 <string>extension</string>
2225 </array>
2226 </dict>
2227 <key>uBlock0@raymondhill.net</key>
2228 <dict>
2229 <key>installation_mode</key>
2230 <string>force_installed</string>
2231 <key>install_url</key>
2232 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2233 </dict>
2234 </dict>
2235 </dict>
2236 ```
2237 #### policies.json
2238 ```
2239 {
2240 "policies": {
2241 "ExtensionSettings": {
2242 "*": {
2243 "blocked_install_message": "Custom error message.",
2244 "install_sources": ["https://addons.mozilla.org/"],
2245 "installation_mode": "blocked",
2246 "allowed_types": ["extension"]
2247 },
2248 "uBlock0@raymondhill.net": {
2249 "installation_mode": "force_installed",
2250 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2251 }
2252 }
2253 }
2254 }
2255 ```
2256 ### ExtensionUpdate
2257 Control extension updates.
2258
2259 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2260 **CCK2 Equivalent:** N/A\
2261 **Preferences Affected:** `extensions.update.enabled`
2262
2263 #### Windows (GPO)
2264 ```
2265 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2266 ```
2267 #### Windows (Intune)
2268 OMA-URI:
2269 ```
2270 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2271 ```
2272 Value (string):
2273 ```
2274 <enabled/> or <disabled/>
2275 ```
2276 #### macOS
2277 ```
2278 <dict>
2279 <key>ExtensionUpdate</key>
2280 <true/> | <false/>
2281 </dict>
2282 ```
2283 #### policies.json
2284 ```
2285 {
2286 "policies": {
2287 "ExtensionUpdate": true | false
2288 }
2289 }
2290 ```
2291 ### FlashPlugin
2292 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2293
2294 `Allow` is a list of origins where Flash are allowed.
2295
2296 `Block` is a list of origins where Flash is not allowed.
2297
2298 `Default` determines whether or not Flash is allowed by default.
2299
2300 `Locked` prevents the user from changing Flash preferences.
2301
2302 **Compatibility:** Firefox 60, Firefox ESR 60\
2303 **CCK2 Equivalent:** `permissions.plugin`\
2304 **Preferences Affected:** `plugin.state.flash`
2305
2306 #### Windows (GPO)
2307 ```
2308 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2309 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2310 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2311 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2312 ```
2313 #### Windows (Intune)
2314 OMA-URI:
2315 ```
2316 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2317 ```
2318 Value (string):
2319 ```
2320 <enabled/>
2321 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2322 ```
2323 OMA-URI:
2324 ```
2325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2326 ```
2327 Value (string):
2328 ```
2329 <enabled/> or <disabled/>
2330 ```
2331 OMA-URI:
2332 ```
2333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2334 ```
2335 Value (string):
2336 ```
2337 <enabled/> or <disabled/>
2338 ```
2339 #### macOS
2340 ```
2341 <dict>
2342 <key>FlashPlugin</key>
2343 <dict>
2344 <key>Allow</key>
2345 <array>
2346 <string>http://example.org</string>
2347 </array>
2348 <key>Block</key>
2349 <array>
2350 <string>http://example.edu</string>
2351 </array>
2352 <key>Default</key>
2353 <true/> | <false/>
2354 <key>Locked</key>
2355 <true/> | <false/>
2356 </dict>
2357 </dict>
2358 ```
2359 #### policies.json
2360 ```
2361 {
2362 "policies": {
2363 "FlashPlugin": {
2364 "Allow": ["http://example.org/"],
2365 "Block": ["http://example.edu/"],
2366 "Default": true | false,
2367 "Locked": true | false
2368 }
2369 }
2370 }
2371 ```
2372 ### FirefoxHome
2373 Customize the Firefox Home page.
2374
2375 **Compatibility:** Firefox 68, Firefox ESR 68\
2376 **CCK2 Equivalent:** N/A\
2377 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2378
2379 #### Windows (GPO)
2380 ```
2381 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2382 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2383 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2384 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2385 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2386 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2387 ```
2388 #### Windows (Intune)
2389 OMA-URI:
2390 ```
2391 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2392 ```
2393 Value (string):
2394 ```
2395 <enabled/>
2396 <data id="FirefoxHome_Search" value="true | false"/>
2397 <data id="FirefoxHome_TopSites" value="true | false"/>
2398 <data id="FirefoxHome_Highlights" value="true | false"/>
2399 <data id="FirefoxHome_Pocket" value="true | false"/>
2400 <data id="FirefoxHome_Snippets" value="true | false"/>
2401 <data id="FirefoxHome_Locked" value="true | false"/>
2402 ```
2403 #### macOS
2404 ```
2405 <dict>
2406 <key>FirefoxHome</key>
2407 <dict>
2408 <key>Search</key>
2409 <true/> | <false/>
2410 <key>TopSites</key>
2411 <true/> | <false/>
2412 <key>Highlights</key>
2413 <true/> | <false/>
2414 <key>Pocket</key>
2415 <true/> | <false/>
2416 <key>Snippets</key>
2417 <true/> | <false/>
2418 <key>Locked</key>
2419 <true/> | <false/>
2420 </dict>
2421 </dict>
2422 ```
2423 #### policies.json
2424 ```
2425 {
2426 "policies": {
2427 "FirefoxHome": {
2428 "Search": true | false,
2429 "TopSites": true | false,
2430 "Highlights": true | false,
2431 "Pocket": true | false,
2432 "Snippets": true | false,
2433 "Locked": true | false
2434 }
2435 }
2436 }
2437 ```
2438 ### HardwareAcceleration
2439 Control hardware acceleration.
2440
2441 **Compatibility:** Firefox 60, Firefox ESR 60\
2442 **CCK2 Equivalent:** N/A\
2443 **Preferences Affected:** `layers.acceleration.disabled`
2444
2445 #### Windows (GPO)
2446 ```
2447 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2448 ```
2449 #### Windows (Intune)
2450 OMA-URI:
2451 ```
2452 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2453 ```
2454 Value (string):
2455 ```
2456 <enabled/> or <disabled/>
2457 ```
2458 #### macOS
2459 ```
2460 <dict>
2461 <key>HardwareAcceleration</key>
2462 <true/> | <false/>
2463 </dict>
2464 ```
2465 #### policies.json
2466 ```
2467 {
2468 "policies": {
2469 "HardwareAcceleration": true | false
2470 }
2471 }
2472 ```
2473 ### Homepage
2474 Configure the default homepage and how Firefox starts.
2475
2476 `URL` is the default homepage.
2477
2478 `Locked` prevents the user from changing homepage preferences.
2479
2480 `Additional` allows for more than one homepage.
2481
2482 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2483
2484 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2485
2486 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2487 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2488 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2489
2490 #### Windows (GPO)
2491 ```
2492 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2493 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2494 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2495 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2496 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2497 ```
2498 #### Windows (Intune)
2499 OMA-URI:
2500 ```
2501 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2502 ```
2503 Value (string):
2504 ```
2505 <enabled/>
2506
2507 <data id="HomepageURL" value="https://example.com"/>
2508 <data id="HomepageLocked" value="true | false"/>
2509 ```
2510 OMA-URI:
2511 ```
2512 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2513 ```
2514 Value (string):
2515 ```
2516 <enabled/>
2517
2518 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2519 ```
2520 OMA-URI:
2521 ```
2522 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2523 ```
2524 Value (string):
2525 ```
2526 <enabled/>
2527
2528 <data id="StartPage" value="none | homepage | previous-session"/>
2529 ```
2530 #### macOS
2531 ```
2532 <dict>
2533 <key>Homepage</key>
2534 <dict>
2535 <key>URL</key>
2536 <string>http://example.com</string>
2537 <key>Locked</key>
2538 <true/> | <false/>
2539 <key>Additional</key>
2540 <array>
2541 <string>http://example.org</string>
2542 <string>http://example.edu</string>
2543 </array>
2544 <key>StartPage</key>
2545 <string>none | homepage | previous-session | homepage-locked</string>
2546 </dict>
2547 </dict>
2548 ```
2549 #### policies.json
2550 ```
2551 {
2552 "policies": {
2553 "Homepage": {
2554 "URL": "http://example.com/",
2555 "Locked": true | false,
2556 "Additional": ["http://example.org/",
2557 "http://example.edu/"],
2558 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2559 }
2560 }
2561 }
2562 ```
2563 ### InstallAddonsPermission
2564 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2565
2566 `Allow` is a list of origins where extension installs are allowed.
2567
2568 `Default` determines whether or not extension installs are allowed by default.
2569
2570 **Compatibility:** Firefox 60, Firefox ESR 60\
2571 **CCK2 Equivalent:** `permissions.install`\
2572 **Preferences Affected:** `xpinstall.enabled`
2573
2574 #### Windows (GPO)
2575 ```
2576 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2577 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2578 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2579 ```
2580 #### Windows (Intune)
2581 OMA-URI:
2582 ```
2583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2584 ```
2585 Value (string):
2586 ```
2587 <enabled/>
2588 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2589 ```
2590 OMA-URI:
2591 ```
2592 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2593 ```
2594 Value (string):
2595 ```
2596 <enabled/>
2597 ```
2598 #### macOS
2599 ```
2600 <dict>
2601 <key>InstallAddonsPermission</key>
2602 <dict>
2603 <key>Allow</key>
2604 <array>
2605 <string>http://example.org</string>
2606 <string>http://example.edu</string>
2607 </array>
2608 <key>Default</key>
2609 <true/> | <false/>
2610 </dict>
2611 </dict>
2612 ```
2613 #### policies.json
2614 ```
2615 {
2616 "policies": {
2617 "InstallAddonsPermission": {
2618 "Allow": ["http://example.org/",
2619 "http://example.edu/"],
2620 "Default": true | false
2621 }
2622 }
2623 }
2624 ```
2625 ### LegacyProfiles
2626 Disable the feature enforcing a separate profile for each installation.
2627
2628 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2629
2630 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2631
2632 This policy only work on Windows via GPO (not policies.json).
2633
2634 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2635 **CCK2 Equivalent:** N/A\
2636 **Preferences Affected:** N/A
2637
2638 #### Windows (GPO)
2639 ```
2640 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2641 ```
2642 #### Windows (Intune)
2643 OMA-URI:
2644 ```
2645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2646 ```
2647 Value (string):
2648 ```
2649 <enabled/> or <disabled/>
2650 ```
2651 ### LocalFileLinks
2652 Enable linking to local files by origin.
2653
2654 **Compatibility:** Firefox 68, Firefox ESR 68\
2655 **CCK2 Equivalent:** N/A\
2656 **Preferences Affected:** `capability.policy.localfilelinks.*`
2657
2658 #### Windows (GPO)
2659 ```
2660 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2661 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2662 ```
2663 #### Windows (Intune)
2664 OMA-URI:
2665 ```
2666 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2667 ```
2668 Value (string):
2669 ```
2670 <enabled/>
2671 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2672 ```
2673 #### macOS
2674 ```
2675 <dict>
2676 <key>LocalFileLinks</key>
2677 <array>
2678 <string>http://example.org</string>
2679 <string>http://example.edu</string>
2680 </array>
2681 </dict>
2682 ```
2683 #### policies.json
2684 ```
2685 {
2686 "policies": {
2687 "LocalFileLinks": ["http://example.org/",
2688 "http://example.edu/"]
2689 }
2690 }
2691 ```
2692 ### MasterPassword
2693 Require or prevent using a master password.
2694
2695 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2696
2697 **Compatibility:** Firefox 78, Firefox ESR 78\
2698 **CCK2 Equivalent:** `noMasterPassword`\
2699 **Preferences Affected:** N/A
2700
2701 #### Windows (GPO)
2702 ```
2703 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2704 ```
2705 #### Windows (Intune)
2706 OMA-URI:
2707 ```
2708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2709 ```
2710 Value (string):
2711 ```
2712 <enabled/> or <disabled/>
2713 ```
2714 #### macOS
2715 ```
2716 <dict>
2717 <key>MasterPassword</key>
2718 <true/> | <false/>
2719 </dict>
2720 ```
2721 #### policies.json
2722 ```
2723 {
2724 "policies": {
2725 "MasterPassword": true | false
2726 }
2727 }
2728 ```
2729 ### NetworkPrediction
2730 Enable or disable network prediction (DNS prefetching).
2731
2732 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2733 **CCK2 Equivalent:** N/A\
2734 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2735
2736 #### Windows (GPO)
2737 ```
2738 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2739 ```
2740 #### Windows (Intune)
2741 OMA-URI:
2742 ```
2743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2744 ```
2745 Value (string):
2746 ```
2747 <enabled/> or <disabled/>
2748 ```
2749 #### macOS
2750 ```
2751 <dict>
2752 <key>NetworkPrediction</key>
2753 <true/> | <false/>
2754 </dict>
2755 ```
2756 #### policies.json
2757 ```
2758 {
2759 "policies": {
2760 "NetworkPrediction": true | false
2761 }
2762 ```
2763 ### NewTabPage
2764 Enable or disable the New Tab page.
2765
2766 **Compatibility:** Firefox 68, Firefox ESR 68\
2767 **CCK2 Equivalent:** N/A\
2768 **Preferences Affected:** `browser.newtabpage.enabled`
2769
2770 #### Windows (GPO)
2771 ```
2772 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2773 ```
2774 #### Windows (Intune)
2775 OMA-URI:
2776 ```
2777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2778 ```
2779 Value (string):
2780 ```
2781 <enabled/> or <disabled/>
2782 ```
2783 #### macOS
2784 ```
2785 <dict>
2786 <key>NewTabPage</key>
2787 <true/> | <false/>
2788 </dict>
2789 ```
2790 #### policies.json
2791 ```
2792 {
2793 "policies": {
2794 "NewTabPage": true | false
2795 }
2796 ```
2797 ### NoDefaultBookmarks
2798 Disable the creation of default bookmarks.
2799
2800 This policy is only effective if the user profile has not been created yet.
2801
2802 **Compatibility:** Firefox 60, Firefox ESR 60\
2803 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2804 **Preferences Affected:** N/A
2805
2806 #### Windows (GPO)
2807 ```
2808 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2809 ```
2810 #### Windows (Intune)
2811 OMA-URI:
2812 ```
2813 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2814 ```
2815 Value (string):
2816 ```
2817 <enabled/> or <disabled/>
2818 ```
2819 #### macOS
2820 ```
2821 <dict>
2822 <key>NoDefaultBookmarks</key>
2823 <true/> | <false/>
2824 </dict>
2825 ```
2826 #### policies.json
2827 ```
2828 {
2829 "policies": {
2830 "NoDefaultBookmarks": true | false
2831 }
2832 }
2833 ```
2834 ### OfferToSaveLogins
2835 Control whether or not Firefox offers to save passwords.
2836
2837 **Compatibility:** Firefox 60, Firefox ESR 60\
2838 **CCK2 Equivalent:** `dontRememberPasswords`\
2839 **Preferences Affected:** `signon.rememberSignons`
2840
2841 #### Windows (GPO)
2842 ```
2843 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2844 ```
2845 #### Windows (Intune)
2846 OMA-URI:
2847 ```
2848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2849 ```
2850 Value (string):
2851 ```
2852 <enabled/> or <disabled/>
2853 ```
2854 #### macOS
2855 ```
2856 <dict>
2857 <key>OfferToSaveLogins</key>
2858 <true/> | <false/>
2859 </dict>
2860 ```
2861 #### policies.json
2862 ```
2863 {
2864 "policies": {
2865 "OfferToSaveLogins": true | false
2866 }
2867 }
2868 ```
2869 ### OfferToSaveLoginsDefault
2870 Sets the default value of signon.rememberSignons without locking it.
2871
2872 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2873 **CCK2 Equivalent:** `dontRememberPasswords`\
2874 **Preferences Affected:** `signon.rememberSignons`
2875
2876 #### Windows (GPO)
2877 ```
2878 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2879 ```
2880 #### Windows (Intune)
2881 OMA-URI:
2882 ```
2883 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2884 ```
2885 Value (string):
2886 ```
2887 <enabled/> or <disabled/>
2888 ```
2889 #### macOS
2890 ```
2891 <dict>
2892 <key>OfferToSaveLoginsDefault</key>
2893 <true/> | <false/>
2894 </dict>
2895 ```
2896 #### policies.json
2897 ```
2898 {
2899 "policies": {
2900 "OfferToSaveLoginsDefault": true | false
2901 }
2902 }
2903 ```
2904 ### OverrideFirstRunPage
2905 Override the first run page. If the value is blank, no first run page is displayed.
2906
2907 **Compatibility:** Firefox 60, Firefox ESR 60\
2908 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2909 **Preferences Affected:** `startup.homepage_welcome_url`
2910
2911 #### Windows (GPO)
2912 ```
2913 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2914 ```
2915 #### Windows (Intune)
2916 OMA-URI:
2917 ```
2918 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2919 ```
2920 Value (string):
2921 ```
2922 <enabled/>
2923 <data id="OverridePage" value="https://example.com"/>
2924 ```
2925 #### macOS
2926 ```
2927 <dict>
2928 <key>OverrideFirstRunPage</key>
2929 <string>http://example.org</string>
2930 </dict>
2931 ```
2932 #### policies.json
2933 ```
2934 {
2935 "policies": {
2936 "OverrideFirstRunPage": "http://example.org"
2937 }
2938 ```
2939 ### OverridePostUpdatePage
2940 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2941
2942 **Compatibility:** Firefox 60, Firefox ESR 60\
2943 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2944 **Preferences Affected:** `startup.homepage_override_url`
2945
2946 #### Windows (GPO)
2947 ```
2948 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2949 ```
2950 #### Windows (Intune)
2951 OMA-URI:
2952 ```
2953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2954 ```
2955 Value (string):
2956 ```
2957 <enabled/>
2958 <data id="OverridePage" value="https://example.com"/>
2959 ```
2960 #### macOS
2961 ```
2962 <dict>
2963 <key>OverridePostUpdatePage</key>
2964 <string>http://example.org</string>
2965 </dict>
2966 ```
2967 #### policies.json
2968 ```
2969 {
2970 "policies": {
2971 "OverridePostUpdatePage": "http://example.org"
2972 }
2973 ```
2974 ### PasswordManagerEnabled
2975 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2976
2977 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2978 **CCK2 Equivalent:** N/A\
2979 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2980
2981 #### Windows (GPO)
2982 ```
2983 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2984 ```
2985 #### Windows (Intune)
2986 OMA-URI:
2987 ```
2988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2989 ```
2990 Value (string):
2991 ```
2992 <enabled/> or <disabled/>
2993 ```
2994 #### macOS
2995 ```
2996 <dict>
2997 <key>PasswordManagerEnabled</key>
2998 <true/> | <false/>
2999 </dict>
3000 ```
3001 #### policies.json
3002 ```
3003 {
3004 "policies": {
3005 "PasswordManagerEnabled": true | false
3006 }
3007 }
3008 ```
3009 ### PDFjs
3010 Disable or configure PDF.js, the built-in PDF viewer.
3011
3012 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3013
3014 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3015
3016 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3017
3018 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3019 **CCK2 Equivalent:** N/A\
3020 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3021
3022 #### Windows (GPO)
3023 ```
3024 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3025 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3026 ```
3027 #### Windows (Intune)
3028 OMA-URI:
3029 ```
3030 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3031 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3032 ```
3033 Value (string):
3034 ```
3035 <enabled/>or <disabled/>
3036 ```
3037 #### macOS
3038 ```
3039 <dict>
3040 <key>PDFjs</key>
3041 <dict>
3042 <key>Enabled</key>
3043 <true/> | <false/>
3044 <key><EnablePermissions</key>
3045 <true/> | <false/>
3046 </dict>
3047 </dict>
3048 ```
3049 #### policies.json
3050 ```
3051 {
3052 "policies": {
3053 "PSFjs": {
3054 "Enabled": true | false,
3055 "EnablePermissions": true | false
3056 }
3057 }
3058 ```
3059 ### Permissions
3060 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3061
3062 `Allow` is a list of origins where the feature is allowed.
3063
3064 `Block` is a list of origins where the feature is not allowed.
3065
3066 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3067
3068 `Locked` prevents the user from changing preferences for the feature.
3069
3070 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3071
3072 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3073 **CCK2 Equivalent:** N/A\
3074 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3075
3076 #### Windows (GPO)
3077 ```
3078 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3079 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3080 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3081 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3082 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3083 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3084 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3085 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3086 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3087 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3088 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3089 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3090 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3091 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3092 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3093 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3094 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3095 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3096 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3097 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3098 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3099 ```
3100 #### Windows (Intune)
3101 OMA-URI:
3102 ```
3103 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3104 ```
3105 Value (string):
3106 ```
3107 <enabled/> or <disabled/>
3108 ```
3109 OMA-URI:
3110 ```
3111 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3112 ```
3113 Value (string):
3114 ```
3115 <enabled/> or <disabled/>
3116 ```
3117 OMA-URI:
3118 ```
3119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3120 ```
3121 Value (string):
3122 ```
3123 <enabled/>
3124 <data id="Permissions" value="1&#xF000;https://example.org"/>
3125 ```
3126 OMA-URI:
3127 ```
3128 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3129 ```
3130 Value (string):
3131 ```
3132 <enabled/> or <disabled/>
3133 ```
3134 OMA-URI:
3135 ```
3136 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3137 ```
3138 Value (string):
3139 ```
3140 <enabled/> or <disabled/>
3141 ```
3142 OMA-URI:
3143 ```
3144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3145 ```
3146 Value (string):
3147 ```
3148 <enabled/>
3149 <data id="Permissions" value="1&#xF000;https://example.org"/>
3150 ```
3151 OMA-URI:
3152 ```
3153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3154 ```
3155 Value (string):
3156 ```
3157 <enabled/>
3158 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3159 ```
3160 OMA-URI:
3161 ```
3162 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3163 ```
3164 Value (string):
3165 ```
3166 <enabled/>
3167 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3168 ```
3169 OMA-URI:
3170 ```
3171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3172 ```
3173 Value (string):
3174 ```
3175 <enabled/> or <disabled/>
3176 ```
3177 #### macOS
3178 ```
3179 <dict>
3180 <key>Permissions</key>
3181 <dict>
3182 <key>Camera</key>
3183 <dict>
3184 <key>Allow</key>
3185 <array>
3186 <string>https://example.org</string>
3187 <string>https://example.org:1234</string>
3188 </array>
3189 <key>Block</key>
3190 <array>
3191 <string>https://example.edu</string>
3192 </array>
3193 <key>BlockNewRequests</key>
3194 <true/> | <false/>
3195 <key>Locked</key>
3196 <true/> | <false/>
3197 </dict>
3198 <key>Microphone</key>
3199 <dict>
3200 <key>Allow</key>
3201 <array>
3202 <string>https://example.org</string>
3203 </array>
3204 <key>Block</key>
3205 <array>
3206 <string>https://example.edu</string>
3207 </array>
3208 <key>BlockNewRequests</key>
3209 <true/> | <false/>
3210 <key>Locked</key>
3211 <true/> | <false/>
3212 </dict>
3213 <key>Location</key>
3214 <dict>
3215 <key>Allow</key>
3216 <array>
3217 <string>https://example.org</string>
3218 </array>
3219 <key>Block</key>
3220 <array>
3221 <string>https://example.edu</string>
3222 </array>
3223 <key>BlockNewRequests</key>
3224 <true/> | <false/>
3225 <key>Locked</key>
3226 <true/> | <false/>
3227 </dict>
3228 <key>Notifications</key>
3229 <dict>
3230 <key>Allow</key>
3231 <array>
3232 <string>https://example.org</string>
3233 </array>
3234 <key>Block</key>
3235 <array>
3236 <string>https://example.edu</string>
3237 </array>
3238 <key>BlockNewRequests</key>
3239 <true/>
3240 <key>Locked</key>
3241 <true/>
3242 </dict>
3243 <key>Autoplay</key>
3244 <dict>
3245 <key>Allow</key>
3246 <array>
3247 <string>https://example.org</string>
3248 </array>
3249 <key>Block</key>
3250 <array>
3251 <string>https://example.edu</string>
3252 </array>
3253 <key>Default</key>
3254 <string>allow-audio-video | block-audio | block-audio-video</string>
3255 <key>Locked</key>
3256 <true/> | <false/>
3257 </dict>
3258 </dict>
3259 </dict>
3260 ```
3261 #### policies.json
3262 ```
3263 {
3264 "policies": {
3265 "Permissions": {
3266 "Camera": {
3267 "Allow": ["https://example.org","https://example.org:1234"],
3268 "Block": ["https://example.edu"],
3269 "BlockNewRequests": true | false,
3270 "Locked": true | false
3271 },
3272 "Microphone": {
3273 "Allow": ["https://example.org"],
3274 "Block": ["https://example.edu"],
3275 "BlockNewRequests": true | false,
3276 "Locked": true | false
3277 },
3278 "Location": {
3279 "Allow": ["https://example.org"],
3280 "Block": ["https://example.edu"],
3281 "BlockNewRequests": true | false,
3282 "Locked": true | false
3283 },
3284 "Notifications": {
3285 "Allow": ["https://example.org"],
3286 "Block": ["https://example.edu"],
3287 "BlockNewRequests": true | false,
3288 "Locked": true | false
3289 },
3290 "Autoplay": {
3291 "Allow": ["https://example.org"],
3292 "Block": ["https://example.edu"],
3293 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3294 "Locked": true | false
3295 }
3296 }
3297 }
3298 }
3299 ```
3300 ### PictureInPicture
3301
3302 Enable or disable Picture-in-Picture.
3303
3304 **Compatibility:** Firefox 78, Firefox ESR 78\
3305 **CCK2 Equivalent:** N/A\
3306 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3307
3308 #### Windows (GPO)
3309 ```
3310 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3311 ```
3312 #### Windows (Intune)
3313 OMA-URI:
3314 ```
3315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3316 ```
3317 Value (string):
3318 ```
3319 <enabled/> or <disabled/>
3320 ```
3321 #### macOS
3322 ```
3323 <dict>
3324 <key>PictureInPicture</key>
3325 <true/> | <false/>
3326 </dict>
3327 ```
3328 #### policies.json
3329 ```
3330 {
3331 "policies": {
3332 "PictureInPicture": true | false
3333 }
3334 }
3335 ```
3336 ### PopupBlocking
3337 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3338
3339 `Allow` is a list of origins where popup-windows are allowed.
3340
3341 `Default` determines whether or not pop-up windows are allowed by default.
3342
3343 `Locked` prevents the user from changing pop-up preferences.
3344
3345 **Compatibility:** Firefox 60, Firefox ESR 60\
3346 **CCK2 Equivalent:** `permissions.popup`\
3347 **Preferences Affected:** `dom.disable_open_during_load`
3348
3349 #### Windows (GPO)
3350 ```
3351 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3352 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3353 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3354 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3355 ```
3356 #### Windows (Intune)
3357 OMA-URI:
3358 ```
3359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3360 ```
3361 Value (string):
3362 ```
3363 <enabled/>
3364 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3365 ```
3366 OMA-URI:
3367 ```
3368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3369 ```
3370 Value (string):
3371 ```
3372 <enabled/> or <disabled/>
3373 ```
3374 OMA-URI:
3375 ```
3376 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3377 ```
3378 Value (string):
3379 ```
3380 <enabled/> or <disabled/>
3381 ```
3382 #### macOS
3383 ```
3384 <dict>
3385 <key>PopupBlocking</key>
3386 <dict>
3387 <key>Allow</key>
3388 <array>
3389 <string>http://example.org</string>
3390 <string>http://example.edu</string>
3391 </array>
3392 <key>Default</key>
3393 <true/> | <false/>
3394 <key>Locked</key>
3395 <true/> | <false/>
3396 </dict>
3397 </dict>
3398 ```
3399 #### policies.json
3400 ```
3401 {
3402 "policies": {
3403 "PopupBlocking": {
3404 "Allow": ["http://example.org/",
3405 "http://example.edu/"],
3406 "Default": true | false,
3407 "Locked": true | false
3408 }
3409 }
3410 }
3411 ```
3412 ### Preferences
3413 Set and lock certain preferences.
3414
3415 **Compatibility:** See below\
3416 **CCK2 Equivalent:** `preferences`\
3417 **Preferences Affected:** See below
3418
3419 | Preference | Type | Compatibility | Default
3420 | --- | --- | --- | ---
3421 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3422 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3423 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3424 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3425 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3426 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3427 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3428 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3429 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3430 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3431 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3432 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3433 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3434 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3435 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3436 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3437 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3438 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3439 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3440 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3441 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3442 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3443 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3444 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3445 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3446 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3447 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3448 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3449 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3450 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3451 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3452 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3453 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3454 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3455 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3456 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3457 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3458 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3459 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3460 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3461 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3462 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3463 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3464 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3465 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3466 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3467 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3468 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3469 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3470 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3471 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3472 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3473 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3474 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3475 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3476 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3477 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3478 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3479 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3480 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3481 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3482 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3483 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3484 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3485 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3486 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3487 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3488 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3489 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3490 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3491 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3492 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3493 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3494 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3495 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3496 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3497 disabled
3498 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3499 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3500 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3501 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3502 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3503 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3504 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3505 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3506 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3507 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3508 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3509 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3510 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3511 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3512 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3513 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3514 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3515 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3516 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3517 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3518 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3519 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3520 #### Windows (GPO)
3521 ```
3522 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3523 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3524 ```
3525 #### Windows (Intune)
3526 OMA-URI: (periods are replaced by underscores)
3527 ```
3528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3529 ```
3530 Value (string):
3531 ```
3532 <enabled/> or <disabled/>
3533 ```
3534 #### macOS
3535 ```
3536 <dict>
3537 <key>Preferences</key>
3538 <dict>
3539 <key>boolean_preference_name</key>
3540 <true/> | <false/>
3541 <key>string_preference_name</key>
3542 <string>string_value</string>
3543 </dict>
3544 </dict>
3545 ```
3546 #### policies.json
3547 ```
3548 {
3549 "policies": {
3550 "Preferences": {
3551 "boolean_preference_name": true | false,
3552 "string_preference_name": "string_value"
3553 }
3554 }
3555 }
3556 ```
3557 ### PromptForDownloadLocation
3558 Ask where to save each file before downloading.
3559
3560 **Compatibility:** Firefox 68, Firefox ESR 68\
3561 **CCK2 Equivalent:** N/A\
3562 **Preferences Affected:** `browser.download.useDownloadDir`
3563
3564 #### Windows (GPO)
3565 ```
3566 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3567 ```
3568 #### Windows (Intune)
3569 OMA-URI:
3570 ```
3571 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3572 ```
3573 Value (string):
3574 ```
3575 <enabled/> or <disabled/>
3576 ```
3577 #### macOS
3578 ```
3579 <dict>
3580 <key>PromptForDownloadLocation</key>
3581 <true/> | <false/>
3582 </dict>
3583 ```
3584 #### policies.json
3585 ```
3586 {
3587 "policies": {
3588 "PromptForDownloadLocation": true | false
3589 }
3590 }
3591 ```
3592 ### Proxy
3593 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3594 To specify ports, append them to the hostnames with a colon (:).
3595
3596 `Mode` is the proxy method being used.
3597
3598 `Locked` is whether or not proxy settings can be changed.
3599
3600 `HTTPProxy` is the HTTP proxy server.
3601
3602 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3603
3604 `SSLProxy` is the SSL proxy server.
3605
3606 `FTPProxy` is the FTP proxy server.
3607
3608 `SOCKSProxy` is the SOCKS proxy server
3609
3610 `SOCKSVersion` is the SOCKS version (4 or 5)
3611
3612 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3613
3614 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3615
3616 `AutoLogin` means do not prompt for authentication if password is saved.
3617
3618 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3619
3620 **Compatibility:** Firefox 60, Firefox ESR 60\
3621 **CCK2 Equivalent:** `networkProxy*`\
3622 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3623
3624 #### Windows (GPO)
3625 ```
3626 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3627 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3628 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3629 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3630 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3631 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3632 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3633 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3634 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3635 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3636 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3637 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3638 ```
3639 #### Windows (Intune)
3640 OMA-URI:
3641 ```
3642 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3643 ```
3644 Value (string):
3645 ```
3646 <enabled/>
3647 <data id="ProxyLocked" value="true | false"/>
3648 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3649 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3650 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3651 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3652 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3653 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3654 <data id="SOCKSVersion" value="4 | 5"/>
3655 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3656 <data id="Passthrough" value="<local>"/>
3657 <data id="AutoLogin" value="true | false"/>
3658 <data id="UseProxyForDNS" value="true | false"/>
3659 ```
3660 #### macOS
3661 ```
3662 <dict>
3663 <key>Proxy</key>
3664 <dict>
3665 <key>Mode</key>
3666 <string>none | system | manual | autoDetect | autoConfig</string>
3667 <key>Locked</key>
3668 <true> | </false>
3669 <key>HTTPProxy</key>
3670 <string>https://httpproxy.example.com</string>
3671 <key>UseHTTPProxyForAllProtocols</key>
3672 <true> | </false>
3673 <key>SSLProxy</key>
3674 <string>https://sslproxy.example.com</string>
3675 <key>FTPProxy</key>
3676 <string>https://ftpproxy.example.com</string>
3677 <key>SOCKSProxy</key>
3678 <string>https://socksproxy.example.com</string>
3679 <key>SOCKSVersion</key>
3680 <string>4 | 5</string>
3681 <key>Passthrough</key>
3682 <string>&lt;local>&gt;</string>
3683 <key>AutoConfigURL</key>
3684 <string>URL_TO_AUTOCONFIG</string>
3685 <key>AutoLogin</key>
3686 <true> | </false>
3687 <key>UseProxyForDNS</key>
3688 <true> | </false>
3689 </dict>
3690 </dict>
3691 ```
3692 #### policies.json
3693 ```
3694 {
3695 "policies": {
3696 "Proxy": {
3697 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3698 "Locked": true | false,
3699 "HTTPProxy": "hostname",
3700 "UseHTTPProxyForAllProtocols": true | false,
3701 "SSLProxy": "hostname",
3702 "FTPProxy": "hostname",
3703 "SOCKSProxy": "hostname",
3704 "SOCKSVersion": 4 | 5
3705 "Passthrough": "<local>",
3706 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3707 "AutoLogin": true | false,
3708 "UseProxyForDNS": true | false
3709 }
3710 }
3711 }
3712 ```
3713 ### RequestedLocales
3714 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3715
3716 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3717
3718 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3719 **CCK2 Equivalent:** N/A\
3720 **Preferences Affected:** N/A
3721 #### Windows (GPO)
3722 ```
3723 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3724 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3725
3726 or
3727
3728 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3729 ```
3730 #### Windows (Intune)
3731 OMA-URI:
3732 ```
3733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3734 ```
3735 Value (string):
3736 ```
3737 <enabled/>
3738 <data id="Preferences_String" value="de,en-US"/>
3739 ```
3740 #### macOS
3741 ```
3742 <dict>
3743 <key>RequestedLocales</key>
3744 <array>
3745 <string>de</string>
3746 <string>en-US</string>
3747 </array>
3748 </dict>
3749
3750 or
3751
3752 <dict>
3753 <key>RequestedLocales</key>
3754 <string>de,en-US</string>
3755 </dict>
3756
3757 ```
3758 #### policies.json
3759 ```
3760 {
3761 "policies": {
3762 "RequestedLocales": ["de", "en-US"]
3763 }
3764 }
3765
3766 or
3767
3768 {
3769 "policies": {
3770 "RequestedLocales": "de,en-US"
3771 }
3772 }
3773 ```
3774 <a name="SanitizeOnShutdown"></a>
3775
3776 ### SanitizeOnShutdown (Selective)
3777 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3778
3779 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3780
3781 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3782 **CCK2 Equivalent:** N/A\
3783 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3784 #### Windows (GPO)
3785 ```
3786 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3787 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3788 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3789 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3790 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3791 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3792 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3793 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3794 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3795 ```
3796 #### Windows (Intune)
3797 OMA-URI:
3798 ```
3799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3800 ```
3801 Value (string):
3802 ```
3803 <enabled/> or <disabled/>
3804 ```
3805 #### macOS
3806 ```
3807 <dict>
3808 <key>SanitizeOnShutdown</key>
3809 <dict>
3810 <key>Cache</key>
3811 <true/> | <false/>
3812 <key>Cookies</key>
3813 <true/> | <false/>
3814 <key>Downloads</key>
3815 <true/> | <false/>
3816 <key>FormData</key>
3817 <true/> | <false/>
3818 <key>History</key>
3819 <true/> | <false/>
3820 <key>Sessions</key>
3821 <true/> | <false/>
3822 <key>SiteSettings</key>
3823 <true/> | <false/>
3824 <key>OfflineApps</key>
3825 <true/> | <false/>
3826 <key>Locked</key>
3827 <true/> | <false/>
3828 </dict>
3829 </dict>
3830 ```
3831 #### policies.json
3832 ```
3833 {
3834 "policies": {
3835 "SanitizeOnShutdown": {
3836 "Cache": true | false,
3837 "Cookies": true | false,
3838 "Downloads": true | false,
3839 "FormData": true | false,
3840 "History": true | false,
3841 "Sessions": true | false,
3842 "SiteSettings": true | false,
3843 "OfflineApps": true | false,
3844 "Locked": true | false
3845 }
3846 }
3847 }
3848 ```
3849 ### SanitizeOnShutdown (All)
3850 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3851
3852 **Compatibility:** Firefox 60, Firefox ESR 60\
3853 **CCK2 Equivalent:** N/A\
3854 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3855 #### Windows (GPO)
3856 ```
3857 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3858 ```
3859 #### Windows (Intune)
3860 OMA-URI:
3861 ```
3862 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3863 ```
3864 Value (string):
3865 ```
3866 <enabled/> or <disabled/>
3867 ```
3868 #### macOS
3869 ```
3870 <dict>
3871 <key>SanitizeOnShutdown</key>
3872 <true/> | <false/>
3873 </dict>
3874 ```
3875 #### policies.json
3876 ```
3877 {
3878 "policies": {
3879 "SanitizeOnShutdown": true | false
3880 }
3881 }
3882 ```
3883 ### SearchBar
3884 Set whether or not search bar is displayed.
3885
3886 **Compatibility:** Firefox 60, Firefox ESR 60\
3887 **CCK2 Equivalent:** `showSearchBar`\
3888 **Preferences Affected:** N/A
3889
3890 #### Windows (GPO)
3891 ```
3892 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3893 ```
3894
3895 #### Windows (Intune)
3896 OMA-URI:
3897 ```
3898 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3899 ```
3900 Value (string):
3901 ```
3902 <enabled/>
3903 <data id="Permissions" value="unified | separate"/>
3904 #### macOS
3905 ```
3906 <dict>
3907 <key>SearchBar</key>
3908 <string>unified | separate</string>
3909 </dict>
3910 ```
3911 #### policies.json
3912 ```
3913 {
3914 "policies": {
3915 "SearchBar": "unified" | "separate"
3916 }
3917 }
3918 ```
3919 <a name="SearchEngines"></a>
3920
3921 ### SearchEngines (This policy is only available on the ESR.)
3922
3923 ### SearchEngines | Default
3924
3925 Set the default search engine. This policy is only available on the ESR.
3926
3927 **Compatibility:** Firefox ESR 60\
3928 **CCK2 Equivalent:** `defaultSearchEngine`\
3929 **Preferences Affected:** N/A
3930
3931 #### Windows (GPO)
3932 ```
3933 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3934 ```
3935 #### Windows (Intune)
3936 OMA-URI:
3937 ```
3938 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3939 ```
3940 Value (string):
3941 ```
3942 <enabled/>
3943 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3944 ```
3945 #### macOS
3946 ```
3947 <dict>
3948 <key>SearchEngines</key>
3949 <dict>
3950 <key>Default</key>
3951 <string>NAME_OF_SEARCH_ENGINE</string>
3952 </dict>
3953 </dict>
3954 ```
3955 #### policies.json
3956 ```
3957 {
3958 "policies": {
3959 "SearchEngines": {
3960 "Default": "NAME_OF_SEARCH_ENGINE"
3961 }
3962 }
3963 }
3964 ```
3965 ### SearchEngines | PreventInstalls
3966
3967 Prevent installing search engines from webpages.
3968
3969 **Compatibility:** Firefox ESR 60\
3970 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3971 **Preferences Affected:** N/A
3972
3973 #### Windows (GPO)
3974 ```
3975 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3976 ```
3977 #### Windows (Intune)
3978 OMA-URI:
3979 ```
3980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3981 ```
3982 Value (string):
3983 ```
3984 <enabled/> or <disabled/>
3985 ```
3986 #### macOS
3987 ```
3988 <dict>
3989 <key>SearchEngines</key>
3990 <dict>
3991 <key>PreventInstalls</key>
3992 <true/> | <false/>
3993 </dict>
3994 </dict>
3995 ```
3996 #### policies.json
3997 ```
3998 {
3999 "policies": {
4000 "SearchEngines": {
4001 "PreventInstalls": true | false
4002 }
4003 }
4004 }
4005 ```
4006 ### SearchEngines | Remove
4007
4008 Hide built-in search engines. This policy is only available on the ESR.
4009
4010 **Compatibility:** Firefox ESR 60.2\
4011 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4012 **Preferences Affected:** N/A
4013
4014 #### Windows (GPO)
4015 ```
4016 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4017 ```
4018 #### Windows (Intune)
4019 OMA-URI:
4020 ```
4021 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4022 ```
4023 Value (string):
4024 ```
4025 <enabled/>
4026 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4027 ```
4028 #### macOS
4029 ```
4030 <dict>
4031 <key>SearchEngines</key>
4032 <dict>
4033 <key>Remove</key>
4034 <array>
4035 <string>NAME_OF_SEARCH_ENGINE</string>
4036 </array>
4037 </dict>
4038 </dict>
4039 ```
4040 #### policies.json
4041 ```
4042 {
4043 "policies": {
4044 "SearchEngines": {
4045 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4046 }
4047 }
4048 }
4049 ```
4050 ### SearchEngines | Add
4051
4052 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4053
4054 `Name` is the name of the search engine.
4055
4056 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4057
4058 `Method` is either GET or POST
4059
4060 `IconURL` is a URL for the icon to use.
4061
4062 `Alias` is a keyword to use for the engine.
4063
4064 `Description` is a description of the search engine.
4065
4066 `PostData` is the POST data as name value pairs separated by &.
4067
4068 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4069
4070 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4071 **CCK2 Equivalent:** `searchplugins`\
4072 **Preferences Affected:** N/A
4073
4074 #### Windows (GPO)
4075 ```
4076 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4077 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4078 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4079 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4080 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4081 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4082 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4083 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4084 ```
4085 #### Windows (Intune)
4086 OMA-URI:
4087 ```
4088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4089 ```
4090 Value (string):
4091 ```
4092 <enabled/>
4093 <data id="SearchEngine_Name" value="Example1"/>
4094 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4095 <data id="SearchEngine_Method" value="GET | POST"/>
4096 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4097 <data id="SearchEngine_Alias" value="example"/>
4098 <data id="SearchEngine_Description" value="Example Description"/>
4099 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4100 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4101 ```
4102 #### macOS
4103 ```
4104 <dict>
4105 <key>SearchEngines</key>
4106 <dict>
4107 <key>Add</key>
4108 <array>
4109 <dict>
4110 <key>Name</key>
4111 <string>Example1</string>
4112 <key>URLTemplate</key>
4113 <string>https://www.example.org/q={searchTerms}</string>
4114 <key>Method</key>
4115 <string>GET | POST </string>
4116 <key>IconURL</key>
4117 <string>https://www.example.org/favicon.ico</string>
4118 <key>Alias</key>
4119 <string>example</string>
4120 <key>Description</key>
4121 <string>Example Description</string>
4122 <key>SuggestURLTemplate</key>
4123 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4124 <key>PostData</key>
4125 <string>name=value&q={searchTerms}</string>
4126 </dict>
4127 <array>
4128 </dict>
4129 </dict>
4130 ```
4131 #### policies.json
4132 ```
4133 {
4134 "policies": {
4135 "SearchEngines": {
4136 "Add": [
4137 {
4138 "Name": "Example1",
4139 "URLTemplate": "https://www.example.org/q={searchTerms}",
4140 "Method": "GET" | "POST",
4141 "IconURL": "https://www.example.org/favicon.ico",
4142 "Alias": "example",
4143 "Description": "Description",
4144 "PostData": "name=value&q={searchTerms}",
4145 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4146 }
4147 ]
4148 }
4149 }
4150 }
4151 ```
4152 ### SearchSuggestEnabled
4153
4154 Enable search suggestions.
4155
4156 **Compatibility:** Firefox 68, Firefox ESR 68\
4157 **CCK2 Equivalent:** N/A\
4158 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4159
4160 #### Windows (GPO)
4161 ```
4162 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4163 ```
4164 #### Windows (Intune)
4165 OMA-URI:
4166 ```
4167 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4168 ```
4169 Value (string):
4170 ```
4171 <enabled/> or <disabled/>
4172 ```
4173 #### macOS
4174 ```
4175 <dict>
4176 <key>SearchSuggestEnabled</key>
4177 <true/> | <false/>
4178 </dict>
4179 ```
4180 #### policies.json
4181 ```
4182 {
4183 "policies": {
4184 "SearchSuggestEnabled": true | false
4185 }
4186 }
4187 ```
4188 ### SecurityDevices
4189
4190 Install PKCS #11 modules.
4191
4192 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4193 **CCK2 Equivalent:** `certs.devices`\
4194 **Preferences Affected:** N/A
4195
4196 #### Windows (GPO)
4197 ```
4198 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4199 ```
4200 #### Windows (Intune)
4201 OMA-URI:
4202 ```
4203 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4204 ```
4205 Value (string):
4206 ```
4207 <enabled/>
4208 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4209 ```
4210 #### macOS
4211 ```
4212 <dict>
4213 <key>SecurityDevices</key>
4214 <dict>
4215 <key>NAME_OF_DEVICE</key>
4216 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4217 </dict>
4218 </dict>
4219 ```
4220
4221 #### policies.json
4222 ```
4223 {
4224 "policies": {
4225 "SecurityDevices": {
4226 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4227 }
4228 }
4229 }
4230 ```
4231 ### SSLVersionMax
4232
4233 Set and lock the maximum version of TLS.
4234
4235 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4236 **CCK2 Equivalent:** N/A\
4237 **Preferences Affected:** `security.tls.version.max`
4238
4239 #### Windows (GPO)
4240 ```
4241 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4242 ```
4243 #### Windows (Intune)
4244 OMA-URI:
4245 ```
4246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4247 ```
4248 Value (string):
4249 ```
4250 <enabled/>
4251 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4252 ```
4253 #### macOS
4254 ```
4255 <dict>
4256 <key>SSLVersionMax</key>
4257 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4258 </dict>
4259 ```
4260
4261 #### policies.json
4262 ```
4263 {
4264 "policies": {
4265 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4266 }
4267 }
4268 ```
4269 ### SSLVersionMin
4270
4271 Set and lock the minimum version of TLS.
4272
4273 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4274 **CCK2 Equivalent:** N/A\
4275 **Preferences Affected:** `security.tls.version.min`
4276
4277 #### Windows (GPO)
4278 ```
4279 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4280 ```
4281 #### Windows (Intune)
4282 OMA-URI:
4283 ```
4284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4285 ```
4286 Value (string):
4287 ```
4288 <enabled/>
4289 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4290 ```
4291 #### macOS
4292 ```
4293 <dict>
4294 <key>SSLVersionMin</key>
4295 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4296 </dict>
4297 ```
4298
4299 #### policies.json
4300 ```
4301 {
4302 "policies": {
4303 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4304 }
4305 }
4306 ```
4307 ### SupportMenu
4308 Add a menuitem to the help menu for specifying support information.
4309
4310 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4311 **CCK2 Equivalent:** helpMenu\
4312 **Preferences Affected:** N/A
4313
4314 #### Windows (GPO)
4315 ```
4316 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4317 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4318 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4319 ```
4320 #### Windows (Intune)
4321 OMA-URI:
4322 ```
4323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4324 ```
4325 Value (string):
4326 ```
4327 <enabled/>
4328 <data id="SupportMenuTitle" value="Support Menu"/>
4329 <data id="SupportMenuURL" value="http://example.com/support"/>
4330 <data id="SupportMenuAccessKey" value="S">
4331 ```
4332 #### macOS
4333 ```
4334 <dict>
4335 <key>SupportMenu</key>
4336 <dict>
4337 <key>Title</key>
4338 <string>SupportMenu</string>
4339 <key>URL</key>
4340 <string>http://example.com/support</string>
4341 <key>AccessKey</key>
4342 <string>S</string>
4343 </dict>
4344 </dict>
4345 ```
4346 #### policies.json
4347 ```
4348 {
4349 "policies": {
4350 "SupportMenu": {
4351 "Title": "Support Menu",
4352 "URL": "http://example.com/support",
4353 "AccessKey": "S"
4354 }
4355 }
4356 }
4357 ```
4358 ### UserMessaging
4359
4360 Prevent installing search engines from webpages.
4361
4362 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4363
4364 `ExtensionRecommendations` Don't recommend extensions.
4365
4366 `FeatureRecommendations` Don't recommend browser features.
4367
4368 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4369
4370 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4371 **CCK2 Equivalent:** N/A\
4372 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4373
4374 #### Windows (GPO)
4375 ```
4376 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4377 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4378 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4379 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4380 ```
4381 #### Windows (Intune)
4382 OMA-URI:
4383 ```
4384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4385 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4388 ```
4389 Value (string):
4390 ```
4391 <enabled/> or <disabled/>
4392 ```
4393 #### macOS
4394 ```
4395 <dict>
4396 <key>UserMessaging</key>
4397 <dict>
4398 <key>WhatsNew</key>
4399 <true/> | <false/>
4400 <key>ExtensionRecommendations</key>
4401 <true/> | <false/>
4402 <key>FeatureRecommendations</key>
4403 <true/> | <false/>
4404 <key>UrlbarInterventions</key>
4405 <true/> | <false/>
4406 </dict>
4407 </dict>
4408 ```
4409 #### policies.json
4410 ```
4411 {
4412 "policies": {
4413 "UserMessaging": {
4414 "WhatsNew": true | false,
4415 "ExtensionRecommendations": true | false,
4416 "FeatureRecommendations": true | false,
4417 "UrlbarInterventions": true | false
4418 }
4419 }
4420 }
4421 ```
4422 ### WebsiteFilter
4423 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4424
4425 **Compatibility:** Firefox 60, Firefox ESR 60\
4426 **CCK2 Equivalent:** N/A\
4427 **Preferences Affected:** N/A
4428
4429 #### Windows (GPO)
4430 ```
4431 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4432 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4433 ```
4434 #### Windows (Intune)
4435 OMA-URI:
4436 ```
4437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4438 ```
4439 Value (string):
4440 ```
4441 <enabled/>
4442 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4443 ```
4444 OMA-URI:
4445 ```
4446 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4447 ```
4448 Value (string):
4449 ```
4450 <enabled/>
4451 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4452 ```
4453 #### macOS
4454 ```
4455 <dict>
4456 <key>WebsiteFilter</key>
4457 <dict>
4458 <key>Block</key>
4459 <array>
4460 <string><all_urls></string>
4461 </array>
4462 <key>Exceptions</key>
4463 <array>
4464 <string>http://example.org/*</string>
4465 </array>
4466 </dict>
4467
4468 </dict>
4469 ```
4470 #### policies.json
4471 ```
4472 {
4473 "policies": {
4474 "WebsiteFilter": {
4475 "Block": ["<all_urls>"],
4476 "Exceptions": ["http://example.org/*"]
4477 }
4478 }
4479 }
4480 ```

patrick-canterino.de