]> git.p6c8.net - policy-templates.git/blob - README.md
c95e8f8820c84ef32d5eee868221439e4036aca9
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
36 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
37 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
53 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
54 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
55 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
56 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
57 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
58 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
59 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
60 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
61 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
62 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
63 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
64 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
65 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
66 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
67 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
68 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
69 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
70 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
71 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
72 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
73 | **[`Preferences`](#preferences)** | Set and lock some preferences.
74 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
75 | **[`Proxy`](#proxy)** | Configure proxy settings.
76 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
77 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
78 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
79 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
80 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
81 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
82 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
83 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
84 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
85 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
86 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
87 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
88 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
89 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
90 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
91 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
92
93 ### AppAutoUpdate
94
95 Enable or disable **automatic** application update.
96
97 If set to true, application updates are installed without user approval.
98
99 If set to false, application updates are downloaded but the user can choose when to install the update.
100
101 If you have disabled updates via DisableAppUpdate, this policy has no effect.
102
103 **Compatibility:** Firefox 75, Firefox ESR 68.7\
104 **CCK2 Equivalent:** N/A\
105 **Preferences Affected:** app.update.auto
106
107 #### Windows (GPO)
108 ```
109 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
110 ```
111 #### Windows (Intune)
112 OMA-URI:
113 ```
114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
115 ```
116 Value (string):
117 ```
118 <enabled/> or <disabled/>
119 ```
120 #### macOS
121 ```
122 <dict>
123 <key>AppAutoUpdate</key>
124 <true/> | <false/>
125 </dict>
126 ```
127 #### policies.json
128 ```
129 {
130 "policies": {
131 "AppAutoUpdate": true | false
132 }
133 }
134 ```
135 ### AppUpdateURL
136
137 Change the URL for application update.
138
139 **Compatibility:** Firefox 62, Firefox ESR 60.2\
140 **CCK2 Equivalent:** N/A\
141 **Preferences Affected:** `app.update.url`
142
143 #### Windows (GPO)
144 ```
145 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
146 ```
147 #### Windows (Intune)
148 OMA-URI:
149 ```
150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
151 ```
152 Value (string):
153 ```
154 <enabled/>
155 <data id="AppUpdateURL" value="https://yoursite.com"/>
156 ```
157 #### macOS
158 ```
159 <dict>
160 <key>AppUpdateURL</key>
161 <string>https://yoursite.com</string>
162 </dict>
163 ```
164 #### policies.json
165 ```
166 {
167 "policies": {
168 "AppUpdateURL": "https://yoursite.com"
169 }
170 }
171 ```
172 ### Authentication
173
174 Configure sites that support integrated authentication.
175
176 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
177
178 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
179 **CCK2 Equivalent:** N/A\
180 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
181
182 #### Windows (GPO)
183 ```
184 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
185 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
186 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
191 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
192 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
194 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
195 ```
196 #### Windows (Intune)
197 OMA-URI:
198 ```
199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
200 ```
201 Value (string):
202 ```
203 <enabled/>
204
205 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
206 ```
207 OMA-URI:
208 ```
209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
210 ```
211 Value (string):
212 ```
213 <enabled/>
214
215 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
216 ```
217 OMA-URI:
218 ```
219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
220 ```
221 Value (string):
222 ```
223 <enabled/>
224
225 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
226 ```
227 OMA-URI:
228 ```
229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
230 ```
231 Value (string):
232 ```
233 <enabled/>
234
235 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
236 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
237 ```
238 OMA-URI:
239 ```
240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
241 ```
242 Value (string):
243 ```
244 <enabled/>
245
246 <data id="StartPage" value="none | homepage | previous-session"/>
247 ```
248 #### macOS
249 ```
250 <dict>
251 <key>Authentication</key>
252 <dict>
253 <key>SPNEGO</key>
254 <array>
255 <string>mydomain.com</string>
256 <string>https://myotherdomain.com</string>
257 </array>
258 <key>Delegated</key>
259 <array>
260 <string>mydomain.com</string>
261 <string>https://myotherdomain.com</string>
262 </array>
263 <key>NTLM</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>AllowNonFQDN</key>
269 <dict>
270 <key>SPNEGO</key>
271 <true/> | <false/>
272 <key>NTLM</key>
273 <true/> | <false/>
274 </dict>
275 <key>AllowProxies</key>
276 <dict>
277 <key>SPNEGO</key>
278 <true/> | <false/>
279 <key>NTLM</key>
280 <true/> | <false/>
281 </dict>
282 <key>Locked</key>
283 <true/> | <false/>
284 </dict>
285 </dict>
286 ```
287 #### policies.json
288 ```
289 {
290 "policies": {
291 "Authentication": {
292 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
293 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
294 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
295 "AllowNonFQDN": {
296 "SPNEGO": true | false,
297 "NTLM": true | false
298 },
299 "AllowProxies": {
300 "SPNEGO": true | false,
301 "NTLM": true | false
302 },
303 "Locked": true | false
304 }
305 }
306 }
307 ```
308 ### BlockAboutAddons
309
310 Block access to the Add-ons Manager (about:addons).
311
312 **Compatibility:** Firefox 60, Firefox ESR 60\
313 **CCK2 Equivalent:** `disableAddonsManager`\
314 **Preferences Affected:** N/A
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
319 ```
320 #### Windows (Intune)
321 OMA-URI:
322 ```
323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
324 ```
325 Value (string):
326 ```
327 <enabled/> or <disabled/>
328 ```
329 #### macOS
330 ```
331 <dict>
332 <key>BlockAboutAddons</key>
333 <true/> | <false/>
334 </dict>
335 ```
336 #### policies.json
337 ```
338 {
339 "policies": {
340 "BlockAboutAddons": true | false
341 }
342 }
343 ```
344 ### BlockAboutConfig
345
346 Block access to about:config.
347
348 **Compatibility:** Firefox 60, Firefox ESR 60\
349 **CCK2 Equivalent:** `disableAboutConfig`\
350 **Preferences Affected:** N/A
351
352 #### Windows (GPO)
353 ```
354 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
355 ```
356 #### Windows (Intune)
357 OMA-URI:
358 ```
359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
360 ```
361 Value (string):
362 ```
363 <enabled/> or <disabled/>
364 ```
365 #### macOS
366 ```
367 <dict>
368 <key>BlockAboutConfig</key>
369 <true/> | <false/>
370 </dict>
371 ```
372 #### policies.json
373 ```
374 {
375 "policies": {
376 "BlockAboutConfig": true | false
377 }
378 }
379 ```
380 ### BlockAboutProfiles
381
382 Block access to About Profiles (about:profiles).
383
384 **Compatibility:** Firefox 60, Firefox ESR 60\
385 **CCK2 Equivalent:** `disableAboutProfiles`\
386 **Preferences Affected:** N/A
387
388 #### Windows (GPO)
389 ```
390 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
391 ```
392 #### Windows (Intune)
393 OMA-URI:
394 ```
395 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
396 ```
397 Value (string):
398 ```
399 <enabled/> or <disabled/>
400 ```
401 #### macOS
402 ```
403 <dict>
404 <key>BlockAboutProfiles</key>
405 <true/> | <false/>
406 </dict>
407 ```
408 #### policies.json
409 ```
410 {
411 "policies": {
412 "BlockAboutProfiles": true | false
413 }
414 }
415 ```
416 ### BlockAboutSupport
417
418 Block access to Troubleshooting Information (about:support).
419
420 **Compatibility:** Firefox 60, Firefox ESR 60\
421 **CCK2 Equivalent:** `disableAboutSupport`\
422 **Preferences Affected:** N/A
423
424 #### Windows (GPO)
425 ```
426 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
427 ```
428 #### Windows (Intune)
429 OMA-URI:
430 ```
431 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
432 ```
433 Value (string):
434 ```
435 <enabled/> or <disabled/>
436 ```
437 #### macOS
438 ```
439 <dict>
440 <key>BlockAboutSupport</key>
441 <true/> | <false/>
442 </dict>
443 ```
444 #### policies.json
445 ```
446 {
447 "policies": {
448 "BlockAboutSupport": true | false
449 }
450 }
451 ```
452 ### Bookmarks
453
454 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
455
456 **Compatibility:** Firefox 60, Firefox ESR 60\
457 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
458 **Preferences Affected:** N/A
459
460 #### Windows (GPO)
461 ```
462 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
463 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
464 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
465 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
466 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
467 ```
468 #### Windows (Intune)
469 OMA-URI:
470 ```
471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
472 ```
473 Value (string):
474 ```
475 <enabled/>
476 <data id="BookmarkTitle" value="Example"/>
477 <data id="BookmarkURL" value="https://example.com"/>
478 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
479 <data id="BookmarkPlacement" value="toolbar | menu"/>
480 <data id="BookmarkFolder" value="FolderName"/>
481 ```
482 #### macOS
483 ```
484 <dict>
485 <key>Bookmarks</key>
486 <array>
487 <dict>
488 <key>Title</key>
489 <string>Example</string>
490 <key>URL</key>
491 <string>https://example.com</string>
492 <key>Favicon</key>
493 <string>https://example.com/favicon.ico</string>
494 <key>Placement</key>
495 <string>toolbar | menu</string>
496 <key>Folder</key>
497 <string>FolderName</string>
498 </dict>
499 </array>
500 </dict>
501 ```
502 #### policies.json
503 ```
504 {
505 "policies": {
506 "Bookmarks": [
507 {
508 "Title": "Example",
509 "URL": "https://example.com",
510 "Favicon": "https://example.com/favicon.ico",
511 "Placement": "toolbar" | "menu",
512 "Folder": "FolderName"
513 }
514 ]
515 }
516 }
517 ```
518 ### CaptivePortal
519 Enable or disable the detection of captive portals.
520
521 **Compatibility:** Firefox 67, Firefox ESR 60.7\
522 **CCK2 Equivalent:** N/A\
523 **Preferences Affected:** `network.captive-portal-service.enabled`
524
525 #### Windows (GPO)
526 ```
527 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
528 ```
529 #### Windows (Intune)
530 OMA-URI:
531 ```
532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
533 ```
534 Value (string):
535 ```
536 <enabled/> or <disabled/>
537 ```
538 #### macOS
539 ```
540 <dict>
541 <key>CaptivePortal</key>
542 <true/> | <false/>
543 </dict>
544 ```
545 #### policies.json
546 ```
547 {
548 "policies": {
549 "CaptivePortal": true | false
550 }
551 }
552 ```
553 ### Certificates
554
555 ### Certificates | ImportEnterpriseRoots
556
557 Trust certificates that have been added to the operating system certificate store by a user or administrator.
558
559 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
560
561 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
562 **CCK2 Equivalent:** N/A\
563 **Preferences Affected:** `security.enterprise_roots.enabled`
564
565 #### Windows (GPO)
566 ```
567 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
568 ```
569 #### Windows (Intune)
570 OMA-URI:
571 ```
572 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
573 ```
574 Value (string):
575 ```
576 <enabled/> or <disabled/>
577 ```
578 #### macOS
579 ```
580 <dict>
581 <key>Certificates</key>
582 <dict>
583 <key>ImportEnterpriseRoots</key>
584 <true/> | <false/>
585 </dict>
586 </dict>
587 ```
588 #### policies.json
589 ```
590 {
591 "policies": {
592 "Certificates": {
593 "ImportEnterpriseRoots": true | false
594 }
595 }
596 }
597 ```
598 ### Certificates | Install
599
600 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
601
602 - Windows
603 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
604 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
605 - macOS
606 - /Library/Application Support/Mozilla/Certificates
607 - ~/Library/Application Support/Mozilla/Certificates
608 - Linux
609 - /usr/lib/mozilla/certificates
610 - /usr/lib64/mozilla/certificates
611 - ~/.mozilla/certificates
612
613 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
614
615 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
616
617 Certificates are installed using the trust string `CT,CT,`.
618
619 Binary (DER) and ASCII (PEM) certificates are both supported.
620
621 **Compatibility:** Firefox 64, Firefox ESR 64\
622 **CCK2 Equivalent:** `certs.ca`\
623 **Preferences Affected:** N/A
624
625 #### Windows (GPO)
626 ```
627 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
628 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
629 ```
630 #### Windows (Intune)
631 OMA-URI:
632 ```
633 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
634 ```
635 Value (string):
636 ```
637 <enabled/>
638 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
639 ```
640 #### macOS
641 ```
642 <dict>
643 <key>Certificates</key>
644 <dict>
645 <key>Install</key>
646 <array>
647 <string>cert1.der</string>
648 <string>/Users/username/cert2.pem</string>
649 </array>
650 </dict>
651 </dict>
652 ```
653 #### policies.json
654 ```
655 {
656 "policies": {
657 "Certificates": {
658 "Install": ["cert1.der", "/home/username/cert2.pem"]
659 }
660 }
661 }
662 ```
663 ### Cookies
664 Configure cookie preferences.
665
666 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
667
668 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
669
670 `Default` determines whether cookies are accepted at all.
671
672 `AcceptThirdParty` determines how third-party cookies are handled.
673
674 `ExpireAtSessionEnd` determines when cookies expire.
675
676 `RejectTracker` only rejects cookies for trackers.
677
678 `Locked` prevents the user from changing cookie preferences.
679
680 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
681 **CCK2 Equivalent:** N/A\
682 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
683
684 #### Windows (GPO)
685 ```
686 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
687 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
688 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
689 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
690 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
691 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
692 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
693 ```
694 #### Windows (Intune)
695 OMA-URI:
696 ```
697 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
698 ```
699 Value (string):
700 ```
701 <enabled/>
702 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
703 ```
704 OMA-URI:
705 ```
706 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
707 ```
708 Value (string):
709 ```
710 <enabled/>
711 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
712 ```
713 OMA-URI:
714 ```
715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
716 ```
717 Value (string):
718 ```
719 <enabled/> or <disabled/>
720 ```
721 OMA-URI:
722 ```
723 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
724 ```
725 Value (string):
726 ```
727 <enabled/>
728 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
729 ```
730 OMA-URI:
731 ```
732 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
733 ```
734 Value (string):
735 ```
736 <enabled/> or <disabled/>
737 ```
738 OMA-URI:
739 ```
740 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
741 ```
742 Value (string):
743 ```
744 <enabled/> or <disabled/>
745 ```
746 OMA-URI:
747 ```
748 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
749 ```
750 Value (string):
751 ```
752 <enabled/> or <disabled/>
753 ```
754 #### macOS
755 ```
756 <dict>
757 <key>Cookies</key>
758 <dict>
759 <key>Allow</key>
760 <array>
761 <string>http://example.com</string>
762 </array>
763 <key>Block</key>
764 <array>
765 <string>http://example.org</string>
766 </array>
767 <key>Default</key>
768 <true/> | <false/>
769 <key>AcceptThirdParty</key>
770 <string>always | never | from-visited</string>
771 <key>ExpireAtSessionEnd</key>
772 <true/> | <false/>
773 <key>RejectTracker</key>
774 <true/> | <false/>
775 <key>Locked</key>
776 <true/> | <false/>
777 </dict>
778 </dict>
779 ```
780 #### policies.json
781 ```
782 {
783 "policies": {
784 "Cookies": {
785 "Allow": ["http://example.org/"],
786 "Block": ["http://example.edu/"],
787 "Default": true | false,
788 "AcceptThirdParty": "always" | "never" | "from-visited",
789 "ExpireAtSessionEnd": true | false,
790 "RejectTracker": true | false,
791 "Locked": true | false
792 }
793 }
794 }
795 ```
796 ### DisableSetDesktopBackground
797 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
798
799 **Compatibility:** Firefox 60, Firefox ESR 60\
800 **CCK2 Equivalent:** `removeSetDesktopBackground`\
801 **Preferences Affected:** N/A
802
803 #### Windows (GPO)
804 ```
805 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
806 ```
807 #### Windows (Intune)
808 OMA-URI:
809 ```
810 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
811 ```
812 Value (string):
813 ```
814 <enabled/> or <disabled/>
815 ```
816 #### macOS
817 ```
818 <dict>
819 <key>DisableSetDesktopBackground</key>
820 <true/> | <false/>
821 </dict>
822 ```
823 #### policies.json
824 ```
825 {
826 "policies": {
827 "DisableSetDesktopBackground": true | false
828 }
829 }
830 ```
831 ### DisableMasterPasswordCreation
832 Remove the master password functionality.
833
834 **Compatibility:** Firefox 60, Firefox ESR 60\
835 **CCK2 Equivalent:** `noMasterPassword`\
836 **Preferences Affected:** N/A
837
838 #### Windows (GPO)
839 ```
840 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
841 ```
842 #### Windows (Intune)
843 OMA-URI:
844 ```
845 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
846 ```
847 Value (string):
848 ```
849 <enabled/> or <disabled/>
850 ```
851 #### macOS
852 ```
853 <dict>
854 <key>DisableMasterPasswordCreation</key>
855 <true/> | <false/>
856 </dict>
857 ```
858 #### policies.json
859 ```
860 {
861 "policies": {
862 "DisableMasterPasswordCreation": true | false
863 }
864 }
865 ```
866 ### DisableAppUpdate
867 Turn off application updates.
868
869 **Compatibility:** Firefox 60, Firefox ESR 60\
870 **CCK2 Equivalent:** `disableFirefoxUpdates`\
871 **Preferences Affected:** N/A
872
873 #### Windows (GPO)
874 ```
875 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
876 ```
877 #### Windows (Intune)
878 OMA-URI:
879 ```
880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
881 ```
882 Value (string):
883 ```
884 <enabled/> or <disabled/>
885 ```
886 #### macOS
887 ```
888 <dict>
889 <key>DisableAppUpdate</key>
890 <true/> | <false/>
891 </dict>
892 ```
893 #### policies.json
894 ```
895 {
896 "policies": {
897 "DisableAppUpdate": true | false
898 }
899 }
900 ```
901 ### DisableBuiltinPDFViewer
902 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
903
904 **Compatibility:** Firefox 60, Firefox ESR 60\
905 **CCK2 Equivalent:** `disablePDFjs`\
906 **Preferences Affected:** `pdfjs.disabled`
907
908 #### Windows (GPO)
909 ```
910 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
911 ```
912 #### Windows (Intune)
913 OMA-URI:
914 ```
915 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
916 ```
917 Value (string):
918 ```
919 <enabled/> or <disabled/>
920 ```
921 #### macOS
922 ```
923 <dict>
924 <key>DisableBuiltinPDFViewer</key>
925 <true/> | <false/>
926 </dict>
927 ```
928 #### policies.json
929 ```
930 {
931 "policies": {
932 "DisableBuiltinPDFViewer": true | false
933 }
934 }
935 ```
936 ### DisabledCiphers
937 Disable specific cryptographic ciphers.
938
939 **Compatibility:** Firefox 76, Firefox ESR 68.8\
940 **CCK2 Equivalent:** N/A\
941 **Preferences Affected:** N/A
942
943 #### Windows (GPO)
944 ```
945 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
946 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
947 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
948 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
949 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
950 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
951 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
952 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
953 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
954 ```
955 #### macOS
956 ```
957 <dict>
958 <key>DisabledCiphers</key>
959 <dict>
960 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
961 <true/> | <false/>
962 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
963 <true/> | <false/>
964 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
965 <true/> | <false/>
966 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
967 <true/> | <false/>
968 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
969 <true/> | <false/>
970 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
971 <true/> | <false/>
972 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
973 <true/> | <false/>
974 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
975 <true/> | <false/>
976 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
977 <true/> | <false/>
978 </dict>
979 </dict>
980 ```
981 #### policies.json
982 ```
983 {
984 "policies": {
985 "DisabledCiphers" {
986 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
987 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
988 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
989 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
990 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
991 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
992 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
993 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
994 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
995 }
996 }
997 }
998 ```
999 ### DisableDefaultBrowserAgent
1000 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1001
1002 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1003 **CCK2 Equivalent:** N/A\
1004 **Preferences Affected:** N/A
1005
1006 #### Windows (GPO)
1007 ```
1008 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1009 ```
1010 #### Windows (Intune)
1011 OMA-URI:
1012 ```
1013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1014 ```
1015 Value (string):
1016 ```
1017 <enabled/> or <disabled/>
1018 ```
1019 #### policies.json
1020 ```
1021 {
1022 "policies": {
1023 "DisableDefaultBrowserAgent": true | false
1024 }
1025 }
1026 ```
1027 ### DisableDeveloperTools
1028 Remove access to all developer tools.
1029
1030 **Compatibility:** Firefox 60, Firefox ESR 60\
1031 **CCK2 Equivalent:** `removeDeveloperTools`\
1032 **Preferences Affected:** `devtools.policy.disabled`
1033
1034 #### Windows (GPO)
1035 ```
1036 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1037 ```
1038 #### Windows (Intune)
1039 OMA-URI:
1040 ```
1041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1042 ```
1043 Value (string):
1044 ```
1045 <enabled/> or <disabled/>
1046 ```
1047 #### macOS
1048 ```
1049 <dict>
1050 <key>DisableDeveloperTools</key>
1051 <true/> | <false/>
1052 </dict>
1053 ```
1054 #### policies.json
1055 ```
1056 {
1057 "policies": {
1058 "DisableDeveloperTools": true | false
1059 }
1060 }
1061 ```
1062 ### DisableFeedbackCommands
1063 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1064
1065 **Compatibility:** Firefox 60, Firefox ESR 60\
1066 **CCK2 Equivalent:** N/A\
1067 **Preferences Affected:** N/A
1068
1069 #### Windows (GPO)
1070 ```
1071 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1072 ```
1073 #### Windows (Intune)
1074 OMA-URI:
1075 ```
1076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1077 ```
1078 Value (string):
1079 ```
1080 <enabled/> or <disabled/>
1081 ```
1082 #### macOS
1083 ```
1084 <dict>
1085 <key>DisableFeedbackCommands</key>
1086 <true/> | <false/>
1087 </dict>
1088 ```
1089 #### policies.json
1090 ```
1091 {
1092 "policies": {
1093 "DisableFeedbackCommands": true | false
1094 }
1095 }
1096 ```
1097 ### DisableFirefoxScreenshots
1098 Remove access to Firefox Screenshots.
1099
1100 **Compatibility:** Firefox 60, Firefox ESR 60\
1101 **CCK2 Equivalent:** N/A\
1102 **Preferences Affected:** `extensions.screenshots.disabled`
1103
1104 #### Windows (GPO)
1105 ```
1106 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1107 ```
1108 #### Windows (Intune)
1109 OMA-URI:
1110 ```
1111 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1112 ```
1113 Value (string):
1114 ```
1115 <enabled/> or <disabled/>
1116 ```
1117 #### macOS
1118 ```
1119 <dict>
1120 <key>DisableFirefoxScreenshots</key>
1121 <true/> | <false/>
1122 </dict>
1123 ```
1124 #### policies.json
1125 ```
1126 {
1127 "policies": {
1128 "DisableFirefoxScreenshots": true | false
1129 }
1130 }
1131 ```
1132 ### DisableFirefoxAccounts
1133 Disable Firefox Accounts integration (Sync).
1134
1135 **Compatibility:** Firefox 60, Firefox ESR 60\
1136 **CCK2 Equivalent:** `disableSync`\
1137 **Preferences Affected:** `identity.fxaccounts.enabled`
1138
1139 #### Windows (GPO)
1140 ```
1141 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1142 ```
1143 #### Windows (Intune)
1144 OMA-URI:
1145 ```
1146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1147 ```
1148 Value (string):
1149 ```
1150 <enabled/> or <disabled/>
1151 ```
1152 #### macOS
1153 ```
1154 <dict>
1155 <key>DisableFirefoxAccounts</key>
1156 <true/> | <false/>
1157 </dict>
1158 ```
1159 #### policies.json
1160 ```
1161 {
1162 "policies": {
1163 "DisableFirefoxAccounts": true | false
1164 }
1165 }
1166 ```
1167 ### DisableFirefoxStudies
1168 Disable Firefox studies (Shield).
1169
1170 **Compatibility:** Firefox 60, Firefox ESR 60\
1171 **CCK2 Equivalent:** N/A\
1172 **Preferences Affected:** N/A
1173
1174 #### Windows (GPO)
1175 ```
1176 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1177 ```
1178 #### Windows (Intune)
1179 OMA-URI:
1180 ```
1181 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1182 ```
1183 Value (string):
1184 ```
1185 <enabled/> or <disabled/>
1186 ```
1187 #### macOS
1188 ```
1189 <dict>
1190 <key>DisableFirefoxStudies</key>
1191 <true/> | <false/>
1192 </dict>
1193 ```
1194 #### policies.json
1195 ```
1196 {
1197 "policies": {
1198 "DisableFirefoxStudies": true | false
1199 }
1200 }
1201 ```
1202 ### DisableForgetButton
1203 Disable the "Forget" button.
1204
1205 **Compatibility:** Firefox 60, Firefox ESR 60\
1206 **CCK2 Equivalent:** `disableForget`\
1207 **Preferences Affected:** N/A
1208
1209 #### Windows (GPO)
1210 ```
1211 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1212 ```
1213 #### Windows (Intune)
1214 OMA-URI:
1215 ```
1216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1217 ```
1218 Value (string):
1219 ```
1220 <enabled/> or <disabled/>
1221 ```
1222 #### macOS
1223 ```
1224 <dict>
1225 <key>DisableForgetButton</key>
1226 <true/> | <false/>
1227 </dict>
1228 ```
1229 #### policies.json
1230 ```
1231 {
1232 "policies": {
1233 "DisableForgetButton": true | false
1234 }
1235 }
1236 ```
1237 ### DisableFormHistory
1238 Turn off saving information on web forms and the search bar.
1239
1240 **Compatibility:** Firefox 60, Firefox ESR 60\
1241 **CCK2 Equivalent:** `disableFormFill`\
1242 **Preferences Affected:** ` browser.formfill.enable`
1243
1244 #### Windows (GPO)
1245 ```
1246 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1247 ```
1248 #### Windows (Intune)
1249 OMA-URI:
1250 ```
1251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1252 ```
1253 Value (string):
1254 ```
1255 <enabled/> or <disabled/>
1256 ```
1257 #### macOS
1258 ```
1259 <dict>
1260 <key>DisableFormHistory</key>
1261 <true/> | <false/>
1262 </dict>
1263 ```
1264 #### policies.json
1265 ```
1266 {
1267 "policies": {
1268 "DisableFormHistory": true | false
1269 }
1270 }
1271 ```
1272 ### DisablePasswordReveal
1273 Do not allow passwords to be shown in saved logins
1274
1275 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1276 **CCK2 Equivalent:** N/A
1277 **Preferences Affected:** N/A
1278
1279 #### Windows (GPO)
1280 ```
1281 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1282 ```
1283 #### Windows (Intune)
1284 OMA-URI:
1285 ```
1286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1287 ```
1288 Value (string):
1289 ```
1290 <enabled/> or <disabled/>
1291 ```
1292 #### macOS
1293 ```
1294 <dict>
1295 <key>DisablePasswordReveal</key>
1296 <true/> | <false/>
1297 </dict>
1298 ```
1299 #### policies.json
1300 ```
1301 {
1302 "policies": {
1303 "DisablePasswordReveal": true | false
1304 }
1305 }
1306 ```
1307 ### DisablePocket
1308 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1309
1310 **Compatibility:** Firefox 60, Firefox ESR 60\
1311 **CCK2 Equivalent:** `disablePocket`\
1312 **Preferences Affected:** `extensions.pocket.enabled`
1313
1314 #### Windows (GPO)
1315 ```
1316 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1317 ```
1318 #### Windows (Intune)
1319 OMA-URI:
1320 ```
1321 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1322 ```
1323 Value (string):
1324 ```
1325 <enabled/> or <disabled/>
1326 ```
1327 #### macOS
1328 ```
1329 <dict>
1330 <key>DisablePocket</key>
1331 <true/> | <false/>
1332 </dict>
1333 ```
1334 #### policies.json
1335 ```
1336 {
1337 "policies": {
1338 "DisablePocket": true | false
1339 }
1340 }
1341 ```
1342 ### DisablePrivateBrowsing
1343 Remove access to private browsing.
1344
1345 **Compatibility:** Firefox 60, Firefox ESR 60\
1346 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1347 **Preferences Affected:** N/A
1348
1349 #### Windows (GPO)
1350 ```
1351 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1352 ```
1353 #### Windows (Intune)
1354 OMA-URI:
1355 ```
1356 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1357 ```
1358 Value (string):
1359 ```
1360 <enabled/> or <disabled/>
1361 ```
1362 #### macOS
1363 ```
1364 <dict>
1365 <key>DisablePrivateBrowsing</key>
1366 <true/> | <false/>
1367 </dict>
1368 ```
1369 #### policies.json
1370 ```
1371 {
1372 "policies": {
1373 "DisablePrivateBrowsing": true | false
1374 }
1375 }
1376 ```
1377 ### DisableProfileImport
1378 Disables the "Import data from another browser" option in the bookmarks window.
1379
1380 **Compatibility:** Firefox 60, Firefox ESR 60\
1381 **CCK2 Equivalent:** N/A\
1382 **Preferences Affected:** N/A
1383
1384 #### Windows (GPO)
1385 ```
1386 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1387 ```
1388 #### Windows (Intune)
1389 OMA-URI:
1390 ```
1391 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1392 ```
1393 Value (string):
1394 ```
1395 <enabled/> or <disabled/>
1396 ```
1397 #### macOS
1398 ```
1399 <dict>
1400 <key>DisableProfileImport</key>
1401 <true/> | <false/>
1402 </dict>
1403 ```
1404 #### policies.json
1405 ```
1406 {
1407 "policies": {
1408 "DisableProfileImport": true | false
1409 }
1410 }
1411 ```
1412 ### DisableProfileRefresh
1413 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1414
1415 **Compatibility:** Firefox 60, Firefox ESR 60\
1416 **CCK2 Equivalent:** `disableResetFirefox`\
1417 **Preferences Affected:** `browser.disableResetPrompt`
1418
1419 #### Windows (GPO)
1420 ```
1421 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1422 ```
1423 #### Windows (Intune)
1424 OMA-URI:
1425 ```
1426 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1427 ```
1428 Value (string):
1429 ```
1430 <enabled/> or <disabled/>
1431 ```
1432 #### macOS
1433 ```
1434 <dict>
1435 <key>DisableProfileRefresh</key>
1436 <true/> | <false/>
1437 </dict>
1438 ```
1439 #### policies.json
1440 ```
1441 {
1442 "policies": {
1443 "DisableProfileRefresh": true | false
1444 }
1445 }
1446 ```
1447 ### DisableSafeMode
1448 Disable safe mode within the browser.
1449
1450 On Windows, this disables safe mode via the command line as well.
1451
1452 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1453 **CCK2 Equivalent:** `disableSafeMode`\
1454 **Preferences Affected:** N/A
1455
1456 #### Windows (GPO)
1457 ```
1458 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1459 ```
1460 #### Windows (Intune)
1461 OMA-URI:
1462 ```
1463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1464 ```
1465 Value (string):
1466 ```
1467 <enabled/> or <disabled/>
1468 ```
1469 #### macOS
1470 ```
1471 <dict>
1472 <key>DisableSafeMode</key>
1473 <true/> | <false/>
1474 </dict>
1475 ```
1476 #### policies.json
1477 ```
1478 {
1479 "policies": {
1480 "DisableSafeMode": true | false
1481 }
1482 }
1483 ```
1484 ### DisableSecurityBypass
1485 Prevent the user from bypassing security in certain cases.
1486
1487 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1488
1489 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1490
1491 **Compatibility:** Firefox 60, Firefox ESR 60\
1492 **CCK2 Equivalent:** N/A\
1493 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1494
1495 #### Windows (GPO)
1496 ```
1497 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1498 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1499 ```
1500 #### Windows (Intune)
1501 OMA-URI:
1502 ```
1503 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1504 ```
1505 Value (string):
1506 ```
1507 <enabled/> or <disabled/>
1508 ```
1509 OMA-URI:
1510 ```
1511 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1512 ```
1513 Value (string):
1514 ```
1515 <enabled/> or <disabled/>
1516 ```
1517
1518 #### macOS
1519 ```
1520 <dict>
1521 <key>DisableSecurityBypass</key>
1522 <dict>
1523 <key>InvalidCertificate</key>
1524 <true/> | <false/>
1525 <key><SafeBrowsing/key>
1526 <true/> | <false/>
1527 </dict>
1528 </dict>
1529 ```
1530 #### policies.json
1531 ```
1532 {
1533 "policies": {
1534 "DisableSecurityBypass": {
1535 "InvalidCertificate": true false,
1536 "SafeBrowsing": true false
1537 }
1538 }
1539 }
1540 ```
1541 ### DisableSystemAddonUpdate
1542 Prevent system add-ons from being installed or update.
1543
1544 **Compatibility:** Firefox 60, Firefox ESR 60\
1545 **CCK2 Equivalent:** N/A\
1546 **Preferences Affected:** N/A
1547
1548 #### Windows (GPO)
1549 ```
1550 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1551 ```
1552 #### Windows (Intune)
1553 OMA-URI:
1554 ```
1555 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1556 ```
1557 Value (string):
1558 ```
1559 <enabled/> or <disabled/>
1560 ```
1561 #### macOS
1562 ```
1563 <dict>
1564 <key>DisableSystemAddonUpdate</key>
1565 <true/> | <false/>
1566 </dict>
1567 ```
1568 #### policies.json
1569 ```
1570 {
1571 "policies": {
1572 "DisableSystemAddonUpdate": true | false
1573 }
1574 }
1575 ```
1576 ### DisableTelemetry
1577 Prevent the upload of telemetry data.
1578
1579 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1580
1581 **Compatibility:** Firefox 60, Firefox ESR 60\
1582 **CCK2 Equivalent:** `disableTelemetry`\
1583 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1584
1585 #### Windows (GPO)
1586 ```
1587 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1588 ```
1589 #### Windows (Intune)
1590 OMA-URI:
1591 ```
1592 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1593 ```
1594 Value (string):
1595 ```
1596 <enabled/> or <disabled/>
1597 ```
1598 #### macOS
1599 ```
1600 <dict>
1601 <key>DisableTelemetry</key>
1602 <true/> | <false/>
1603 </dict>
1604 ```
1605 #### policies.json
1606 ```
1607 {
1608 "policies": {
1609 "DisableTelemetry": true | false
1610 }
1611 }
1612 ```
1613 ### DisplayBookmarksToolbar
1614 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1615
1616 **Compatibility:** Firefox 60, Firefox ESR 60\
1617 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1618 **Preferences Affected:** N/A
1619
1620 #### Windows (GPO)
1621 ```
1622 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1623 ```
1624 #### Windows (Intune)
1625 OMA-URI:
1626 ```
1627 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1628 ```
1629 Value (string):
1630 ```
1631 <enabled/> or <disabled/>
1632 ```
1633 #### macOS
1634 ```
1635 <dict>
1636 <key>DisplayBookmarksToolbar</key>
1637 <true/> | <false/>
1638 </dict>
1639 ```
1640 #### policies.json
1641 ```
1642 {
1643 "policies": {
1644 "DisplayBookmarksToolbar": true | false
1645 }
1646 }
1647 ```
1648 ### DisplayMenuBar (Deprecated)
1649 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1650
1651 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1652 **CCK2 Equivalent:** `displayMenuBar`\
1653 **Preferences Affected:** N/A
1654
1655 #### Windows (GPO)
1656 ```
1657 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1658 ```
1659 #### macOS
1660 ```
1661 <dict>
1662 <key>DisplayMenuBar</key>
1663 <true/> | <false/>
1664 </dict>
1665 ```
1666 #### policies.json
1667 ```
1668 {
1669 "policies": {
1670 "DisplayMenuBar": true | false
1671 }
1672 }
1673 ```
1674 ### DisplayMenuBar
1675 Set the state of the menubar.
1676
1677 `always` means the menubar is shown and cannot be hidden.
1678
1679 `never` means the menubar is hidden and cannot be shown.
1680
1681 `default-on` means the menubar is on by default but can be hidden.
1682
1683 `default-off` means the menubar is off by default but can be shown.
1684
1685 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1686 **CCK2 Equivalent:** `displayMenuBar`\
1687 **Preferences Affected:** N/A
1688
1689 #### Windows (GPO)
1690 ```
1691 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1692 ```
1693 #### Windows (Intune)
1694 OMA-URI:
1695 ```
1696 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1697 ```
1698 Value (string):
1699 ```
1700 <enabled/>
1701 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1702 ```
1703 #### macOS
1704 ```
1705 <dict>
1706 <key>DisplayMenuBar</key>
1707 <string>always | never | default-on | default-off</string>
1708 </dict>
1709 ```
1710 #### policies.json
1711 ```
1712 {
1713 "policies": {
1714 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1715 }
1716 }
1717 ```
1718 ### DNSOverHTTPS
1719 Configure DNS over HTTPS.
1720
1721 `Enabled` determines whether DNS over HTTPS is enabled
1722
1723 `ProviderURL` is a URL to another provider.
1724
1725 `Locked` prevents the user from changing DNS over HTTPS preferences.
1726
1727 `ExcludedDomains` excludes domains from DNS over HTTPS.
1728
1729 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1730 **CCK2 Equivalent:** N/A\
1731 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1732
1733 #### Windows (GPO)
1734 ```
1735 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1736 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1737 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1738 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1739 ```
1740 #### macOS
1741 ```
1742 <dict>
1743 <key>DNSOverHTTPS</key>
1744 <dict>
1745 <key>Enabled</key>
1746 <true/> | <false/>
1747 <key>ProviderURL</key>
1748 <string>URL_TO_ALTERNATE_PROVIDER</string>
1749 <key>Locked</key>
1750 <true/> | <false/>
1751 <key>ExcludedDomains</key>
1752 <array>
1753 <string>example.com</string>
1754 </array>
1755 </dict>
1756 </dict>
1757 ```
1758 #### policies.json
1759 ```
1760 {
1761 "policies": {
1762 "DNSOverHTTPS": {
1763 "Enabled": true | false,
1764 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1765 "Locked": true | false,
1766 "ExcludedDomains": ["example.com"]
1767 }
1768 }
1769 }
1770 ```
1771 ### DontCheckDefaultBrowser
1772 Don't check if Firefox is the default browser at startup.
1773
1774 **Compatibility:** Firefox 60, Firefox ESR 60\
1775 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1776 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1777
1778 #### Windows (GPO)
1779 ```
1780 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1781 ```
1782 #### macOS
1783 ```
1784 <dict>
1785 <key>DontCheckDefaultBrowser</key>
1786 <true/> | <false/>
1787 </dict>
1788 ```
1789 #### policies.json
1790 ```
1791 {
1792 "policies": {
1793 "DontCheckDefaultBrowser": true | false
1794 }
1795 }
1796 ```
1797 ### DefaultDownloadDirectory
1798 Set the default download directory.
1799
1800 You can use ${home} for the native home directory.
1801
1802 **Compatibility:** Firefox 68, Firefox ESR 68\
1803 **CCK2 Equivalent:** N/A\
1804 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1805
1806 #### Windows (GPO)
1807 ```
1808 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1809 ```
1810 #### macOS
1811 ```
1812 <dict>
1813 <key>DefaultDownloadDirectory</key>
1814 <string>${home}/Downloads</string>
1815 </dict>
1816 ```
1817 #### policies.json (macOS and Linux)
1818 ```
1819 {
1820 "policies": {
1821 "DefaultDownloadDirectory": "${home}/Downloads"
1822 }
1823 ```
1824 #### policies.json (Windows)
1825 ```
1826 {
1827 "policies": {
1828 "DefaultDownloadDirectory": "${home}\\Downloads"
1829 }
1830 ```
1831 ### DownloadDirectory
1832 Set and lock the download directory.
1833
1834 You can use ${home} for the native home directory.
1835
1836 **Compatibility:** Firefox 68, Firefox ESR 68\
1837 **CCK2 Equivalent:** N/A\
1838 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1839
1840 #### Windows (GPO)
1841 ```
1842 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1843 ```
1844 #### macOS
1845 ```
1846 <dict>
1847 <key>DownloadDirectory</key>
1848 <string>${home}/Downloads</string>
1849 </dict>
1850 ```
1851 #### policies.json (macOS and Linux)
1852 ```
1853 {
1854 "policies": {
1855 "DownloadDirectory": "${home}/Downloads"
1856 }
1857 ```
1858 #### policies.json (Windows)
1859 ```
1860 {
1861 "policies": {
1862 "DownloadDirectory": "${home}\\Downloads"
1863 }
1864 ```
1865 ### EnableTrackingProtection
1866 Configure tracking protection.
1867
1868 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1869
1870 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1871
1872 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1873
1874 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1875
1876 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1877
1878 `Exceptions` are origins for which tracking protection is not enabled.
1879
1880 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1881 **CCK2 Equivalent:** N/A\
1882 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1883
1884 #### Windows (GPO)
1885 ```
1886 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1887 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1888 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1889 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1890 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1891 ```
1892 #### Windows (Intune)
1893 OMA-URI:
1894 ```
1895 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1896 ```
1897 Value (string):
1898 ```
1899 <enabled/>
1900 <data id="TrackingProtectionLocked" value="true | false"/>
1901 <data id="Cryptomining" value="true | false"/>
1902 <data id="Fingerprinting" value="true | false"/>
1903 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1904 ```
1905 #### macOS
1906 ```
1907 <dict>
1908 <key>EnableTrackingProtection</key>
1909 <dict>
1910 <key>Value</key>
1911 <true/> | <false/>
1912 <key><Locked</key>
1913 <true/> | <false/>
1914 <key><Cryptomining</key>
1915 <true/> | <false/>
1916 <key><Fingerprinting</key>
1917 <true/> | <false/>
1918 <key>Exceptions</key>
1919 <array>
1920 <string>https://example.com</string>
1921 </array>
1922 </dict>
1923 </dict>
1924 ```
1925 #### policies.json
1926 ```
1927 {
1928 "policies": {
1929 "EnableTrackingProtection": {
1930 "Value": [true, false],
1931 "Locked": [true, false],
1932 "Cryptomining": [true, false],
1933 "Fingerprinting": [true, false],
1934 "Exceptions": ["https://example.com"]
1935 }
1936 }
1937 ```
1938 ### EnterprisePoliciesEnabled
1939 Enable policy support on macOS.
1940
1941 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1942 **CCK2 Equivalent:** N/A\
1943 **Preferences Affected:** N/A
1944
1945 #### macOS
1946 ```
1947 <dict>
1948 <key>EnterprisePoliciesEnabled</key>
1949 <true/>
1950 </dict>
1951 ```
1952 ### Extensions
1953 Control the installation, uninstallation and locking of extensions.
1954
1955 `Install` is a list of URLs or native paths for extensions to be installed.
1956
1957 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1958
1959 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1960
1961 **Compatibility:** Firefox 60, Firefox ESR 60\
1962 **CCK2 Equivalent:** `addons`\
1963 **Preferences Affected:** N/A
1964
1965 #### Windows (GPO)
1966 ```
1967 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1968 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1969 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1970 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1971 ```
1972 #### macOS
1973 ```
1974 <dict>
1975 <key>Extensions</key>
1976 <dict>
1977 <key>Install</key>
1978 <array>
1979 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1980 <string>//path/to/xpi</string>
1981 </array>
1982 <key>Uninstall</key>
1983 <array>
1984 <string>bad_addon_id@mozilla.org</string>
1985 </array>
1986 <key>Locked</key>
1987 <array>
1988 <string>addon_id@mozilla.org</string>
1989 </array>
1990 </dict>
1991 </dict>
1992 ```
1993 #### policies.json
1994 ```
1995 {
1996 "policies": {
1997 "Extensions": {
1998 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1999 "Uninstall": ["bad_addon_id@mozilla.org"],
2000 "Locked": ["addon_id@mozilla.org"]
2001 }
2002 }
2003 }
2004 ```
2005 ### ExtensionSettings
2006 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2007
2008 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2009
2010 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2011
2012 The configuration for each extension is another dictionary that can contain the fields documented below.
2013
2014 | Name | Description |
2015 | --- | --- |
2016 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2017 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2018 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2019 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2020 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2021 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2022 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2023 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2024 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2025
2026 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2027 **CCK2 Equivalent:** N/A\
2028 **Preferences Affected:** N/A
2029
2030 #### Windows (GPO)
2031 ```
2032 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2033 {
2034 "*": {
2035 "blocked_install_message": "Custom error message.",
2036 "install_sources": ["https://addons.mozilla.org/"],
2037 "installation_mode": "blocked",
2038 "allowed_types": ["extension"]
2039 },
2040 "uBlock0@raymondhill.net": {
2041 "installation_mode": "force_installed",
2042 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2043 }
2044 }
2045 ```
2046 #### Windows (Intune)
2047 OMA-URI:
2048 ```
2049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2050 ```
2051 Value (string):
2052 ```
2053 <enabled/>
2054 <data id="ExtensionSettings" value='
2055 "*": {
2056 "blocked_install_message": "Custom error message.",
2057 "install_sources": ["https://addons.mozilla.org/"],
2058 "installation_mode": "blocked",
2059 "allowed_types": ["extension"]
2060 },
2061 "uBlock0@raymondhill.net": {
2062 "installation_mode": "force_installed",
2063 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2064 }'/>
2065 ```
2066 #### macOS
2067 ```
2068 <dict>
2069 <key>ExtensionSettings</key>
2070 <dict>
2071 <key>*</key>
2072 <dict>
2073 <key>blocked_install_message</key>
2074 <string>Custom error message.</string>
2075 <key>install_sources</key>
2076 <array>
2077 <string>https://addons.mozilla.org/</string>
2078 </array>
2079 <key>installation_mode</key>
2080 <string>blocked</string>
2081 <key>allowed_types</key>
2082 <array>
2083 <string>extension</string>
2084 </array>
2085 </dict>
2086 <key>uBlock0@raymondhill.net</key>
2087 <dict>
2088 <key>installation_mode</key>
2089 <string>force_installed</string>
2090 <key>install_url</key>
2091 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2092 </dict>
2093 </dict>
2094 </dict>
2095 ```
2096 #### policies.json
2097 ```
2098 {
2099 "policies": {
2100 "ExtensionSettings": {
2101 "*": {
2102 "blocked_install_message": "Custom error message.",
2103 "install_sources": ["https://addons.mozilla.org/"],
2104 "installation_mode": "blocked",
2105 "allowed_types": ["extension"]
2106 },
2107 "uBlock0@raymondhill.net": {
2108 "installation_mode": "force_installed",
2109 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2110 }
2111 }
2112 }
2113 }
2114 ```
2115 ### ExtensionUpdate
2116 Control extension updates.
2117
2118 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2119 **CCK2 Equivalent:** N/A\
2120 **Preferences Affected:** `extensions.update.enabled`
2121
2122 #### Windows (GPO)
2123 ```
2124 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2125 ```
2126 #### macOS
2127 ```
2128 <dict>
2129 <key>ExtensionUpdate</key>
2130 <true/> | <false/>
2131 </dict>
2132 ```
2133 #### policies.json
2134 ```
2135 {
2136 "policies": {
2137 "ExtensionUpdate": true | false
2138 }
2139 }
2140 ```
2141 ### FlashPlugin
2142 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2143
2144 `Allow` is a list of origins where Flash are allowed.
2145
2146 `Block` is a list of origins where Flash is not allowed.
2147
2148 `Default` determines whether or not Flash is allowed by default.
2149
2150 `Locked` prevents the user from changing Flash preferences.
2151
2152 **Compatibility:** Firefox 60, Firefox ESR 60\
2153 **CCK2 Equivalent:** `permissions.plugin`\
2154 **Preferences Affected:** `plugin.state.flash`
2155
2156 #### Windows (GPO)
2157 ```
2158 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2159 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2160 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2161 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2162 ```
2163 #### Windows (Intune)
2164 OMA-URI:
2165 ```
2166 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2167 ```
2168 Value (string):
2169 ```
2170 <enabled/>
2171 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2172
2173 ```
2174 OMA-URI:
2175 ```
2176 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2177 ```
2178 Value (string):
2179 ```
2180 <enabled/> or <disabled/>
2181 ```
2182 OMA-URI:
2183 ```
2184 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2185 ```
2186 Value (string):
2187 ```
2188 <enabled/> or <disabled/>
2189 ```
2190 #### macOS
2191 ```
2192 <dict>
2193 <key>FlashPlugin</key>
2194 <dict>
2195 <key>Allow</key>
2196 <array>
2197 <string>http://example.org</string>
2198 </array>
2199 <key>Block</key>
2200 <array>
2201 <string>http://example.edu</string>
2202 </array>
2203 <key>Default</key>
2204 <true/> | <false/>
2205 <key>Locked</key>
2206 <true/> | <false/>
2207 </dict>
2208 </dict>
2209 ```
2210 #### policies.json
2211 ```
2212 {
2213 "policies": {
2214 "FlashPlugin": {
2215 "Allow": ["http://example.org/"],
2216 "Block": ["http://example.edu/"],
2217 "Default": true | false,
2218 "Locked": true | false
2219 }
2220 }
2221 }
2222 ```
2223 ### FirefoxHome
2224 Customize the Firefox Home page.
2225
2226 **Compatibility:** Firefox 68, Firefox ESR 68\
2227 **CCK2 Equivalent:** N/A\
2228 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2229
2230 #### Windows (GPO)
2231 ```
2232 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2233 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2234 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2235 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2236 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2237 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2238 ```
2239 #### macOS
2240 ```
2241 <dict>
2242 <key>FirefoxHome</key>
2243 <dict>
2244 <key>Search</key>
2245 <true/> | <false/>
2246 <key>TopSites</key>
2247 <true/> | <false/>
2248 <key>Highlights</key>
2249 <true/> | <false/>
2250 <key>Pocket</key>
2251 <true/> | <false/>
2252 <key>Snippets</key>
2253 <true/> | <false/>
2254 <key>Locked</key>
2255 <true/> | <false/>
2256 </dict>
2257 </dict>
2258 ```
2259 #### policies.json
2260 ```
2261 {
2262 "policies": {
2263 "FirefoxHome": {
2264 "Search": true | false,
2265 "TopSites": true | false,
2266 "Highlights": true | false,
2267 "Pocket": true | false,
2268 "Snippets": true | false,
2269 "Locked": true | false
2270 }
2271 }
2272 }
2273 ```
2274 ### HardwareAcceleration
2275 Control hardware acceleration.
2276
2277 **Compatibility:** Firefox 60, Firefox ESR 60\
2278 **CCK2 Equivalent:** N/A\
2279 **Preferences Affected:** `layers.acceleration.disabled`
2280
2281 #### Windows (GPO)
2282 ```
2283 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2284 ```
2285 #### macOS
2286 ```
2287 <dict>
2288 <key>HardwareAcceleration</key>
2289 <true/> | <false/>
2290 </dict>
2291 ```
2292 #### policies.json
2293 ```
2294 {
2295 "policies": {
2296 "HardwareAcceleration": true | false
2297 }
2298 }
2299 ```
2300 ### Homepage
2301 Configure the default homepage and how Firefox starts.
2302
2303 `URL` is the default homepage.
2304
2305 `Locked` prevents the user from changing homepage preferences.
2306
2307 `Additional` allows for more than one homepage.
2308
2309 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2310
2311 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2312 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2313 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2314
2315 #### Windows (GPO)
2316 ```
2317 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2318 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2319 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2320 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2321 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2322 ```
2323 #### Windows (Intune)
2324 OMA-URI:
2325 ```
2326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2327 ```
2328 Value (string):
2329 ```
2330 <enabled/>
2331
2332 <data id="HomepageURL" value="https://example.com"/>
2333 <data id="HomepageLocked" value="true | false"/>
2334 ```
2335 OMA-URI:
2336 ```
2337 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2338 ```
2339 Value (string):
2340 ```
2341 <enabled/>
2342
2343 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2344 ```
2345 OMA-URI:
2346 ```
2347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2348 ```
2349 Value (string):
2350 ```
2351 <enabled/>
2352
2353 <data id="StartPage" value="none | homepage | previous-session"/>
2354 ```
2355 #### macOS
2356 ```
2357 <dict>
2358 <key>Homepage</key>
2359 <dict>
2360 <key>URL</key>
2361 <string>http://example.com</string>
2362 <key>Locked</key>
2363 <true/> | <false/>
2364 <key>Additional</key>
2365 <array>
2366 <string>http://example.org</string>
2367 <string>http://example.edu</string>
2368 </array>
2369 <key>StartPage</key>
2370 <string>none | homepage | previous-session</string>
2371 </dict>
2372 </dict>
2373 ```
2374 #### policies.json
2375 ```
2376 {
2377 "policies": {
2378 "Homepage": {
2379 "URL": "http://example.com/",
2380 "Locked": true | false,
2381 "Additional": ["http://example.org/",
2382 "http://example.edu/"],
2383 "StartPage": "none" | "homepage" | "previous-session"
2384 }
2385 }
2386 }
2387 ```
2388 ### InstallAddonsPermission
2389 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2390
2391 `Allow` is a list of origins where extension installs are allowed.
2392
2393 `Default` determines whether or not extension installs are allowed by default.
2394
2395 **Compatibility:** Firefox 60, Firefox ESR 60\
2396 **CCK2 Equivalent:** `permissions.install`\
2397 **Preferences Affected:** `xpinstall.enabled`
2398
2399 #### Windows (GPO)
2400 ```
2401 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2402 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2403 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2404 ```
2405 #### Windows (Intune)
2406 OMA-URI:
2407 ```
2408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2409 ```
2410 Value (string):
2411 ```
2412 <enabled/>
2413 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2414 ```
2415 OMA-URI:
2416 ```
2417 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2418 ```
2419 Value (string):
2420 ```
2421 <enabled/>
2422 ```
2423 #### macOS
2424 ```
2425 <dict>
2426 <key>InstallAddonsPermission</key>
2427 <dict>
2428 <key>Allow</key>
2429 <array>
2430 <string>http://example.org</string>
2431 <string>http://example.edu</string>
2432 </array>
2433 <key>Default</key>
2434 <true/> | <false/>
2435 </dict>
2436 </dict>
2437 ```
2438 #### policies.json
2439 ```
2440 {
2441 "policies": {
2442 "InstallAddonsPermission": {
2443 "Allow": ["http://example.org/",
2444 "http://example.edu/"],
2445 "Default": true | false
2446 }
2447 }
2448 }
2449 ```
2450 ### LegacyProfiles
2451 Disable the feature enforcing a separate profile for each installation.
2452
2453 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2454
2455 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2456
2457 This policy only work on Windows via GPO (not policies.json).
2458
2459 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2460 **CCK2 Equivalent:** N/A\
2461 **Preferences Affected:** N/A
2462
2463 #### Windows (GPO)
2464 ```
2465 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2466 ```
2467 ### LocalFileLinks
2468 Enable linking to local files by origin.
2469
2470 **Compatibility:** Firefox 68, Firefox ESR 68\
2471 **CCK2 Equivalent:** N/A\
2472 **Preferences Affected:** `capability.policy.localfilelinks.*`
2473
2474 #### Windows (GPO)
2475 ```
2476 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2477 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2478 ```
2479 #### macOS
2480 ```
2481 <dict>
2482 <key>LocalFileLinks</key>
2483 <array>
2484 <string>http://example.org</string>
2485 <string>http://example.edu</string>
2486 </array>
2487 </dict>
2488 ```
2489 #### policies.json
2490 ```
2491 {
2492 "policies": {
2493 "LocalFileLinks": ["http://example.org/",
2494 "http://example.edu/"]
2495 }
2496 }
2497 ```
2498 ### NoDefaultBookmarks
2499 Disable the creation of default bookmarks.
2500
2501 This policy is only effective if the user profile has not been created yet.
2502
2503 **Compatibility:** Firefox 60, Firefox ESR 60\
2504 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2505 **Preferences Affected:** N/A
2506
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2510 ```
2511 #### macOS
2512 ```
2513 <dict>
2514 <key>NoDefaultBookmarks</key>
2515 <true/> | <false/>
2516 </dict>
2517 ```
2518 #### policies.json
2519 ```
2520 {
2521 "policies": {
2522 "NoDefaultBookmarks": true | false
2523 }
2524 }
2525 ```
2526 ### NetworkPrediction
2527 Enable or disable network prediction (DNS prefetching).
2528
2529 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2530 **CCK2 Equivalent:** N/A\
2531 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2532
2533 #### Windows (GPO)
2534 ```
2535 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2536 ```
2537 #### macOS
2538 ```
2539 <dict>
2540 <key>NetworkPrediction</key>
2541 <true/> | <false/>
2542 </dict>
2543 ```
2544 #### policies.json
2545 ```
2546 {
2547 "policies": {
2548 "NetworkPrediction": true | false
2549 }
2550 ```
2551 ### NewTabPage
2552 Enable or disable the New Tab page.
2553
2554 **Compatibility:** Firefox 68, Firefox ESR 68\
2555 **CCK2 Equivalent:** N/A\
2556 **Preferences Affected:** `browser.newtabpage.enabled`
2557
2558 #### Windows (GPO)
2559 ```
2560 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2561 ```
2562 #### Windows (Intune)
2563 OMA-URI:
2564 ```
2565 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2566 ```
2567 Value (string):
2568 ```
2569 <enabled/> or <disabled/>
2570 ```
2571 #### macOS
2572 ```
2573 <dict>
2574 <key>NewTabPage</key>
2575 <true/> | <false/>
2576 </dict>
2577 ```
2578 #### policies.json
2579 ```
2580 {
2581 "policies": {
2582 "NewTabPage": true | false
2583 }
2584 ```
2585 ### OfferToSaveLogins
2586 Control whether or not Firefox offers to save passwords.
2587
2588 **Compatibility:** Firefox 60, Firefox ESR 60\
2589 **CCK2 Equivalent:** `dontRememberPasswords`\
2590 **Preferences Affected:** `signon.rememberSignons`
2591
2592 #### Windows (GPO)
2593 ```
2594 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2595 ```
2596 #### macOS
2597 ```
2598 <dict>
2599 <key>OfferToSaveLogins</key>
2600 <true/> | <false/>
2601 </dict>
2602 ```
2603 #### policies.json
2604 ```
2605 {
2606 "policies": {
2607 "OfferToSaveLogins": true | false
2608 }
2609 }
2610 ```
2611 ### OfferToSaveLoginsDefault
2612 Sets the default value of signon.rememberSignons without locking it.
2613
2614 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2615 **CCK2 Equivalent:** `dontRememberPasswords`\
2616 **Preferences Affected:** `signon.rememberSignons`
2617
2618 #### Windows (GPO)
2619 ```
2620 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2621 ```
2622 #### macOS
2623 ```
2624 <dict>
2625 <key>OfferToSaveLoginsDefault</key>
2626 <true/> | <false/>
2627 </dict>
2628 ```
2629 #### policies.json
2630 ```
2631 {
2632 "policies": {
2633 "OfferToSaveLoginsDefault": true | false
2634 }
2635 }
2636 ```
2637 ### OverrideFirstRunPage
2638 Override the first run page. If the value is blank, no first run page is displayed.
2639
2640 **Compatibility:** Firefox 60, Firefox ESR 60\
2641 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2642 **Preferences Affected:** `startup.homepage_welcome_url`
2643
2644 #### Windows (GPO)
2645 ```
2646 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2647 ```
2648 #### Windows (Intune)
2649 OMA-URI:
2650 ```
2651 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2652 ```
2653 Value (string):
2654 ```
2655 <enabled/>
2656 <data id="OverridePage" value="https://example.com"/>
2657 ```
2658 #### macOS
2659 ```
2660 <dict>
2661 <key>OverrideFirstRunPage</key>
2662 <string>http://example.org</string>
2663 </dict>
2664 ```
2665 #### policies.json
2666 ```
2667 {
2668 "policies": {
2669 "OverrideFirstRunPage": "http://example.org"
2670 }
2671 ```
2672 ### OverridePostUpdatePage
2673 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2674
2675 **Compatibility:** Firefox 60, Firefox ESR 60\
2676 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2677 **Preferences Affected:** `startup.homepage_override_url`
2678
2679 #### Windows (GPO)
2680 ```
2681 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2682 ```
2683 #### macOS
2684 ```
2685 <dict>
2686 <key>OverridePostUpdatePage</key>
2687 <string>http://example.org</string>
2688 </dict>
2689 ```
2690 #### policies.json
2691 ```
2692 {
2693 "policies": {
2694 "OverridePostUpdatePage": "http://example.org"
2695 }
2696 ```
2697 ### PasswordManagerEnabled
2698 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2699
2700 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2701 **CCK2 Equivalent:** N/A\
2702 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2703
2704 #### Windows (GPO)
2705 ```
2706 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2707 ```
2708 #### Windows (Intune)
2709 OMA-URI:
2710 ```
2711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2712 ```
2713 Value (string):
2714 ```
2715 <enabled/> or <disabled/>
2716 ```
2717 #### macOS
2718 ```
2719 <dict>
2720 <key>PasswordManagerEnabled</key>
2721 <true/> | <false/>
2722 </dict>
2723 ```
2724 #### policies.json
2725 ```
2726 {
2727 "policies": {
2728 "PasswordManagerEnabled": true | false
2729 }
2730 }
2731 ```
2732 ### Permissions
2733 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2734
2735 `Allow` is a list of origins where the feature is allowed.
2736
2737 `Block` is a list of origins where the feature is not allowed.
2738
2739 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2740
2741 `Locked` prevents the user from changing preferences for the feature.
2742
2743 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2744
2745 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2746 **CCK2 Equivalent:** N/A\
2747 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2748
2749 #### Windows (GPO)
2750 ```
2751 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2752 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2753 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2754 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2755 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2756 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2757 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2758 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2759 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2760 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2761 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2762 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2763 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2764 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2765 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2766 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2767 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2768 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2769 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2770 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
2771 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
2772 ```
2773 #### Windows (Intune)
2774 OMA-URI:
2775 ```
2776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
2777 ```
2778 Value (string):
2779 ```
2780 <enabled/> or <disabled/>
2781 ```
2782 OMA-URI:
2783 ```
2784 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
2785 ```
2786 Value (string):
2787 ```
2788 <enabled/> or <disabled/>
2789 ```
2790 OMA-URI:
2791 ```
2792 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
2793 ```
2794 Value (string):
2795 ```
2796 <enabled/>
2797 <data id="Permissions" value="1&#xF000;https://example.org"/>
2798 ```
2799 OMA-URI:
2800 ```
2801 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
2802 ```
2803 Value (string):
2804 ```
2805 <enabled/> or <disabled/>
2806 ```
2807 OMA-URI:
2808 ```
2809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
2810 ```
2811 Value (string):
2812 ```
2813 <enabled/> or <disabled/>
2814 ```
2815 OMA-URI:
2816 ```
2817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
2818 ```
2819 Value (string):
2820 ```
2821 <enabled/>
2822 <data id="Permissions" value="1&#xF000;https://example.org"/>
2823 ```
2824 #### macOS
2825 ```
2826 <dict>
2827 <key>Permissions</key>
2828 <dict>
2829 <key>Camera</key>
2830 <dict>
2831 <key>Allow</key>
2832 <array>
2833 <string>https://example.org</string>
2834 <string>https://example.org:1234</string>
2835 </array>
2836 <key>Block</key>
2837 <array>
2838 <string>https://example.edu</string>
2839 </array>
2840 <key>BlockNewRequests</key>
2841 <true/> | <false/>
2842 <key>Locked</key>
2843 <true/> | <false/>
2844 </dict>
2845 <key>Microphone</key>
2846 <dict>
2847 <key>Allow</key>
2848 <array>
2849 <string>https://example.org</string>
2850 </array>
2851 <key>Block</key>
2852 <array>
2853 <string>https://example.edu</string>
2854 </array>
2855 <key>BlockNewRequests</key>
2856 <true/> | <false/>
2857 <key>Locked</key>
2858 <true/> | <false/>
2859 </dict>
2860 <key>Location</key>
2861 <dict>
2862 <key>Allow</key>
2863 <array>
2864 <string>https://example.org</string>
2865 </array>
2866 <key>Block</key>
2867 <array>
2868 <string>https://example.edu</string>
2869 </array>
2870 <key>BlockNewRequests</key>
2871 <true/> | <false/>
2872 <key>Locked</key>
2873 <true/> | <false/>
2874 </dict>
2875 <key>Notifications</key>
2876 <dict>
2877 <key>Allow</key>
2878 <array>
2879 <string>https://example.org</string>
2880 </array>
2881 <key>Block</key>
2882 <array>
2883 <string>https://example.edu</string>
2884 </array>
2885 <key>BlockNewRequests</key>
2886 <true/>
2887 <key>Locked</key>
2888 <true/>
2889 </dict>
2890 <key>Autoplay</key>
2891 <dict>
2892 <key>Allow</key>
2893 <array>
2894 <string>https://example.org</string>
2895 </array>
2896 <key>Block</key>
2897 <array>
2898 <string>https://example.edu</string>
2899 </array>
2900 <key>Default</key>
2901 <string>allow-audio-video | block-audio | block-audio-video</string>
2902 <key>Locked</key>
2903 <true/> | <false/>
2904 </dict>
2905 </dict>
2906 </dict>
2907 ```
2908 #### policies.json
2909 ```
2910 {
2911 "policies": {
2912 "Permissions": {
2913 "Camera": {
2914 "Allow": ["https://example.org","https://example.org:1234"],
2915 "Block": ["https://example.edu"],
2916 "BlockNewRequests": true | false,
2917 "Locked": true | false
2918 },
2919 "Microphone": {
2920 "Allow": ["https://example.org"],
2921 "Block": ["https://example.edu"],
2922 "BlockNewRequests": true | false,
2923 "Locked": true | false
2924 },
2925 "Location": {
2926 "Allow": ["https://example.org"],
2927 "Block": ["https://example.edu"],
2928 "BlockNewRequests": true | false,
2929 "Locked": true | false
2930 },
2931 "Notifications": {
2932 "Allow": ["https://example.org"],
2933 "Block": ["https://example.edu"],
2934 "BlockNewRequests": true | false,
2935 "Locked": true | false
2936 },
2937 "Autoplay": {
2938 "Allow": ["https://example.org"],
2939 "Block": ["https://example.edu"],
2940 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
2941 "Locked": true | false
2942 }
2943 }
2944 }
2945 }
2946 ```
2947 ### PopupBlocking
2948 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2949
2950 `Allow` is a list of origins where popup-windows are allowed.
2951
2952 `Default` determines whether or not pop-up windows are allowed by default.
2953
2954 `Locked` prevents the user from changing pop-up preferences.
2955
2956 **Compatibility:** Firefox 60, Firefox ESR 60\
2957 **CCK2 Equivalent:** `permissions.popup`\
2958 **Preferences Affected:** `dom.disable_open_during_load`
2959
2960 #### Windows (GPO)
2961 ```
2962 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2963 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2964 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2965 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2966 ```
2967 #### macOS
2968 ```
2969 <dict>
2970 <key>PopupBlocking</key>
2971 <dict>
2972 <key>Allow</key>
2973 <array>
2974 <string>http://example.org</string>
2975 <string>http://example.edu</string>
2976 </array>
2977 <key>Default</key>
2978 <true/> | <false/>
2979 <key>Locked</key>
2980 <true/> | <false/>
2981 </dict>
2982 </dict>
2983 ```
2984 #### policies.json
2985 ```
2986 {
2987 "policies": {
2988 "PopupBlocking": {
2989 "Allow": ["http://example.org/",
2990 "http://example.edu/"],
2991 "Default": true | false,
2992 "Locked": true | false
2993 }
2994 }
2995 }
2996 ```
2997 ### Preferences
2998 Set and lock certain preferences.
2999
3000 **Compatibility:** See below\
3001 **CCK2 Equivalent:** `preferences`\
3002 **Preferences Affected:** See below
3003
3004 | Preference | Type | Compatibility | Default
3005 | --- | --- | --- | ---
3006 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3007 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3008 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3009 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3010 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3011 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3012 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3013 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3014 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3015 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3016 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3017 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3018 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3019 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3020 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3021 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3022 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3023 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3024 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3025 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3026 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3027 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3028 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3029 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3030 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3031 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3032 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3033 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3034 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3035 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3036 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3037 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3038 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3039 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3040 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3041 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3042 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3043 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3044 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3045 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3046 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3047 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3048 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3049 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3050 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3051 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3052 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3053 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3054 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3055 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3056 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3057 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3058 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3059 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3060 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3061 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3062 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3063 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3064 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3065 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3066 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3067 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3068 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3069 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3070 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3071 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3072 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3073 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3074 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3075 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3076 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3077 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3078 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3079 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3080 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3081 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3082 disabled
3083 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3084 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3085 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3086 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3087 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3088 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3089 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3090 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3091 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3092 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3093 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3094 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3095 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3096 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3097 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3098 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3099 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3100 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3101 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3102 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3103 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3104 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3105 #### Windows (GPO)
3106 ```
3107 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3108 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3109 ```
3110 #### Windows (Intune)
3111 OMA-URI: (periods are replaced by underscores)
3112 ```
3113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3114 ```
3115 Value (string):
3116 ```
3117 <enabled/> or <disabled/>
3118 ```
3119 #### macOS
3120 ```
3121 <dict>
3122 <key>Preferences</key>
3123 <dict>
3124 <key>boolean_preference_name</key>
3125 <true/> | <false/>
3126 <key>string_preference_name</key>
3127 <string>string_value</string>
3128 </dict>
3129 </dict>
3130 ```
3131 #### policies.json
3132 ```
3133 {
3134 "policies": {
3135 "Preferences": {
3136 "boolean_preference_name": true | false,
3137 "string_preference_name": "string_value"
3138 }
3139 }
3140 }
3141 ```
3142 ### PromptForDownloadLocation
3143 Ask where to save each file before downloading.
3144
3145 **Compatibility:** Firefox 68, Firefox ESR 68\
3146 **CCK2 Equivalent:** N/A\
3147 **Preferences Affected:** `browser.download.useDownloadDir`
3148
3149 #### Windows (GPO)
3150 ```
3151 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3152 ```
3153 #### macOS
3154 ```
3155 <dict>
3156 <key>PromptForDownloadLocation</key>
3157 <true/> | <false/>
3158 </dict>
3159 ```
3160 #### policies.json
3161 ```
3162 {
3163 "policies": {
3164 "PromptForDownloadLocation": true | false
3165 }
3166 }
3167 ```
3168 ### Proxy
3169 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3170 To specify ports, append them to the hostnames with a colon (:).
3171
3172 `Mode` is the proxy method being used.
3173
3174 `Locked` is whether or not proxy settings can be changed.
3175
3176 `HTTPProxy` is the HTTP proxy server.
3177
3178 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3179
3180 `SSLProxy` is the SSL proxy server.
3181
3182 `FTPProxy` is the FTP proxy server.
3183
3184 `SOCKSProxy` is the SOCKS proxy server
3185
3186 `SOCKSVersion` is the SOCKS version (4 or 5)
3187
3188 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3189
3190 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3191
3192 `AutoLogin` means do not prompt for authentication if password is saved.
3193
3194 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3195
3196 **Compatibility:** Firefox 60, Firefox ESR 60\
3197 **CCK2 Equivalent:** `networkProxy*`\
3198 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3199
3200 #### Windows (GPO)
3201 ```
3202 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3203 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3204 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3205 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3206 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3207 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3208 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3209 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3210 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3211 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3212 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3213 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3214 ```
3215 #### Windows (Intune)
3216 OMA-URI:
3217 ```
3218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3219 ```
3220 Value (string):
3221 ```
3222 <enabled/>
3223 <data id="ProxyLocked" value="true | false"/>
3224 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3225 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3226 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3227 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3228 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3229 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3230 <data id="SOCKSVersion" value="4 | 5"/>
3231 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3232 <data id="Passthrough" value="<local>"/>
3233 <data id="AutoLogin" value="true | false"/>
3234 <data id="UseProxyForDNS" value="true | false"/>
3235 ```
3236 #### macOS
3237 ```
3238 <dict>
3239 <key>Proxy</key>
3240 <dict>
3241 <key>Mode</key>
3242 <string>none | system | manual | autoDetect | autoConfig</string>
3243 <key>Locked</key>
3244 <true> | </false>
3245 <key>HTTPProxy</key>
3246 <string>https://httpproxy.example.com</string>
3247 <key>UseHTTPProxyForAllProtocols</key>
3248 <true> | </false>
3249 <key>SSLProxy</key>
3250 <string>https://sslproxy.example.com</string>
3251 <key>FTPProxy</key>
3252 <string>https://ftpproxy.example.com</string>
3253 <key>SOCKSProxy</key>
3254 <string>https://socksproxy.example.com</string>
3255 <key>SOCKSVersion</key>
3256 <string>4 | 5</string>
3257 <key>Passthrough</key>
3258 <string>&lt;local>&gt;</string>
3259 <key>AutoConfigURL</key>
3260 <string>URL_TO_AUTOCONFIG</string>
3261 <key>AutoLogin</key>
3262 <true> | </false>
3263 <key>UseProxyForDNS</key>
3264 <true> | </false>
3265 </dict>
3266 </dict>
3267 ```
3268 #### policies.json
3269 ```
3270 {
3271 "policies": {
3272 "Proxy": {
3273 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3274 "Locked": [true, false],
3275 "HTTPProxy": "hostname",
3276 "UseHTTPProxyForAllProtocols": [true, false],
3277 "SSLProxy": "hostname",
3278 "FTPProxy": "hostname",
3279 "SOCKSProxy": "hostname",
3280 "SOCKSVersion": 4 | 5
3281 "Passthrough": "<local>",
3282 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3283 "AutoLogin": [true, false],
3284 "UseProxyForDNS": [true, false]
3285 }
3286 }
3287 }
3288 ```
3289 ### RequestedLocales
3290 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3291
3292 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3293
3294 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3295 **CCK2 Equivalent:** N/A\
3296 **Preferences Affected:** N/A
3297 #### Windows (GPO)
3298 ```
3299 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3300 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3301
3302 or
3303
3304 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3305 ```
3306 #### macOS
3307 ```
3308 <dict>
3309 <key>RequestedLocales</key>
3310 <array>
3311 <string>de</string>
3312 <string>en-US</string>
3313 </array>
3314 </dict>
3315
3316 or
3317
3318 <dict>
3319 <key>RequestedLocales</key>
3320 <string>de,en-US</string>
3321 </dict>
3322
3323 ```
3324 #### policies.json
3325 ```
3326 {
3327 "policies": {
3328 "RequestedLocales": ["de", "en-US"]
3329 }
3330 }
3331
3332 or
3333
3334 {
3335 "policies": {
3336 "RequestedLocales": "de,en-US"
3337 }
3338 }
3339 ```
3340 <a name="SanitizeOnShutdown"></a>
3341
3342 ### SanitizeOnShutdown (Selective)
3343 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3344
3345 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3346
3347 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3348 **CCK2 Equivalent:** N/A\
3349 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3350 #### Windows (GPO)
3351 ```
3352 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3353 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3354 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3355 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3356 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3357 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3358 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3359 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3360 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3361 ```
3362 #### Windows (Intune)
3363 OMA-URI:
3364 ```
3365 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3366 ```
3367 Value (string):
3368 ```
3369 <enabled/> or <disabled/>
3370 ```
3371 #### macOS
3372 ```
3373 <dict>
3374 <key>SanitizeOnShutdown</key>
3375 <dict>
3376 <key>Cache</key>
3377 <true/> | <false/>
3378 <key>Cookies</key>
3379 <true/> | <false/>
3380 <key>Downloads</key>
3381 <true/> | <false/>
3382 <key>FormData</key>
3383 <true/> | <false/>
3384 <key>History</key>
3385 <true/> | <false/>
3386 <key>Sessions</key>
3387 <true/> | <false/>
3388 <key>SiteSettings</key>
3389 <true/> | <false/>
3390 <key>OfflineApps</key>
3391 <true/> | <false/>
3392 <key>Locked</key>
3393 <true/> | <false/>
3394 </dict>
3395 </dict>
3396 ```
3397 #### policies.json
3398 ```
3399 {
3400 "policies": {
3401 "SanitizeOnShutdown": {
3402 "Cache": true | false,
3403 "Cookies": true | false,
3404 "Downloads": true | false,
3405 "FormData": true | false,
3406 "History": true | false,
3407 "Sessions": true | false,
3408 "SiteSettings": true | false,
3409 "OfflineApps": true | false,
3410 "Locked": true | false
3411 }
3412 }
3413 }
3414 ```
3415 ### SanitizeOnShutdown (All)
3416 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3417
3418 **Compatibility:** Firefox 60, Firefox ESR 60\
3419 **CCK2 Equivalent:** N/A\
3420 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3421 #### Windows (GPO)
3422 ```
3423 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3424 ```
3425 #### Windows (Intune)
3426 OMA-URI:
3427 ```
3428 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3429 ```
3430 Value (string):
3431 ```
3432 <enabled/> or <disabled/>
3433 ```
3434 #### macOS
3435 ```
3436 <dict>
3437 <key>SanitizeOnShutdown</key>
3438 <true/> | <false/>
3439 </dict>
3440 ```
3441 #### policies.json
3442 ```
3443 {
3444 "policies": {
3445 "SanitizeOnShutdown": true | false
3446 }
3447 }
3448 ```
3449 ### SearchBar
3450 Set whether or not search bar is displayed.
3451
3452 **Compatibility:** Firefox 60, Firefox ESR 60\
3453 **CCK2 Equivalent:** `showSearchBar`\
3454 **Preferences Affected:** N/A
3455
3456 #### Windows (GPO)
3457 ```
3458 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3459 ```
3460 #### macOS
3461 ```
3462 <dict>
3463 <key>SearchBar</key>
3464 <string>unified | separate</string>
3465 </dict>
3466 ```
3467
3468 #### policies.json
3469 ```
3470 {
3471 "policies": {
3472 "SearchBar": "unified" | "separate"
3473 }
3474 }
3475 ```
3476 <a name="SearchEngines"></a>
3477
3478 ### SearchEngines (This policy is only available on the ESR.)
3479
3480 ### SearchEngines | Default
3481
3482 Set the default search engine. This policy is only available on the ESR.
3483
3484 **Compatibility:** Firefox ESR 60\
3485 **CCK2 Equivalent:** `defaultSearchEngine`\
3486 **Preferences Affected:** N/A
3487
3488 #### Windows (GPO)
3489 ```
3490 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3491 ```
3492 #### macOS
3493 ```
3494 <dict>
3495 <key>SearchEngines</key>
3496 <dict>
3497 <key>Default</key>
3498 <string>NAME_OF_SEARCH_ENGINE</string>
3499 </dict>
3500 </dict>
3501 ```
3502 #### policies.json
3503 ```
3504 {
3505 "policies": {
3506 "SearchEngines": {
3507 "Default": "NAME_OF_SEARCH_ENGINE"
3508 }
3509 }
3510 }
3511 ```
3512 ### SearchEngines | PreventInstalls
3513
3514 Prevent installing search engines from webpages.
3515
3516 **Compatibility:** Firefox ESR 60\
3517 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3518 **Preferences Affected:** N/A
3519
3520 #### Windows (GPO)
3521 ```
3522 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3523 ```
3524 #### Windows (Intune)
3525 OMA-URI:
3526 ```
3527 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3528 ```
3529 Value (string):
3530 ```
3531 <enabled/> or <disabled/>
3532 ```
3533 #### macOS
3534 ```
3535 <dict>
3536 <key>SearchEngines</key>
3537 <dict>
3538 <key>PreventInstalls</key>
3539 <true/> | <false/>
3540 </dict>
3541 </dict>
3542 ```
3543 #### policies.json
3544 ```
3545 {
3546 "policies": {
3547 "SearchEngines": {
3548 "PreventInstalls": true | false
3549 }
3550 }
3551 }
3552 ```
3553 ### SearchEngines | Remove
3554
3555 Hide built-in search engines. This policy is only available on the ESR.
3556
3557 **Compatibility:** Firefox ESR 60.2\
3558 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3559 **Preferences Affected:** N/A
3560
3561 #### Windows (GPO)
3562 ```
3563 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3564 ```
3565 #### macOS
3566 ```
3567 <dict>
3568 <key>SearchEngines</key>
3569 <dict>
3570 <key>Remove</key>
3571 <array>
3572 <string>NAME_OF_SEARCH_ENGINE</string>
3573 </array>
3574 </dict>
3575 </dict>
3576 ```
3577 #### policies.json
3578 ```
3579 {
3580 "policies": {
3581 "SearchEngines": {
3582 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3583 }
3584 }
3585 }
3586 ```
3587 ### SearchEngines | Add
3588
3589 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3590
3591 `Name` is the name of the search engine.
3592
3593 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3594
3595 `Method` is either GET or POST
3596
3597 `IconURL` is a URL for the icon to use.
3598
3599 `Alias` is a keyword to use for the engine.
3600
3601 `Description` is a description of the search engine.
3602
3603 `PostData` is the POST data as name value pairs separated by &.
3604
3605 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3606
3607 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3608 **CCK2 Equivalent:** `searchplugins`\
3609 **Preferences Affected:** N/A
3610
3611 #### Windows (GPO)
3612 ```
3613 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3614 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3615 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3616 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3617 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3618 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3619 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3620 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3621 ```
3622
3623 #### macOS
3624 ```
3625 <dict>
3626 <key>SearchEngines</key>
3627 <dict>
3628 <key>Add</key>
3629 <array>
3630 <dict>
3631 <key>Name</key>
3632 <string>Example1</string>
3633 <key>URLTemplate</key>
3634 <string>https://www.example.org/q={searchTerms}</string>
3635 <key>Method</key>
3636 <string>GET | POST </string>
3637 <key>IconURL</key>
3638 <string>https://www.example.org/favicon.ico</string>
3639 <key>Alias</key>
3640 <string>example</string>
3641 <key>Description</key>
3642 <string>Example Description</string>
3643 <key>SuggestURLTemplate</key>
3644 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3645 <key>PostData</key>
3646 <string>name=value&q={searchTerms}</string>
3647 </dict>
3648 <array>
3649 </dict>
3650 </dict>
3651 ```
3652 #### policies.json
3653 ```
3654 {
3655 "policies": {
3656 "SearchEngines": {
3657 "Add": [
3658 {
3659 "Name": "Example1",
3660 "URLTemplate": "https://www.example.org/q={searchTerms}",
3661 "Method": "GET" | "POST",
3662 "IconURL": "https://www.example.org/favicon.ico",
3663 "Alias": "example",
3664 "Description": "Description",
3665 "PostData": "name=value&q={searchTerms}",
3666 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3667 }
3668 ]
3669 }
3670 }
3671 }
3672 ```
3673 ### SearchSuggestEnabled
3674
3675 Enable search suggestions.
3676
3677 **Compatibility:** Firefox 68, Firefox ESR 68\
3678 **CCK2 Equivalent:** N/A\
3679 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3680
3681 #### Windows (GPO)
3682 ```
3683 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3684 ```
3685 #### macOS
3686 ```
3687 <dict>
3688 <key>SearchSuggestEnabled</key>
3689 <true/> | <false/>
3690 </dict>
3691 ```
3692 #### policies.json
3693 ```
3694 {
3695 "policies": {
3696 "SearchSuggestEnabled": true | false
3697 }
3698 }
3699 ```
3700 ### SecurityDevices
3701
3702 Install PKCS #11 modules.
3703
3704 **Compatibility:** Firefox 64, Firefox ESR 60.4\
3705 **CCK2 Equivalent:** `certs.devices`\
3706 **Preferences Affected:** N/A
3707
3708 #### Windows (GPO)
3709 ```
3710 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
3711 ```
3712 #### macOS
3713 ```
3714 <dict>
3715 <key>SecurityDevices</key>
3716 <dict>
3717 <key>NAME_OF_DEVICE</key>
3718 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
3719 </dict>
3720 </dict>
3721 ```
3722
3723 #### policies.json
3724 ```
3725 {
3726 "policies": {
3727 "SecurityDevices": {
3728 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
3729 }
3730 }
3731 }
3732 ```
3733 ### SSLVersionMax
3734
3735 Set and lock the maximum version of TLS.
3736
3737 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3738 **CCK2 Equivalent:** N/A\
3739 **Preferences Affected:** `security.tls.version.max`
3740
3741 #### Windows (GPO)
3742 ```
3743 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3744 ```
3745 #### macOS
3746 ```
3747 <dict>
3748 <key>SSLVersionMax</key>
3749 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3750 </dict>
3751 ```
3752
3753 #### policies.json
3754 ```
3755 {
3756 "policies": {
3757 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3758 }
3759 }
3760 ```
3761 ### SSLVersionMin
3762
3763 Set and lock the minimum version of TLS.
3764
3765 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3766 **CCK2 Equivalent:** N/A\
3767 **Preferences Affected:** `security.tls.version.min`
3768
3769 #### Windows (GPO)
3770 ```
3771 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3772 ```
3773 #### Windows (Intune)
3774 OMA-URI:
3775 ```
3776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
3777 ```
3778 Value (string):
3779 ```
3780 <enabled/>
3781 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
3782 ```
3783 #### macOS
3784 ```
3785 <dict>
3786 <key>SSLVersionMin</key>
3787 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3788 </dict>
3789 ```
3790
3791 #### policies.json
3792 ```
3793 {
3794 "policies": {
3795 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3796 }
3797 }
3798 ```
3799 ### SupportMenu
3800 Add a menuitem to the help menu for specifying support information.
3801
3802 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3803 **CCK2 Equivalent:** helpMenu\
3804 **Preferences Affected:** N/A
3805
3806 #### Windows (GPO)
3807 ```
3808 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3809 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3810 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3811 ```
3812 #### macOS
3813 ```
3814 <dict>
3815 <key>SupportMenu</key>
3816 <dict>
3817 <key>Title</key>
3818 <string>SupportMenu</string>
3819 <key>URL</key>
3820 <string>http://example.com/support</string>
3821 <key>AccessKey</key>
3822 <string>S</string>
3823 </dict>
3824 </dict>
3825 ```
3826 #### policies.json
3827 ```
3828 {
3829 "policies": {
3830 "SupportMenu": {
3831 "Title": "Support Menu",
3832 "URL": "http://example.com/support",
3833 "AccessKey": "S"
3834 }
3835 }
3836 }
3837 ```
3838 ### UserMessaging
3839
3840 Prevent installing search engines from webpages.
3841
3842 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3843
3844 `ExtensionRecommendations` Don't recommend extensions.
3845
3846 `FeatureRecommendations` Don't recommend browser features.
3847
3848 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3849
3850 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3851 **CCK2 Equivalent:** N/A\
3852 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3853
3854 #### Windows (GPO)
3855 ```
3856 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3857 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3858 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3859 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3860 ```
3861 #### macOS
3862 ```
3863 <dict>
3864 <key>UserMessaging</key>
3865 <dict>
3866 <key>WhatsNew</key>
3867 <true/> | <false/>
3868 <key>ExtensionRecommendations</key>
3869 <true/> | <false/>
3870 <key>FeatureRecommendations</key>
3871 <true/> | <false/>
3872 <key>UrlbarInterventions</key>
3873 <true/> | <false/>
3874 </dict>
3875 </dict>
3876 ```
3877 #### policies.json
3878 ```
3879 {
3880 "policies": {
3881 "UserMessaging": {
3882 "WhatsNew": true | false,
3883 "ExtensionRecommendations": true | false,
3884 "FeatureRecommendations": true | false,
3885 "UrlbarInterventions": true | false
3886 }
3887 }
3888 }
3889 ```
3890 ### WebsiteFilter
3891 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3892
3893 **Compatibility:** Firefox 60, Firefox ESR 60\
3894 **CCK2 Equivalent:** N/A\
3895 **Preferences Affected:** N/A
3896
3897 #### Windows (GPO)
3898 ```
3899 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3900 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3901 ```
3902 #### macOS
3903 ```
3904 <dict>
3905 <key>WebsiteFilter</key>
3906 <dict>
3907 <key>Block</key>
3908 <array>
3909 <string><all_urls></string>
3910 </array>
3911 <key>Exceptions</key>
3912 <array>
3913 <string>http://example.org/*</string>
3914 </array>
3915 </dict>
3916
3917 </dict>
3918 ```
3919 #### policies.json
3920 ```
3921 {
3922 "policies": {
3923 "WebsiteFilter": {
3924 "Block": ["<all_urls>"],
3925 "Exceptions": ["http://example.org/*"]
3926 }
3927 }
3928 }
3929 ```

patrick-canterino.de