]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #625 from mozilla/PictureInPicture
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
65 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
66 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
67 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
68 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
69 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
70 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
71 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
72 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
73 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
74 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
75 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
76 | **[`Preferences`](#preferences)** | Set and lock some preferences.
77 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
78 | **[`Proxy`](#proxy)** | Configure proxy settings.
79 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
80 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
81 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
82 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
83 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
84 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
85 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
86 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
87 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
88 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
89 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
90 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
91 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
92 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
93 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
94 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
95
96 ### AppAutoUpdate
97
98 Enable or disable **automatic** application update.
99
100 If set to true, application updates are installed without user approval.
101
102 If set to false, application updates are downloaded but the user can choose when to install the update.
103
104 If you have disabled updates via DisableAppUpdate, this policy has no effect.
105
106 **Compatibility:** Firefox 75, Firefox ESR 68.7\
107 **CCK2 Equivalent:** N/A\
108 **Preferences Affected:** app.update.auto
109
110 #### Windows (GPO)
111 ```
112 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
113 ```
114 #### Windows (Intune)
115 OMA-URI:
116 ```
117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
118 ```
119 Value (string):
120 ```
121 <enabled/> or <disabled/>
122 ```
123 #### macOS
124 ```
125 <dict>
126 <key>AppAutoUpdate</key>
127 <true/> | <false/>
128 </dict>
129 ```
130 #### policies.json
131 ```
132 {
133 "policies": {
134 "AppAutoUpdate": true | false
135 }
136 }
137 ```
138 ### AppUpdateURL
139
140 Change the URL for application update.
141
142 **Compatibility:** Firefox 62, Firefox ESR 60.2\
143 **CCK2 Equivalent:** N/A\
144 **Preferences Affected:** `app.update.url`
145
146 #### Windows (GPO)
147 ```
148 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
149 ```
150 #### Windows (Intune)
151 OMA-URI:
152 ```
153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
154 ```
155 Value (string):
156 ```
157 <enabled/>
158 <data id="AppUpdateURL" value="https://yoursite.com"/>
159 ```
160 #### macOS
161 ```
162 <dict>
163 <key>AppUpdateURL</key>
164 <string>https://yoursite.com</string>
165 </dict>
166 ```
167 #### policies.json
168 ```
169 {
170 "policies": {
171 "AppUpdateURL": "https://yoursite.com"
172 }
173 }
174 ```
175 ### Authentication
176
177 Configure sites that support integrated authentication.
178
179 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
180
181 `PrivateBrowsing` enables integrated authentication in prviate browsing.
182
183 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
184 **CCK2 Equivalent:** N/A\
185 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
186
187 #### Windows (GPO)
188 ```
189 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
201 ```
202 #### Windows (Intune)
203 OMA-URI:
204 ```
205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
206 ```
207 Value (string):
208 ```
209 <enabled/>
210 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
211 ```
212 OMA-URI:
213 ```
214 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
215 ```
216 Value (string):
217 ```
218 <enabled/>
219 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
220 ```
221 OMA-URI:
222 ```
223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
224 ```
225 Value (string):
226 ```
227 <enabled/>
228 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
229 ```
230 OMA-URI:
231 ```
232 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
233 ```
234 Value (string):
235 ```
236 <enabled/>
237 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
238 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
239 ```
240 OMA-URI:
241 ```
242 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
243 ```
244 Value (string):
245 ```
246 <enabled/> or <disabled/>
247 ```
248 OMA-URI:
249 ```
250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
251 ```
252 Value (string):
253 ```
254 <enabled/> or <disabled/>
255 ```
256 #### macOS
257 ```
258 <dict>
259 <key>Authentication</key>
260 <dict>
261 <key>SPNEGO</key>
262 <array>
263 <string>mydomain.com</string>
264 <string>https://myotherdomain.com</string>
265 </array>
266 <key>Delegated</key>
267 <array>
268 <string>mydomain.com</string>
269 <string>https://myotherdomain.com</string>
270 </array>
271 <key>NTLM</key>
272 <array>
273 <string>mydomain.com</string>
274 <string>https://myotherdomain.com</string>
275 </array>
276 <key>AllowNonFQDN</key>
277 <dict>
278 <key>SPNEGO</key>
279 <true/> | <false/>
280 <key>NTLM</key>
281 <true/> | <false/>
282 </dict>
283 <key>AllowProxies</key>
284 <dict>
285 <key>SPNEGO</key>
286 <true/> | <false/>
287 <key>NTLM</key>
288 <true/> | <false/>
289 </dict>
290 <key>Locked</key>
291 <true/> | <false/>
292 <key>PrivateBrowsing</key>
293 <true/> | <false/>
294 </dict>
295 </dict>
296 ```
297 #### policies.json
298 ```
299 {
300 "policies": {
301 "Authentication": {
302 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
303 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
304 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
305 "AllowNonFQDN": {
306 "SPNEGO": true | false,
307 "NTLM": true | false
308 },
309 "AllowProxies": {
310 "SPNEGO": true | false,
311 "NTLM": true | false
312 },
313 "Locked": true | false,
314 "PrivateBrowsing": true | false
315 }
316 }
317 }
318 ```
319 ### BlockAboutAddons
320
321 Block access to the Add-ons Manager (about:addons).
322
323 **Compatibility:** Firefox 60, Firefox ESR 60\
324 **CCK2 Equivalent:** `disableAddonsManager`\
325 **Preferences Affected:** N/A
326
327 #### Windows (GPO)
328 ```
329 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
330 ```
331 #### Windows (Intune)
332 OMA-URI:
333 ```
334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
335 ```
336 Value (string):
337 ```
338 <enabled/> or <disabled/>
339 ```
340 #### macOS
341 ```
342 <dict>
343 <key>BlockAboutAddons</key>
344 <true/> | <false/>
345 </dict>
346 ```
347 #### policies.json
348 ```
349 {
350 "policies": {
351 "BlockAboutAddons": true | false
352 }
353 }
354 ```
355 ### BlockAboutConfig
356
357 Block access to about:config.
358
359 **Compatibility:** Firefox 60, Firefox ESR 60\
360 **CCK2 Equivalent:** `disableAboutConfig`\
361 **Preferences Affected:** N/A
362
363 #### Windows (GPO)
364 ```
365 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
366 ```
367 #### Windows (Intune)
368 OMA-URI:
369 ```
370 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
371 ```
372 Value (string):
373 ```
374 <enabled/> or <disabled/>
375 ```
376 #### macOS
377 ```
378 <dict>
379 <key>BlockAboutConfig</key>
380 <true/> | <false/>
381 </dict>
382 ```
383 #### policies.json
384 ```
385 {
386 "policies": {
387 "BlockAboutConfig": true | false
388 }
389 }
390 ```
391 ### BlockAboutProfiles
392
393 Block access to About Profiles (about:profiles).
394
395 **Compatibility:** Firefox 60, Firefox ESR 60\
396 **CCK2 Equivalent:** `disableAboutProfiles`\
397 **Preferences Affected:** N/A
398
399 #### Windows (GPO)
400 ```
401 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
402 ```
403 #### Windows (Intune)
404 OMA-URI:
405 ```
406 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
407 ```
408 Value (string):
409 ```
410 <enabled/> or <disabled/>
411 ```
412 #### macOS
413 ```
414 <dict>
415 <key>BlockAboutProfiles</key>
416 <true/> | <false/>
417 </dict>
418 ```
419 #### policies.json
420 ```
421 {
422 "policies": {
423 "BlockAboutProfiles": true | false
424 }
425 }
426 ```
427 ### BlockAboutSupport
428
429 Block access to Troubleshooting Information (about:support).
430
431 **Compatibility:** Firefox 60, Firefox ESR 60\
432 **CCK2 Equivalent:** `disableAboutSupport`\
433 **Preferences Affected:** N/A
434
435 #### Windows (GPO)
436 ```
437 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
438 ```
439 #### Windows (Intune)
440 OMA-URI:
441 ```
442 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
443 ```
444 Value (string):
445 ```
446 <enabled/> or <disabled/>
447 ```
448 #### macOS
449 ```
450 <dict>
451 <key>BlockAboutSupport</key>
452 <true/> | <false/>
453 </dict>
454 ```
455 #### policies.json
456 ```
457 {
458 "policies": {
459 "BlockAboutSupport": true | false
460 }
461 }
462 ```
463 ### Bookmarks
464
465 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
466
467 **Compatibility:** Firefox 60, Firefox ESR 60\
468 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
469 **Preferences Affected:** N/A
470
471 #### Windows (GPO)
472 ```
473 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
478 ```
479 #### Windows (Intune)
480 OMA-URI:
481 ```
482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
483 ```
484 Value (string):
485 ```
486 <enabled/>
487 <data id="BookmarkTitle" value="Example"/>
488 <data id="BookmarkURL" value="https://example.com"/>
489 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
490 <data id="BookmarkPlacement" value="toolbar | menu"/>
491 <data id="BookmarkFolder" value="FolderName"/>
492 ```
493 #### macOS
494 ```
495 <dict>
496 <key>Bookmarks</key>
497 <array>
498 <dict>
499 <key>Title</key>
500 <string>Example</string>
501 <key>URL</key>
502 <string>https://example.com</string>
503 <key>Favicon</key>
504 <string>https://example.com/favicon.ico</string>
505 <key>Placement</key>
506 <string>toolbar | menu</string>
507 <key>Folder</key>
508 <string>FolderName</string>
509 </dict>
510 </array>
511 </dict>
512 ```
513 #### policies.json
514 ```
515 {
516 "policies": {
517 "Bookmarks": [
518 {
519 "Title": "Example",
520 "URL": "https://example.com",
521 "Favicon": "https://example.com/favicon.ico",
522 "Placement": "toolbar" | "menu",
523 "Folder": "FolderName"
524 }
525 ]
526 }
527 }
528 ```
529 ### CaptivePortal
530 Enable or disable the detection of captive portals.
531
532 **Compatibility:** Firefox 67, Firefox ESR 60.7\
533 **CCK2 Equivalent:** N/A\
534 **Preferences Affected:** `network.captive-portal-service.enabled`
535
536 #### Windows (GPO)
537 ```
538 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
539 ```
540 #### Windows (Intune)
541 OMA-URI:
542 ```
543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
544 ```
545 Value (string):
546 ```
547 <enabled/> or <disabled/>
548 ```
549 #### macOS
550 ```
551 <dict>
552 <key>CaptivePortal</key>
553 <true/> | <false/>
554 </dict>
555 ```
556 #### policies.json
557 ```
558 {
559 "policies": {
560 "CaptivePortal": true | false
561 }
562 }
563 ```
564 ### Certificates
565
566 ### Certificates | ImportEnterpriseRoots
567
568 Trust certificates that have been added to the operating system certificate store by a user or administrator.
569
570 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
571
572 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
573 **CCK2 Equivalent:** N/A\
574 **Preferences Affected:** `security.enterprise_roots.enabled`
575
576 #### Windows (GPO)
577 ```
578 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
579 ```
580 #### Windows (Intune)
581 OMA-URI:
582 ```
583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
584 ```
585 Value (string):
586 ```
587 <enabled/> or <disabled/>
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>Certificates</key>
593 <dict>
594 <key>ImportEnterpriseRoots</key>
595 <true/> | <false/>
596 </dict>
597 </dict>
598 ```
599 #### policies.json
600 ```
601 {
602 "policies": {
603 "Certificates": {
604 "ImportEnterpriseRoots": true | false
605 }
606 }
607 }
608 ```
609 ### Certificates | Install
610
611 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
612
613 - Windows
614 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
615 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
616 - macOS
617 - /Library/Application Support/Mozilla/Certificates
618 - ~/Library/Application Support/Mozilla/Certificates
619 - Linux
620 - /usr/lib/mozilla/certificates
621 - /usr/lib64/mozilla/certificates
622 - ~/.mozilla/certificates
623
624 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
625
626 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
627
628 Certificates are installed using the trust string `CT,CT,`.
629
630 Binary (DER) and ASCII (PEM) certificates are both supported.
631
632 **Compatibility:** Firefox 64, Firefox ESR 64\
633 **CCK2 Equivalent:** `certs.ca`\
634 **Preferences Affected:** N/A
635
636 #### Windows (GPO)
637 ```
638 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
639 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
640 ```
641 #### Windows (Intune)
642 OMA-URI:
643 ```
644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
645 ```
646 Value (string):
647 ```
648 <enabled/>
649 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
650 ```
651 #### macOS
652 ```
653 <dict>
654 <key>Certificates</key>
655 <dict>
656 <key>Install</key>
657 <array>
658 <string>cert1.der</string>
659 <string>/Users/username/cert2.pem</string>
660 </array>
661 </dict>
662 </dict>
663 ```
664 #### policies.json
665 ```
666 {
667 "policies": {
668 "Certificates": {
669 "Install": ["cert1.der", "/home/username/cert2.pem"]
670 }
671 }
672 }
673 ```
674 ### Cookies
675 Configure cookie preferences.
676
677 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
678
679 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
680
681 `Default` determines whether cookies are accepted at all.
682
683 `AcceptThirdParty` determines how third-party cookies are handled.
684
685 `ExpireAtSessionEnd` determines when cookies expire.
686
687 `RejectTracker` only rejects cookies for trackers.
688
689 `Locked` prevents the user from changing cookie preferences.
690
691 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
692 **CCK2 Equivalent:** N/A\
693 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
694
695 #### Windows (GPO)
696 ```
697 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
698 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
699 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
700 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
701 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
702 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
704 ```
705 #### Windows (Intune)
706 OMA-URI:
707 ```
708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
709 ```
710 Value (string):
711 ```
712 <enabled/>
713 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
714 ```
715 OMA-URI:
716 ```
717 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
718 ```
719 Value (string):
720 ```
721 <enabled/>
722 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
723 ```
724 OMA-URI:
725 ```
726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
727 ```
728 Value (string):
729 ```
730 <enabled/> or <disabled/>
731 ```
732 OMA-URI:
733 ```
734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
735 ```
736 Value (string):
737 ```
738 <enabled/>
739 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
740 ```
741 OMA-URI:
742 ```
743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
744 ```
745 Value (string):
746 ```
747 <enabled/> or <disabled/>
748 ```
749 OMA-URI:
750 ```
751 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
752 ```
753 Value (string):
754 ```
755 <enabled/> or <disabled/>
756 ```
757 OMA-URI:
758 ```
759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
760 ```
761 Value (string):
762 ```
763 <enabled/> or <disabled/>
764 ```
765 #### macOS
766 ```
767 <dict>
768 <key>Cookies</key>
769 <dict>
770 <key>Allow</key>
771 <array>
772 <string>http://example.com</string>
773 </array>
774 <key>Block</key>
775 <array>
776 <string>http://example.org</string>
777 </array>
778 <key>Default</key>
779 <true/> | <false/>
780 <key>AcceptThirdParty</key>
781 <string>always | never | from-visited</string>
782 <key>ExpireAtSessionEnd</key>
783 <true/> | <false/>
784 <key>RejectTracker</key>
785 <true/> | <false/>
786 <key>Locked</key>
787 <true/> | <false/>
788 </dict>
789 </dict>
790 ```
791 #### policies.json
792 ```
793 {
794 "policies": {
795 "Cookies": {
796 "Allow": ["http://example.org/"],
797 "Block": ["http://example.edu/"],
798 "Default": true | false,
799 "AcceptThirdParty": "always" | "never" | "from-visited",
800 "ExpireAtSessionEnd": true | false,
801 "RejectTracker": true | false,
802 "Locked": true | false
803 }
804 }
805 }
806 ```
807 ### DisableSetDesktopBackground
808 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
809
810 **Compatibility:** Firefox 60, Firefox ESR 60\
811 **CCK2 Equivalent:** `removeSetDesktopBackground`\
812 **Preferences Affected:** N/A
813
814 #### Windows (GPO)
815 ```
816 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
817 ```
818 #### Windows (Intune)
819 OMA-URI:
820 ```
821 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
822 ```
823 Value (string):
824 ```
825 <enabled/> or <disabled/>
826 ```
827 #### macOS
828 ```
829 <dict>
830 <key>DisableSetDesktopBackground</key>
831 <true/> | <false/>
832 </dict>
833 ```
834 #### policies.json
835 ```
836 {
837 "policies": {
838 "DisableSetDesktopBackground": true | false
839 }
840 }
841 ```
842 ### DisableMasterPasswordCreation
843 Remove the master password functionality.
844
845 **Compatibility:** Firefox 60, Firefox ESR 60\
846 **CCK2 Equivalent:** `noMasterPassword`\
847 **Preferences Affected:** N/A
848
849 #### Windows (GPO)
850 ```
851 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
852 ```
853 #### Windows (Intune)
854 OMA-URI:
855 ```
856 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
857 ```
858 Value (string):
859 ```
860 <enabled/> or <disabled/>
861 ```
862 #### macOS
863 ```
864 <dict>
865 <key>DisableMasterPasswordCreation</key>
866 <true/> | <false/>
867 </dict>
868 ```
869 #### policies.json
870 ```
871 {
872 "policies": {
873 "DisableMasterPasswordCreation": true | false
874 }
875 }
876 ```
877 ### DisableAppUpdate
878 Turn off application updates.
879
880 **Compatibility:** Firefox 60, Firefox ESR 60\
881 **CCK2 Equivalent:** `disableFirefoxUpdates`\
882 **Preferences Affected:** N/A
883
884 #### Windows (GPO)
885 ```
886 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
887 ```
888 #### Windows (Intune)
889 OMA-URI:
890 ```
891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
892 ```
893 Value (string):
894 ```
895 <enabled/> or <disabled/>
896 ```
897 #### macOS
898 ```
899 <dict>
900 <key>DisableAppUpdate</key>
901 <true/> | <false/>
902 </dict>
903 ```
904 #### policies.json
905 ```
906 {
907 "policies": {
908 "DisableAppUpdate": true | false
909 }
910 }
911 ```
912 ### DisableBuiltinPDFViewer
913 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
914
915 **Compatibility:** Firefox 60, Firefox ESR 60\
916 **CCK2 Equivalent:** `disablePDFjs`\
917 **Preferences Affected:** `pdfjs.disabled`
918
919 #### Windows (GPO)
920 ```
921 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
922 ```
923 #### Windows (Intune)
924 OMA-URI:
925 ```
926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
927 ```
928 Value (string):
929 ```
930 <enabled/> or <disabled/>
931 ```
932 #### macOS
933 ```
934 <dict>
935 <key>DisableBuiltinPDFViewer</key>
936 <true/> | <false/>
937 </dict>
938 ```
939 #### policies.json
940 ```
941 {
942 "policies": {
943 "DisableBuiltinPDFViewer": true | false
944 }
945 }
946 ```
947 ### DisabledCiphers
948 Disable specific cryptographic ciphers.
949
950 **Compatibility:** Firefox 76, Firefox ESR 68.8\
951 **CCK2 Equivalent:** N/A\
952 **Preferences Affected:** N/A
953
954 #### Windows (GPO)
955 ```
956 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
957 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
958 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
959 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
961 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
962 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
963 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
965 ```
966 #### Windows (Intune)
967 OMA-URI:
968 ```
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
972 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
978 ```
979 Value (string):
980 ```
981 <enabled/> or <disabled/>
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisabledCiphers</key>
987 <dict>
988 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
989 <true/> | <false/>
990 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
991 <true/> | <false/>
992 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
993 <true/> | <false/>
994 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
995 <true/> | <false/>
996 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
997 <true/> | <false/>
998 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
999 <true/> | <false/>
1000 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1005 <true/> | <false/>
1006 </dict>
1007 </dict>
1008 ```
1009 #### policies.json
1010 ```
1011 {
1012 "policies": {
1013 "DisabledCiphers" {
1014 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1015 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1016 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1017 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1018 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1019 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1020 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1021 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1022 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1023 }
1024 }
1025 }
1026 ```
1027 ### DisableDefaultBrowserAgent
1028 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1029
1030 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1031 **CCK2 Equivalent:** N/A\
1032 **Preferences Affected:** N/A
1033
1034 #### Windows (GPO)
1035 ```
1036 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1037 ```
1038 #### Windows (Intune)
1039 OMA-URI:
1040 ```
1041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1042 ```
1043 Value (string):
1044 ```
1045 <enabled/> or <disabled/>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableDefaultBrowserAgent": true | false
1052 }
1053 }
1054 ```
1055 ### DisableDeveloperTools
1056 Remove access to all developer tools.
1057
1058 **Compatibility:** Firefox 60, Firefox ESR 60\
1059 **CCK2 Equivalent:** `removeDeveloperTools`\
1060 **Preferences Affected:** `devtools.policy.disabled`
1061
1062 #### Windows (GPO)
1063 ```
1064 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1065 ```
1066 #### Windows (Intune)
1067 OMA-URI:
1068 ```
1069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1070 ```
1071 Value (string):
1072 ```
1073 <enabled/> or <disabled/>
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisableDeveloperTools</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### policies.json
1083 ```
1084 {
1085 "policies": {
1086 "DisableDeveloperTools": true | false
1087 }
1088 }
1089 ```
1090 ### DisableFeedbackCommands
1091 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1092
1093 **Compatibility:** Firefox 60, Firefox ESR 60\
1094 **CCK2 Equivalent:** N/A\
1095 **Preferences Affected:** N/A
1096
1097 #### Windows (GPO)
1098 ```
1099 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1100 ```
1101 #### Windows (Intune)
1102 OMA-URI:
1103 ```
1104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1105 ```
1106 Value (string):
1107 ```
1108 <enabled/> or <disabled/>
1109 ```
1110 #### macOS
1111 ```
1112 <dict>
1113 <key>DisableFeedbackCommands</key>
1114 <true/> | <false/>
1115 </dict>
1116 ```
1117 #### policies.json
1118 ```
1119 {
1120 "policies": {
1121 "DisableFeedbackCommands": true | false
1122 }
1123 }
1124 ```
1125 ### DisableFirefoxScreenshots
1126 Remove access to Firefox Screenshots.
1127
1128 **Compatibility:** Firefox 60, Firefox ESR 60\
1129 **CCK2 Equivalent:** N/A\
1130 **Preferences Affected:** `extensions.screenshots.disabled`
1131
1132 #### Windows (GPO)
1133 ```
1134 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1135 ```
1136 #### Windows (Intune)
1137 OMA-URI:
1138 ```
1139 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1140 ```
1141 Value (string):
1142 ```
1143 <enabled/> or <disabled/>
1144 ```
1145 #### macOS
1146 ```
1147 <dict>
1148 <key>DisableFirefoxScreenshots</key>
1149 <true/> | <false/>
1150 </dict>
1151 ```
1152 #### policies.json
1153 ```
1154 {
1155 "policies": {
1156 "DisableFirefoxScreenshots": true | false
1157 }
1158 }
1159 ```
1160 ### DisableFirefoxAccounts
1161 Disable Firefox Accounts integration (Sync).
1162
1163 **Compatibility:** Firefox 60, Firefox ESR 60\
1164 **CCK2 Equivalent:** `disableSync`\
1165 **Preferences Affected:** `identity.fxaccounts.enabled`
1166
1167 #### Windows (GPO)
1168 ```
1169 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1170 ```
1171 #### Windows (Intune)
1172 OMA-URI:
1173 ```
1174 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1175 ```
1176 Value (string):
1177 ```
1178 <enabled/> or <disabled/>
1179 ```
1180 #### macOS
1181 ```
1182 <dict>
1183 <key>DisableFirefoxAccounts</key>
1184 <true/> | <false/>
1185 </dict>
1186 ```
1187 #### policies.json
1188 ```
1189 {
1190 "policies": {
1191 "DisableFirefoxAccounts": true | false
1192 }
1193 }
1194 ```
1195 ### DisableFirefoxStudies
1196 Disable Firefox studies (Shield).
1197
1198 **Compatibility:** Firefox 60, Firefox ESR 60\
1199 **CCK2 Equivalent:** N/A\
1200 **Preferences Affected:** N/A
1201
1202 #### Windows (GPO)
1203 ```
1204 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1205 ```
1206 #### Windows (Intune)
1207 OMA-URI:
1208 ```
1209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1210 ```
1211 Value (string):
1212 ```
1213 <enabled/> or <disabled/>
1214 ```
1215 #### macOS
1216 ```
1217 <dict>
1218 <key>DisableFirefoxStudies</key>
1219 <true/> | <false/>
1220 </dict>
1221 ```
1222 #### policies.json
1223 ```
1224 {
1225 "policies": {
1226 "DisableFirefoxStudies": true | false
1227 }
1228 }
1229 ```
1230 ### DisableForgetButton
1231 Disable the "Forget" button.
1232
1233 **Compatibility:** Firefox 60, Firefox ESR 60\
1234 **CCK2 Equivalent:** `disableForget`\
1235 **Preferences Affected:** N/A
1236
1237 #### Windows (GPO)
1238 ```
1239 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1240 ```
1241 #### Windows (Intune)
1242 OMA-URI:
1243 ```
1244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1245 ```
1246 Value (string):
1247 ```
1248 <enabled/> or <disabled/>
1249 ```
1250 #### macOS
1251 ```
1252 <dict>
1253 <key>DisableForgetButton</key>
1254 <true/> | <false/>
1255 </dict>
1256 ```
1257 #### policies.json
1258 ```
1259 {
1260 "policies": {
1261 "DisableForgetButton": true | false
1262 }
1263 }
1264 ```
1265 ### DisableFormHistory
1266 Turn off saving information on web forms and the search bar.
1267
1268 **Compatibility:** Firefox 60, Firefox ESR 60\
1269 **CCK2 Equivalent:** `disableFormFill`\
1270 **Preferences Affected:** ` browser.formfill.enable`
1271
1272 #### Windows (GPO)
1273 ```
1274 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1275 ```
1276 #### Windows (Intune)
1277 OMA-URI:
1278 ```
1279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1280 ```
1281 Value (string):
1282 ```
1283 <enabled/> or <disabled/>
1284 ```
1285 #### macOS
1286 ```
1287 <dict>
1288 <key>DisableFormHistory</key>
1289 <true/> | <false/>
1290 </dict>
1291 ```
1292 #### policies.json
1293 ```
1294 {
1295 "policies": {
1296 "DisableFormHistory": true | false
1297 }
1298 }
1299 ```
1300 ### DisablePasswordReveal
1301 Do not allow passwords to be shown in saved logins
1302
1303 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1304 **CCK2 Equivalent:** N/A
1305 **Preferences Affected:** N/A
1306
1307 #### Windows (GPO)
1308 ```
1309 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1310 ```
1311 #### Windows (Intune)
1312 OMA-URI:
1313 ```
1314 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1315 ```
1316 Value (string):
1317 ```
1318 <enabled/> or <disabled/>
1319 ```
1320 #### macOS
1321 ```
1322 <dict>
1323 <key>DisablePasswordReveal</key>
1324 <true/> | <false/>
1325 </dict>
1326 ```
1327 #### policies.json
1328 ```
1329 {
1330 "policies": {
1331 "DisablePasswordReveal": true | false
1332 }
1333 }
1334 ```
1335 ### DisablePocket
1336 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1337
1338 **Compatibility:** Firefox 60, Firefox ESR 60\
1339 **CCK2 Equivalent:** `disablePocket`\
1340 **Preferences Affected:** `extensions.pocket.enabled`
1341
1342 #### Windows (GPO)
1343 ```
1344 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1345 ```
1346 #### Windows (Intune)
1347 OMA-URI:
1348 ```
1349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1350 ```
1351 Value (string):
1352 ```
1353 <enabled/> or <disabled/>
1354 ```
1355 #### macOS
1356 ```
1357 <dict>
1358 <key>DisablePocket</key>
1359 <true/> | <false/>
1360 </dict>
1361 ```
1362 #### policies.json
1363 ```
1364 {
1365 "policies": {
1366 "DisablePocket": true | false
1367 }
1368 }
1369 ```
1370 ### DisablePrivateBrowsing
1371 Remove access to private browsing.
1372
1373 **Compatibility:** Firefox 60, Firefox ESR 60\
1374 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1375 **Preferences Affected:** N/A
1376
1377 #### Windows (GPO)
1378 ```
1379 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1380 ```
1381 #### Windows (Intune)
1382 OMA-URI:
1383 ```
1384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1385 ```
1386 Value (string):
1387 ```
1388 <enabled/> or <disabled/>
1389 ```
1390 #### macOS
1391 ```
1392 <dict>
1393 <key>DisablePrivateBrowsing</key>
1394 <true/> | <false/>
1395 </dict>
1396 ```
1397 #### policies.json
1398 ```
1399 {
1400 "policies": {
1401 "DisablePrivateBrowsing": true | false
1402 }
1403 }
1404 ```
1405 ### DisableProfileImport
1406 Disables the "Import data from another browser" option in the bookmarks window.
1407
1408 **Compatibility:** Firefox 60, Firefox ESR 60\
1409 **CCK2 Equivalent:** N/A\
1410 **Preferences Affected:** N/A
1411
1412 #### Windows (GPO)
1413 ```
1414 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1415 ```
1416 #### Windows (Intune)
1417 OMA-URI:
1418 ```
1419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1420 ```
1421 Value (string):
1422 ```
1423 <enabled/> or <disabled/>
1424 ```
1425 #### macOS
1426 ```
1427 <dict>
1428 <key>DisableProfileImport</key>
1429 <true/> | <false/>
1430 </dict>
1431 ```
1432 #### policies.json
1433 ```
1434 {
1435 "policies": {
1436 "DisableProfileImport": true | false
1437 }
1438 }
1439 ```
1440 ### DisableProfileRefresh
1441 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1442
1443 **Compatibility:** Firefox 60, Firefox ESR 60\
1444 **CCK2 Equivalent:** `disableResetFirefox`\
1445 **Preferences Affected:** `browser.disableResetPrompt`
1446
1447 #### Windows (GPO)
1448 ```
1449 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1450 ```
1451 #### Windows (Intune)
1452 OMA-URI:
1453 ```
1454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1455 ```
1456 Value (string):
1457 ```
1458 <enabled/> or <disabled/>
1459 ```
1460 #### macOS
1461 ```
1462 <dict>
1463 <key>DisableProfileRefresh</key>
1464 <true/> | <false/>
1465 </dict>
1466 ```
1467 #### policies.json
1468 ```
1469 {
1470 "policies": {
1471 "DisableProfileRefresh": true | false
1472 }
1473 }
1474 ```
1475 ### DisableSafeMode
1476 Disable safe mode within the browser.
1477
1478 On Windows, this disables safe mode via the command line as well.
1479
1480 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1481 **CCK2 Equivalent:** `disableSafeMode`\
1482 **Preferences Affected:** N/A
1483
1484 #### Windows (GPO)
1485 ```
1486 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1487 ```
1488 #### Windows (Intune)
1489 OMA-URI:
1490 ```
1491 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1492 ```
1493 Value (string):
1494 ```
1495 <enabled/> or <disabled/>
1496 ```
1497 #### macOS
1498 ```
1499 <dict>
1500 <key>DisableSafeMode</key>
1501 <true/> | <false/>
1502 </dict>
1503 ```
1504 #### policies.json
1505 ```
1506 {
1507 "policies": {
1508 "DisableSafeMode": true | false
1509 }
1510 }
1511 ```
1512 ### DisableSecurityBypass
1513 Prevent the user from bypassing security in certain cases.
1514
1515 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1516
1517 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1518
1519 **Compatibility:** Firefox 60, Firefox ESR 60\
1520 **CCK2 Equivalent:** N/A\
1521 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1522
1523 #### Windows (GPO)
1524 ```
1525 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1526 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1527 ```
1528 #### Windows (Intune)
1529 OMA-URI:
1530 ```
1531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1532 ```
1533 Value (string):
1534 ```
1535 <enabled/> or <disabled/>
1536 ```
1537 OMA-URI:
1538 ```
1539 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1540 ```
1541 Value (string):
1542 ```
1543 <enabled/> or <disabled/>
1544 ```
1545
1546 #### macOS
1547 ```
1548 <dict>
1549 <key>DisableSecurityBypass</key>
1550 <dict>
1551 <key>InvalidCertificate</key>
1552 <true/> | <false/>
1553 <key><SafeBrowsing/key>
1554 <true/> | <false/>
1555 </dict>
1556 </dict>
1557 ```
1558 #### policies.json
1559 ```
1560 {
1561 "policies": {
1562 "DisableSecurityBypass": {
1563 "InvalidCertificate": true | false,
1564 "SafeBrowsing": true | false
1565 }
1566 }
1567 }
1568 ```
1569 ### DisableSystemAddonUpdate
1570 Prevent system add-ons from being installed or update.
1571
1572 **Compatibility:** Firefox 60, Firefox ESR 60\
1573 **CCK2 Equivalent:** N/A\
1574 **Preferences Affected:** N/A
1575
1576 #### Windows (GPO)
1577 ```
1578 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1579 ```
1580 #### Windows (Intune)
1581 OMA-URI:
1582 ```
1583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1584 ```
1585 Value (string):
1586 ```
1587 <enabled/> or <disabled/>
1588 ```
1589 #### macOS
1590 ```
1591 <dict>
1592 <key>DisableSystemAddonUpdate</key>
1593 <true/> | <false/>
1594 </dict>
1595 ```
1596 #### policies.json
1597 ```
1598 {
1599 "policies": {
1600 "DisableSystemAddonUpdate": true | false
1601 }
1602 }
1603 ```
1604 ### DisableTelemetry
1605 Prevent the upload of telemetry data.
1606
1607 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1608
1609 **Compatibility:** Firefox 60, Firefox ESR 60\
1610 **CCK2 Equivalent:** `disableTelemetry`\
1611 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1612
1613 #### Windows (GPO)
1614 ```
1615 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1616 ```
1617 #### Windows (Intune)
1618 OMA-URI:
1619 ```
1620 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1621 ```
1622 Value (string):
1623 ```
1624 <enabled/> or <disabled/>
1625 ```
1626 #### macOS
1627 ```
1628 <dict>
1629 <key>DisableTelemetry</key>
1630 <true/> | <false/>
1631 </dict>
1632 ```
1633 #### policies.json
1634 ```
1635 {
1636 "policies": {
1637 "DisableTelemetry": true | false
1638 }
1639 }
1640 ```
1641 ### DisplayBookmarksToolbar
1642 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1643
1644 **Compatibility:** Firefox 60, Firefox ESR 60\
1645 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1646 **Preferences Affected:** N/A
1647
1648 #### Windows (GPO)
1649 ```
1650 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1651 ```
1652 #### Windows (Intune)
1653 OMA-URI:
1654 ```
1655 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1656 ```
1657 Value (string):
1658 ```
1659 <enabled/> or <disabled/>
1660 ```
1661 #### macOS
1662 ```
1663 <dict>
1664 <key>DisplayBookmarksToolbar</key>
1665 <true/> | <false/>
1666 </dict>
1667 ```
1668 #### policies.json
1669 ```
1670 {
1671 "policies": {
1672 "DisplayBookmarksToolbar": true | false
1673 }
1674 }
1675 ```
1676 ### DisplayMenuBar (Deprecated)
1677 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1678
1679 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1680 **CCK2 Equivalent:** `displayMenuBar`\
1681 **Preferences Affected:** N/A
1682
1683 #### Windows (GPO)
1684 ```
1685 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1686 ```
1687 #### macOS
1688 ```
1689 <dict>
1690 <key>DisplayMenuBar</key>
1691 <true/> | <false/>
1692 </dict>
1693 ```
1694 #### policies.json
1695 ```
1696 {
1697 "policies": {
1698 "DisplayMenuBar": true | false
1699 }
1700 }
1701 ```
1702 ### DisplayMenuBar
1703 Set the state of the menubar.
1704
1705 `always` means the menubar is shown and cannot be hidden.
1706
1707 `never` means the menubar is hidden and cannot be shown.
1708
1709 `default-on` means the menubar is on by default but can be hidden.
1710
1711 `default-off` means the menubar is off by default but can be shown.
1712
1713 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1714 **CCK2 Equivalent:** `displayMenuBar`\
1715 **Preferences Affected:** N/A
1716
1717 #### Windows (GPO)
1718 ```
1719 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1720 ```
1721 #### Windows (Intune)
1722 OMA-URI:
1723 ```
1724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1725 ```
1726 Value (string):
1727 ```
1728 <enabled/>
1729 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1730 ```
1731 #### macOS
1732 ```
1733 <dict>
1734 <key>DisplayMenuBar</key>
1735 <string>always | never | default-on | default-off</string>
1736 </dict>
1737 ```
1738 #### policies.json
1739 ```
1740 {
1741 "policies": {
1742 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1743 }
1744 }
1745 ```
1746 ### DNSOverHTTPS
1747 Configure DNS over HTTPS.
1748
1749 `Enabled` determines whether DNS over HTTPS is enabled
1750
1751 `ProviderURL` is a URL to another provider.
1752
1753 `Locked` prevents the user from changing DNS over HTTPS preferences.
1754
1755 `ExcludedDomains` excludes domains from DNS over HTTPS.
1756
1757 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1758 **CCK2 Equivalent:** N/A\
1759 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1760
1761 #### Windows (GPO)
1762 ```
1763 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1764 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1765 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1766 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1767 ```
1768 #### Windows (Intune)
1769 OMA-URI:
1770 ```
1771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1772 ```
1773 Value (string):
1774 ```
1775 <enabled/> or <disabled/>
1776 ```
1777 OMA-URI:
1778 ```
1779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1780 ```
1781 Value (string):
1782 ```
1783 <enabled/>
1784 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1785 ```
1786 OMA-URI:
1787 ```
1788 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1789 ```
1790 Value (string):
1791 ```
1792 <enabled/> or <disabled/>
1793 ```
1794 OMA-URI:
1795 ```
1796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1797 ```
1798 Value (string):
1799 ```
1800 <enabled/>
1801 <data id="List" value="1&#xF000;example.com"/>
1802 ```
1803 #### macOS
1804 ```
1805 <dict>
1806 <key>DNSOverHTTPS</key>
1807 <dict>
1808 <key>Enabled</key>
1809 <true/> | <false/>
1810 <key>ProviderURL</key>
1811 <string>URL_TO_ALTERNATE_PROVIDER</string>
1812 <key>Locked</key>
1813 <true/> | <false/>
1814 <key>ExcludedDomains</key>
1815 <array>
1816 <string>example.com</string>
1817 </array>
1818 </dict>
1819 </dict>
1820 ```
1821 #### policies.json
1822 ```
1823 {
1824 "policies": {
1825 "DNSOverHTTPS": {
1826 "Enabled": true | false,
1827 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1828 "Locked": true | false,
1829 "ExcludedDomains": ["example.com"]
1830 }
1831 }
1832 }
1833 ```
1834 ### DontCheckDefaultBrowser
1835 Don't check if Firefox is the default browser at startup.
1836
1837 **Compatibility:** Firefox 60, Firefox ESR 60\
1838 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1839 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1840
1841 #### Windows (GPO)
1842 ```
1843 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1844 ```
1845 #### Windows (Intune)
1846 OMA-URI:
1847 ```
1848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1849 ```
1850 Value (string):
1851 ```
1852 <enabled/> or <disabled/>
1853 ```
1854 #### macOS
1855 ```
1856 <dict>
1857 <key>DontCheckDefaultBrowser</key>
1858 <true/> | <false/>
1859 </dict>
1860 ```
1861 #### policies.json
1862 ```
1863 {
1864 "policies": {
1865 "DontCheckDefaultBrowser": true | false
1866 }
1867 }
1868 ```
1869 ### DefaultDownloadDirectory
1870 Set the default download directory.
1871
1872 You can use ${home} for the native home directory.
1873
1874 **Compatibility:** Firefox 68, Firefox ESR 68\
1875 **CCK2 Equivalent:** N/A\
1876 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1877
1878 #### Windows (GPO)
1879 ```
1880 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1881 ```
1882 #### Windows (Intune)
1883 OMA-URI:
1884 ```
1885 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1886 ```
1887 Value (string):
1888 ```
1889 <enabled/>
1890 <data id="Preferences_String" value="${home}\Downloads"/>
1891 ```
1892 #### macOS
1893 ```
1894 <dict>
1895 <key>DefaultDownloadDirectory</key>
1896 <string>${home}/Downloads</string>
1897 </dict>
1898 ```
1899 #### policies.json (macOS and Linux)
1900 ```
1901 {
1902 "policies": {
1903 "DefaultDownloadDirectory": "${home}/Downloads"
1904 }
1905 ```
1906 #### policies.json (Windows)
1907 ```
1908 {
1909 "policies": {
1910 "DefaultDownloadDirectory": "${home}\\Downloads"
1911 }
1912 ```
1913 ### DownloadDirectory
1914 Set and lock the download directory.
1915
1916 You can use ${home} for the native home directory.
1917
1918 **Compatibility:** Firefox 68, Firefox ESR 68\
1919 **CCK2 Equivalent:** N/A\
1920 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1921
1922 #### Windows (GPO)
1923 ```
1924 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1925 ```
1926 #### Windows (Intune)
1927 OMA-URI:
1928 ```
1929 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1930 ```
1931 Value (string):
1932 ```
1933 <enabled/>
1934 <data id="Preferences_String" value="${home}\Downloads"/>
1935 ```
1936 #### macOS
1937 ```
1938 <dict>
1939 <key>DownloadDirectory</key>
1940 <string>${home}/Downloads</string>
1941 </dict>
1942 ```
1943 #### policies.json (macOS and Linux)
1944 ```
1945 {
1946 "policies": {
1947 "DownloadDirectory": "${home}/Downloads"
1948 }
1949 ```
1950 #### policies.json (Windows)
1951 ```
1952 {
1953 "policies": {
1954 "DownloadDirectory": "${home}\\Downloads"
1955 }
1956 ```
1957 ### EnableTrackingProtection
1958 Configure tracking protection.
1959
1960 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1961
1962 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1963
1964 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1965
1966 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1967
1968 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1969
1970 `Exceptions` are origins for which tracking protection is not enabled.
1971
1972 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1973 **CCK2 Equivalent:** N/A\
1974 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1979 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1980 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1981 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1982 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1983 ```
1984 #### Windows (Intune)
1985 OMA-URI:
1986 ```
1987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1988 ```
1989 Value (string):
1990 ```
1991 <enabled/>
1992 <data id="TrackingProtectionLocked" value="true | false"/>
1993 <data id="Cryptomining" value="true | false"/>
1994 <data id="Fingerprinting" value="true | false"/>
1995 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1996 ```
1997 #### macOS
1998 ```
1999 <dict>
2000 <key>EnableTrackingProtection</key>
2001 <dict>
2002 <key>Value</key>
2003 <true/> | <false/>
2004 <key><Locked</key>
2005 <true/> | <false/>
2006 <key><Cryptomining</key>
2007 <true/> | <false/>
2008 <key><Fingerprinting</key>
2009 <true/> | <false/>
2010 <key>Exceptions</key>
2011 <array>
2012 <string>https://example.com</string>
2013 </array>
2014 </dict>
2015 </dict>
2016 ```
2017 #### policies.json
2018 ```
2019 {
2020 "policies": {
2021 "EnableTrackingProtection": {
2022 "Value": true | false,
2023 "Locked": true | false,
2024 "Cryptomining": true | false,
2025 "Fingerprinting": true | false,
2026 "Exceptions": ["https://example.com"]
2027 }
2028 }
2029 ```
2030 ### EncryptedMediaExtensions
2031 Enable or disable Encrypted Media Extensions and optionally lock it.
2032
2033 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2034
2035 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2036
2037 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2038 **CCK2 Equivalent:** N/A\
2039 **Preferences Affected:** `media.eme.enabled`
2040
2041 #### Windows (GPO)
2042 ```
2043 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2044 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2045 ```
2046 #### Windows (Intune)
2047 OMA-URI:
2048 ```
2049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2051 ```
2052 Value (string):
2053 ```
2054 <enabled/>or <disabled/>
2055 ```
2056 #### macOS
2057 ```
2058 <dict>
2059 <key>EncryptedMediaExtensions</key>
2060 <dict>
2061 <key>Enabled</key>
2062 <true/> | <false/>
2063 <key><Locked</key>
2064 <true/> | <false/>
2065 </dict>
2066 </dict>
2067 ```
2068 #### policies.json
2069 ```
2070 {
2071 "policies": {
2072 "EncryptedMediaExtensions": {
2073 "Enabled": true | false,
2074 "Locked": true | false
2075 }
2076 }
2077 ```
2078 ### EnterprisePoliciesEnabled
2079 Enable policy support on macOS.
2080
2081 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2082 **CCK2 Equivalent:** N/A\
2083 **Preferences Affected:** N/A
2084
2085 #### macOS
2086 ```
2087 <dict>
2088 <key>EnterprisePoliciesEnabled</key>
2089 <true/>
2090 </dict>
2091 ```
2092 ### Extensions
2093 Control the installation, uninstallation and locking of extensions.
2094
2095 `Install` is a list of URLs or native paths for extensions to be installed.
2096
2097 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2098
2099 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2100
2101 **Compatibility:** Firefox 60, Firefox ESR 60\
2102 **CCK2 Equivalent:** `addons`\
2103 **Preferences Affected:** N/A
2104
2105 #### Windows (GPO)
2106 ```
2107 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2108 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2109 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2110 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2111 ```
2112 #### macOS
2113 ```
2114 <dict>
2115 <key>Extensions</key>
2116 <dict>
2117 <key>Install</key>
2118 <array>
2119 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2120 <string>//path/to/xpi</string>
2121 </array>
2122 <key>Uninstall</key>
2123 <array>
2124 <string>bad_addon_id@mozilla.org</string>
2125 </array>
2126 <key>Locked</key>
2127 <array>
2128 <string>addon_id@mozilla.org</string>
2129 </array>
2130 </dict>
2131 </dict>
2132 ```
2133 #### policies.json
2134 ```
2135 {
2136 "policies": {
2137 "Extensions": {
2138 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2139 "Uninstall": ["bad_addon_id@mozilla.org"],
2140 "Locked": ["addon_id@mozilla.org"]
2141 }
2142 }
2143 }
2144 ```
2145 ### ExtensionSettings
2146 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2147
2148 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2149
2150 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2151
2152 The configuration for each extension is another dictionary that can contain the fields documented below.
2153
2154 | Name | Description |
2155 | --- | --- |
2156 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2157 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2158 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2159 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2160 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2161 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2162 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2163 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2164 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2165
2166 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2167 **CCK2 Equivalent:** N/A\
2168 **Preferences Affected:** N/A
2169
2170 #### Windows (GPO)
2171 ```
2172 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2173 {
2174 "*": {
2175 "blocked_install_message": "Custom error message.",
2176 "install_sources": ["https://addons.mozilla.org/"],
2177 "installation_mode": "blocked",
2178 "allowed_types": ["extension"]
2179 },
2180 "uBlock0@raymondhill.net": {
2181 "installation_mode": "force_installed",
2182 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2183 }
2184 }
2185 ```
2186 #### Windows (Intune)
2187 OMA-URI:
2188 ```
2189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2190 ```
2191 Value (string):
2192 ```
2193 <enabled/>
2194 <data id="ExtensionSettings" value='
2195 "*": {
2196 "blocked_install_message": "Custom error message.",
2197 "install_sources": ["https://addons.mozilla.org/"],
2198 "installation_mode": "blocked",
2199 "allowed_types": ["extension"]
2200 },
2201 "uBlock0@raymondhill.net": {
2202 "installation_mode": "force_installed",
2203 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2204 }'/>
2205 ```
2206 #### macOS
2207 ```
2208 <dict>
2209 <key>ExtensionSettings</key>
2210 <dict>
2211 <key>*</key>
2212 <dict>
2213 <key>blocked_install_message</key>
2214 <string>Custom error message.</string>
2215 <key>install_sources</key>
2216 <array>
2217 <string>https://addons.mozilla.org/</string>
2218 </array>
2219 <key>installation_mode</key>
2220 <string>blocked</string>
2221 <key>allowed_types</key>
2222 <array>
2223 <string>extension</string>
2224 </array>
2225 </dict>
2226 <key>uBlock0@raymondhill.net</key>
2227 <dict>
2228 <key>installation_mode</key>
2229 <string>force_installed</string>
2230 <key>install_url</key>
2231 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2232 </dict>
2233 </dict>
2234 </dict>
2235 ```
2236 #### policies.json
2237 ```
2238 {
2239 "policies": {
2240 "ExtensionSettings": {
2241 "*": {
2242 "blocked_install_message": "Custom error message.",
2243 "install_sources": ["https://addons.mozilla.org/"],
2244 "installation_mode": "blocked",
2245 "allowed_types": ["extension"]
2246 },
2247 "uBlock0@raymondhill.net": {
2248 "installation_mode": "force_installed",
2249 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2250 }
2251 }
2252 }
2253 }
2254 ```
2255 ### ExtensionUpdate
2256 Control extension updates.
2257
2258 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2259 **CCK2 Equivalent:** N/A\
2260 **Preferences Affected:** `extensions.update.enabled`
2261
2262 #### Windows (GPO)
2263 ```
2264 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2265 ```
2266 #### Windows (Intune)
2267 OMA-URI:
2268 ```
2269 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2270 ```
2271 Value (string):
2272 ```
2273 <enabled/> or <disabled/>
2274 ```
2275 #### macOS
2276 ```
2277 <dict>
2278 <key>ExtensionUpdate</key>
2279 <true/> | <false/>
2280 </dict>
2281 ```
2282 #### policies.json
2283 ```
2284 {
2285 "policies": {
2286 "ExtensionUpdate": true | false
2287 }
2288 }
2289 ```
2290 ### FlashPlugin
2291 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2292
2293 `Allow` is a list of origins where Flash are allowed.
2294
2295 `Block` is a list of origins where Flash is not allowed.
2296
2297 `Default` determines whether or not Flash is allowed by default.
2298
2299 `Locked` prevents the user from changing Flash preferences.
2300
2301 **Compatibility:** Firefox 60, Firefox ESR 60\
2302 **CCK2 Equivalent:** `permissions.plugin`\
2303 **Preferences Affected:** `plugin.state.flash`
2304
2305 #### Windows (GPO)
2306 ```
2307 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2308 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2309 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2310 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2311 ```
2312 #### Windows (Intune)
2313 OMA-URI:
2314 ```
2315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2316 ```
2317 Value (string):
2318 ```
2319 <enabled/>
2320 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2321 ```
2322 OMA-URI:
2323 ```
2324 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2325 ```
2326 Value (string):
2327 ```
2328 <enabled/> or <disabled/>
2329 ```
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2333 ```
2334 Value (string):
2335 ```
2336 <enabled/> or <disabled/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>FlashPlugin</key>
2342 <dict>
2343 <key>Allow</key>
2344 <array>
2345 <string>http://example.org</string>
2346 </array>
2347 <key>Block</key>
2348 <array>
2349 <string>http://example.edu</string>
2350 </array>
2351 <key>Default</key>
2352 <true/> | <false/>
2353 <key>Locked</key>
2354 <true/> | <false/>
2355 </dict>
2356 </dict>
2357 ```
2358 #### policies.json
2359 ```
2360 {
2361 "policies": {
2362 "FlashPlugin": {
2363 "Allow": ["http://example.org/"],
2364 "Block": ["http://example.edu/"],
2365 "Default": true | false,
2366 "Locked": true | false
2367 }
2368 }
2369 }
2370 ```
2371 ### FirefoxHome
2372 Customize the Firefox Home page.
2373
2374 **Compatibility:** Firefox 68, Firefox ESR 68\
2375 **CCK2 Equivalent:** N/A\
2376 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2377
2378 #### Windows (GPO)
2379 ```
2380 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2381 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2382 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2383 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2384 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2385 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2386 ```
2387 #### Windows (Intune)
2388 OMA-URI:
2389 ```
2390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2391 ```
2392 Value (string):
2393 ```
2394 <enabled/>
2395 <data id="FirefoxHome_Search" value="true | false"/>
2396 <data id="FirefoxHome_TopSites" value="true | false"/>
2397 <data id="FirefoxHome_Highlights" value="true | false"/>
2398 <data id="FirefoxHome_Pocket" value="true | false"/>
2399 <data id="FirefoxHome_Snippets" value="true | false"/>
2400 <data id="FirefoxHome_Locked" value="true | false"/>
2401 ```
2402 #### macOS
2403 ```
2404 <dict>
2405 <key>FirefoxHome</key>
2406 <dict>
2407 <key>Search</key>
2408 <true/> | <false/>
2409 <key>TopSites</key>
2410 <true/> | <false/>
2411 <key>Highlights</key>
2412 <true/> | <false/>
2413 <key>Pocket</key>
2414 <true/> | <false/>
2415 <key>Snippets</key>
2416 <true/> | <false/>
2417 <key>Locked</key>
2418 <true/> | <false/>
2419 </dict>
2420 </dict>
2421 ```
2422 #### policies.json
2423 ```
2424 {
2425 "policies": {
2426 "FirefoxHome": {
2427 "Search": true | false,
2428 "TopSites": true | false,
2429 "Highlights": true | false,
2430 "Pocket": true | false,
2431 "Snippets": true | false,
2432 "Locked": true | false
2433 }
2434 }
2435 }
2436 ```
2437 ### HardwareAcceleration
2438 Control hardware acceleration.
2439
2440 **Compatibility:** Firefox 60, Firefox ESR 60\
2441 **CCK2 Equivalent:** N/A\
2442 **Preferences Affected:** `layers.acceleration.disabled`
2443
2444 #### Windows (GPO)
2445 ```
2446 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2447 ```
2448 #### Windows (Intune)
2449 OMA-URI:
2450 ```
2451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2452 ```
2453 Value (string):
2454 ```
2455 <enabled/> or <disabled/>
2456 ```
2457 #### macOS
2458 ```
2459 <dict>
2460 <key>HardwareAcceleration</key>
2461 <true/> | <false/>
2462 </dict>
2463 ```
2464 #### policies.json
2465 ```
2466 {
2467 "policies": {
2468 "HardwareAcceleration": true | false
2469 }
2470 }
2471 ```
2472 ### Homepage
2473 Configure the default homepage and how Firefox starts.
2474
2475 `URL` is the default homepage.
2476
2477 `Locked` prevents the user from changing homepage preferences.
2478
2479 `Additional` allows for more than one homepage.
2480
2481 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2482
2483 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2484
2485 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2486 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2487 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2488
2489 #### Windows (GPO)
2490 ```
2491 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2492 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2493 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2494 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2495 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2496 ```
2497 #### Windows (Intune)
2498 OMA-URI:
2499 ```
2500 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2501 ```
2502 Value (string):
2503 ```
2504 <enabled/>
2505
2506 <data id="HomepageURL" value="https://example.com"/>
2507 <data id="HomepageLocked" value="true | false"/>
2508 ```
2509 OMA-URI:
2510 ```
2511 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2512 ```
2513 Value (string):
2514 ```
2515 <enabled/>
2516
2517 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2518 ```
2519 OMA-URI:
2520 ```
2521 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2522 ```
2523 Value (string):
2524 ```
2525 <enabled/>
2526
2527 <data id="StartPage" value="none | homepage | previous-session"/>
2528 ```
2529 #### macOS
2530 ```
2531 <dict>
2532 <key>Homepage</key>
2533 <dict>
2534 <key>URL</key>
2535 <string>http://example.com</string>
2536 <key>Locked</key>
2537 <true/> | <false/>
2538 <key>Additional</key>
2539 <array>
2540 <string>http://example.org</string>
2541 <string>http://example.edu</string>
2542 </array>
2543 <key>StartPage</key>
2544 <string>none | homepage | previous-session | homepage-locked</string>
2545 </dict>
2546 </dict>
2547 ```
2548 #### policies.json
2549 ```
2550 {
2551 "policies": {
2552 "Homepage": {
2553 "URL": "http://example.com/",
2554 "Locked": true | false,
2555 "Additional": ["http://example.org/",
2556 "http://example.edu/"],
2557 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2558 }
2559 }
2560 }
2561 ```
2562 ### InstallAddonsPermission
2563 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2564
2565 `Allow` is a list of origins where extension installs are allowed.
2566
2567 `Default` determines whether or not extension installs are allowed by default.
2568
2569 **Compatibility:** Firefox 60, Firefox ESR 60\
2570 **CCK2 Equivalent:** `permissions.install`\
2571 **Preferences Affected:** `xpinstall.enabled`
2572
2573 #### Windows (GPO)
2574 ```
2575 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2576 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2577 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2578 ```
2579 #### Windows (Intune)
2580 OMA-URI:
2581 ```
2582 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2583 ```
2584 Value (string):
2585 ```
2586 <enabled/>
2587 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2588 ```
2589 OMA-URI:
2590 ```
2591 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2592 ```
2593 Value (string):
2594 ```
2595 <enabled/>
2596 ```
2597 #### macOS
2598 ```
2599 <dict>
2600 <key>InstallAddonsPermission</key>
2601 <dict>
2602 <key>Allow</key>
2603 <array>
2604 <string>http://example.org</string>
2605 <string>http://example.edu</string>
2606 </array>
2607 <key>Default</key>
2608 <true/> | <false/>
2609 </dict>
2610 </dict>
2611 ```
2612 #### policies.json
2613 ```
2614 {
2615 "policies": {
2616 "InstallAddonsPermission": {
2617 "Allow": ["http://example.org/",
2618 "http://example.edu/"],
2619 "Default": true | false
2620 }
2621 }
2622 }
2623 ```
2624 ### LegacyProfiles
2625 Disable the feature enforcing a separate profile for each installation.
2626
2627 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2628
2629 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2630
2631 This policy only work on Windows via GPO (not policies.json).
2632
2633 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2634 **CCK2 Equivalent:** N/A\
2635 **Preferences Affected:** N/A
2636
2637 #### Windows (GPO)
2638 ```
2639 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2640 ```
2641 #### Windows (Intune)
2642 OMA-URI:
2643 ```
2644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2645 ```
2646 Value (string):
2647 ```
2648 <enabled/> or <disabled/>
2649 ```
2650 ### LocalFileLinks
2651 Enable linking to local files by origin.
2652
2653 **Compatibility:** Firefox 68, Firefox ESR 68\
2654 **CCK2 Equivalent:** N/A\
2655 **Preferences Affected:** `capability.policy.localfilelinks.*`
2656
2657 #### Windows (GPO)
2658 ```
2659 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2660 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2661 ```
2662 #### Windows (Intune)
2663 OMA-URI:
2664 ```
2665 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2666 ```
2667 Value (string):
2668 ```
2669 <enabled/>
2670 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2671 ```
2672 #### macOS
2673 ```
2674 <dict>
2675 <key>LocalFileLinks</key>
2676 <array>
2677 <string>http://example.org</string>
2678 <string>http://example.edu</string>
2679 </array>
2680 </dict>
2681 ```
2682 #### policies.json
2683 ```
2684 {
2685 "policies": {
2686 "LocalFileLinks": ["http://example.org/",
2687 "http://example.edu/"]
2688 }
2689 }
2690 ```
2691 ### NetworkPrediction
2692 Enable or disable network prediction (DNS prefetching).
2693
2694 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2695 **CCK2 Equivalent:** N/A\
2696 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2697
2698 #### Windows (GPO)
2699 ```
2700 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2701 ```
2702 #### Windows (Intune)
2703 OMA-URI:
2704 ```
2705 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2706 ```
2707 Value (string):
2708 ```
2709 <enabled/> or <disabled/>
2710 ```
2711 #### macOS
2712 ```
2713 <dict>
2714 <key>NetworkPrediction</key>
2715 <true/> | <false/>
2716 </dict>
2717 ```
2718 #### policies.json
2719 ```
2720 {
2721 "policies": {
2722 "NetworkPrediction": true | false
2723 }
2724 ```
2725 ### NewTabPage
2726 Enable or disable the New Tab page.
2727
2728 **Compatibility:** Firefox 68, Firefox ESR 68\
2729 **CCK2 Equivalent:** N/A\
2730 **Preferences Affected:** `browser.newtabpage.enabled`
2731
2732 #### Windows (GPO)
2733 ```
2734 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2735 ```
2736 #### Windows (Intune)
2737 OMA-URI:
2738 ```
2739 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2740 ```
2741 Value (string):
2742 ```
2743 <enabled/> or <disabled/>
2744 ```
2745 #### macOS
2746 ```
2747 <dict>
2748 <key>NewTabPage</key>
2749 <true/> | <false/>
2750 </dict>
2751 ```
2752 #### policies.json
2753 ```
2754 {
2755 "policies": {
2756 "NewTabPage": true | false
2757 }
2758 ```
2759 ### NoDefaultBookmarks
2760 Disable the creation of default bookmarks.
2761
2762 This policy is only effective if the user profile has not been created yet.
2763
2764 **Compatibility:** Firefox 60, Firefox ESR 60\
2765 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2766 **Preferences Affected:** N/A
2767
2768 #### Windows (GPO)
2769 ```
2770 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2771 ```
2772 #### Windows (Intune)
2773 OMA-URI:
2774 ```
2775 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2776 ```
2777 Value (string):
2778 ```
2779 <enabled/> or <disabled/>
2780 ```
2781 #### macOS
2782 ```
2783 <dict>
2784 <key>NoDefaultBookmarks</key>
2785 <true/> | <false/>
2786 </dict>
2787 ```
2788 #### policies.json
2789 ```
2790 {
2791 "policies": {
2792 "NoDefaultBookmarks": true | false
2793 }
2794 }
2795 ```
2796 ### OfferToSaveLogins
2797 Control whether or not Firefox offers to save passwords.
2798
2799 **Compatibility:** Firefox 60, Firefox ESR 60\
2800 **CCK2 Equivalent:** `dontRememberPasswords`\
2801 **Preferences Affected:** `signon.rememberSignons`
2802
2803 #### Windows (GPO)
2804 ```
2805 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2806 ```
2807 #### Windows (Intune)
2808 OMA-URI:
2809 ```
2810 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2811 ```
2812 Value (string):
2813 ```
2814 <enabled/> or <disabled/>
2815 ```
2816 #### macOS
2817 ```
2818 <dict>
2819 <key>OfferToSaveLogins</key>
2820 <true/> | <false/>
2821 </dict>
2822 ```
2823 #### policies.json
2824 ```
2825 {
2826 "policies": {
2827 "OfferToSaveLogins": true | false
2828 }
2829 }
2830 ```
2831 ### OfferToSaveLoginsDefault
2832 Sets the default value of signon.rememberSignons without locking it.
2833
2834 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2835 **CCK2 Equivalent:** `dontRememberPasswords`\
2836 **Preferences Affected:** `signon.rememberSignons`
2837
2838 #### Windows (GPO)
2839 ```
2840 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2841 ```
2842 #### Windows (Intune)
2843 OMA-URI:
2844 ```
2845 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2846 ```
2847 Value (string):
2848 ```
2849 <enabled/> or <disabled/>
2850 ```
2851 #### macOS
2852 ```
2853 <dict>
2854 <key>OfferToSaveLoginsDefault</key>
2855 <true/> | <false/>
2856 </dict>
2857 ```
2858 #### policies.json
2859 ```
2860 {
2861 "policies": {
2862 "OfferToSaveLoginsDefault": true | false
2863 }
2864 }
2865 ```
2866 ### OverrideFirstRunPage
2867 Override the first run page. If the value is blank, no first run page is displayed.
2868
2869 **Compatibility:** Firefox 60, Firefox ESR 60\
2870 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2871 **Preferences Affected:** `startup.homepage_welcome_url`
2872
2873 #### Windows (GPO)
2874 ```
2875 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2876 ```
2877 #### Windows (Intune)
2878 OMA-URI:
2879 ```
2880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2881 ```
2882 Value (string):
2883 ```
2884 <enabled/>
2885 <data id="OverridePage" value="https://example.com"/>
2886 ```
2887 #### macOS
2888 ```
2889 <dict>
2890 <key>OverrideFirstRunPage</key>
2891 <string>http://example.org</string>
2892 </dict>
2893 ```
2894 #### policies.json
2895 ```
2896 {
2897 "policies": {
2898 "OverrideFirstRunPage": "http://example.org"
2899 }
2900 ```
2901 ### OverridePostUpdatePage
2902 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2903
2904 **Compatibility:** Firefox 60, Firefox ESR 60\
2905 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2906 **Preferences Affected:** `startup.homepage_override_url`
2907
2908 #### Windows (GPO)
2909 ```
2910 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2911 ```
2912 #### Windows (Intune)
2913 OMA-URI:
2914 ```
2915 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2916 ```
2917 Value (string):
2918 ```
2919 <enabled/>
2920 <data id="OverridePage" value="https://example.com"/>
2921 ```
2922 #### macOS
2923 ```
2924 <dict>
2925 <key>OverridePostUpdatePage</key>
2926 <string>http://example.org</string>
2927 </dict>
2928 ```
2929 #### policies.json
2930 ```
2931 {
2932 "policies": {
2933 "OverridePostUpdatePage": "http://example.org"
2934 }
2935 ```
2936 ### PasswordManagerEnabled
2937 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2938
2939 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2940 **CCK2 Equivalent:** N/A\
2941 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2942
2943 #### Windows (GPO)
2944 ```
2945 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2946 ```
2947 #### Windows (Intune)
2948 OMA-URI:
2949 ```
2950 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2951 ```
2952 Value (string):
2953 ```
2954 <enabled/> or <disabled/>
2955 ```
2956 #### macOS
2957 ```
2958 <dict>
2959 <key>PasswordManagerEnabled</key>
2960 <true/> | <false/>
2961 </dict>
2962 ```
2963 #### policies.json
2964 ```
2965 {
2966 "policies": {
2967 "PasswordManagerEnabled": true | false
2968 }
2969 }
2970 ```
2971 ### PDFjs
2972 Disable or configure PDF.js, the built-in PDF viewer.
2973
2974 If `Enabled` is set to false, the built-in PDF viewer is disabled.
2975
2976 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
2977
2978 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
2979
2980 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2981 **CCK2 Equivalent:** N/A\
2982 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
2983
2984 #### Windows (GPO)
2985 ```
2986 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
2987 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
2988 ```
2989 #### Windows (Intune)
2990 OMA-URI:
2991 ```
2992 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
2993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
2994 ```
2995 Value (string):
2996 ```
2997 <enabled/>or <disabled/>
2998 ```
2999 #### macOS
3000 ```
3001 <dict>
3002 <key>PDFjs</key>
3003 <dict>
3004 <key>Enabled</key>
3005 <true/> | <false/>
3006 <key><EnablePermissions</key>
3007 <true/> | <false/>
3008 </dict>
3009 </dict>
3010 ```
3011 #### policies.json
3012 ```
3013 {
3014 "policies": {
3015 "PSFjs": {
3016 "Enabled": true | false,
3017 "EnablePermissions": true | false
3018 }
3019 }
3020 ```
3021 ### Permissions
3022 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3023
3024 `Allow` is a list of origins where the feature is allowed.
3025
3026 `Block` is a list of origins where the feature is not allowed.
3027
3028 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3029
3030 `Locked` prevents the user from changing preferences for the feature.
3031
3032 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3033
3034 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3035 **CCK2 Equivalent:** N/A\
3036 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3037
3038 #### Windows (GPO)
3039 ```
3040 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3041 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3042 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3043 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3044 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3045 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3046 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3047 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3048 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3049 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3050 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3051 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3052 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3053 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3054 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3055 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3056 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3057 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3058 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3059 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3060 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3061 ```
3062 #### Windows (Intune)
3063 OMA-URI:
3064 ```
3065 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3066 ```
3067 Value (string):
3068 ```
3069 <enabled/> or <disabled/>
3070 ```
3071 OMA-URI:
3072 ```
3073 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3074 ```
3075 Value (string):
3076 ```
3077 <enabled/> or <disabled/>
3078 ```
3079 OMA-URI:
3080 ```
3081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3082 ```
3083 Value (string):
3084 ```
3085 <enabled/>
3086 <data id="Permissions" value="1&#xF000;https://example.org"/>
3087 ```
3088 OMA-URI:
3089 ```
3090 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3091 ```
3092 Value (string):
3093 ```
3094 <enabled/> or <disabled/>
3095 ```
3096 OMA-URI:
3097 ```
3098 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3099 ```
3100 Value (string):
3101 ```
3102 <enabled/> or <disabled/>
3103 ```
3104 OMA-URI:
3105 ```
3106 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3107 ```
3108 Value (string):
3109 ```
3110 <enabled/>
3111 <data id="Permissions" value="1&#xF000;https://example.org"/>
3112 ```
3113 OMA-URI:
3114 ```
3115 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3116 ```
3117 Value (string):
3118 ```
3119 <enabled/>
3120 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3121 ```
3122 OMA-URI:
3123 ```
3124 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3125 ```
3126 Value (string):
3127 ```
3128 <enabled/>
3129 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3130 ```
3131 OMA-URI:
3132 ```
3133 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3134 ```
3135 Value (string):
3136 ```
3137 <enabled/> or <disabled/>
3138 ```
3139 #### macOS
3140 ```
3141 <dict>
3142 <key>Permissions</key>
3143 <dict>
3144 <key>Camera</key>
3145 <dict>
3146 <key>Allow</key>
3147 <array>
3148 <string>https://example.org</string>
3149 <string>https://example.org:1234</string>
3150 </array>
3151 <key>Block</key>
3152 <array>
3153 <string>https://example.edu</string>
3154 </array>
3155 <key>BlockNewRequests</key>
3156 <true/> | <false/>
3157 <key>Locked</key>
3158 <true/> | <false/>
3159 </dict>
3160 <key>Microphone</key>
3161 <dict>
3162 <key>Allow</key>
3163 <array>
3164 <string>https://example.org</string>
3165 </array>
3166 <key>Block</key>
3167 <array>
3168 <string>https://example.edu</string>
3169 </array>
3170 <key>BlockNewRequests</key>
3171 <true/> | <false/>
3172 <key>Locked</key>
3173 <true/> | <false/>
3174 </dict>
3175 <key>Location</key>
3176 <dict>
3177 <key>Allow</key>
3178 <array>
3179 <string>https://example.org</string>
3180 </array>
3181 <key>Block</key>
3182 <array>
3183 <string>https://example.edu</string>
3184 </array>
3185 <key>BlockNewRequests</key>
3186 <true/> | <false/>
3187 <key>Locked</key>
3188 <true/> | <false/>
3189 </dict>
3190 <key>Notifications</key>
3191 <dict>
3192 <key>Allow</key>
3193 <array>
3194 <string>https://example.org</string>
3195 </array>
3196 <key>Block</key>
3197 <array>
3198 <string>https://example.edu</string>
3199 </array>
3200 <key>BlockNewRequests</key>
3201 <true/>
3202 <key>Locked</key>
3203 <true/>
3204 </dict>
3205 <key>Autoplay</key>
3206 <dict>
3207 <key>Allow</key>
3208 <array>
3209 <string>https://example.org</string>
3210 </array>
3211 <key>Block</key>
3212 <array>
3213 <string>https://example.edu</string>
3214 </array>
3215 <key>Default</key>
3216 <string>allow-audio-video | block-audio | block-audio-video</string>
3217 <key>Locked</key>
3218 <true/> | <false/>
3219 </dict>
3220 </dict>
3221 </dict>
3222 ```
3223 #### policies.json
3224 ```
3225 {
3226 "policies": {
3227 "Permissions": {
3228 "Camera": {
3229 "Allow": ["https://example.org","https://example.org:1234"],
3230 "Block": ["https://example.edu"],
3231 "BlockNewRequests": true | false,
3232 "Locked": true | false
3233 },
3234 "Microphone": {
3235 "Allow": ["https://example.org"],
3236 "Block": ["https://example.edu"],
3237 "BlockNewRequests": true | false,
3238 "Locked": true | false
3239 },
3240 "Location": {
3241 "Allow": ["https://example.org"],
3242 "Block": ["https://example.edu"],
3243 "BlockNewRequests": true | false,
3244 "Locked": true | false
3245 },
3246 "Notifications": {
3247 "Allow": ["https://example.org"],
3248 "Block": ["https://example.edu"],
3249 "BlockNewRequests": true | false,
3250 "Locked": true | false
3251 },
3252 "Autoplay": {
3253 "Allow": ["https://example.org"],
3254 "Block": ["https://example.edu"],
3255 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3256 "Locked": true | false
3257 }
3258 }
3259 }
3260 }
3261 ```
3262 ### PictureInPicture
3263
3264 Enable or disable Picture-in-Picture.
3265
3266 **Compatibility:** Firefox 78, Firefox ESR 78\
3267 **CCK2 Equivalent:** N/A\
3268 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3269
3270 #### Windows (GPO)
3271 ```
3272 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3273 ```
3274 #### Windows (Intune)
3275 OMA-URI:
3276 ```
3277 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3278 ```
3279 Value (string):
3280 ```
3281 <enabled/> or <disabled/>
3282 ```
3283 #### macOS
3284 ```
3285 <dict>
3286 <key>PictureInPicture</key>
3287 <true/> | <false/>
3288 </dict>
3289 ```
3290 #### policies.json
3291 ```
3292 {
3293 "policies": {
3294 "PictureInPicture": true | false
3295 }
3296 }
3297 ```
3298 ### PopupBlocking
3299 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3300
3301 `Allow` is a list of origins where popup-windows are allowed.
3302
3303 `Default` determines whether or not pop-up windows are allowed by default.
3304
3305 `Locked` prevents the user from changing pop-up preferences.
3306
3307 **Compatibility:** Firefox 60, Firefox ESR 60\
3308 **CCK2 Equivalent:** `permissions.popup`\
3309 **Preferences Affected:** `dom.disable_open_during_load`
3310
3311 #### Windows (GPO)
3312 ```
3313 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3314 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3315 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3316 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3317 ```
3318 #### Windows (Intune)
3319 OMA-URI:
3320 ```
3321 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3322 ```
3323 Value (string):
3324 ```
3325 <enabled/>
3326 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3327 ```
3328 OMA-URI:
3329 ```
3330 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3331 ```
3332 Value (string):
3333 ```
3334 <enabled/> or <disabled/>
3335 ```
3336 OMA-URI:
3337 ```
3338 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3339 ```
3340 Value (string):
3341 ```
3342 <enabled/> or <disabled/>
3343 ```
3344 #### macOS
3345 ```
3346 <dict>
3347 <key>PopupBlocking</key>
3348 <dict>
3349 <key>Allow</key>
3350 <array>
3351 <string>http://example.org</string>
3352 <string>http://example.edu</string>
3353 </array>
3354 <key>Default</key>
3355 <true/> | <false/>
3356 <key>Locked</key>
3357 <true/> | <false/>
3358 </dict>
3359 </dict>
3360 ```
3361 #### policies.json
3362 ```
3363 {
3364 "policies": {
3365 "PopupBlocking": {
3366 "Allow": ["http://example.org/",
3367 "http://example.edu/"],
3368 "Default": true | false,
3369 "Locked": true | false
3370 }
3371 }
3372 }
3373 ```
3374 ### Preferences
3375 Set and lock certain preferences.
3376
3377 **Compatibility:** See below\
3378 **CCK2 Equivalent:** `preferences`\
3379 **Preferences Affected:** See below
3380
3381 | Preference | Type | Compatibility | Default
3382 | --- | --- | --- | ---
3383 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3384 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3385 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3386 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3387 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3388 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3389 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3390 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3391 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3392 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3393 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3394 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3395 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3396 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3397 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3398 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3399 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3400 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3401 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3402 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3403 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3404 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3405 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3406 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3407 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3408 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3409 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3410 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3411 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3412 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3413 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3414 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3415 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3416 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3417 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3418 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3419 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3420 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3421 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3422 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3423 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3424 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3425 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3426 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3427 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3428 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3429 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3430 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3431 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3432 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3433 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3434 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3435 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3436 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3437 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3438 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3439 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3440 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3441 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3442 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3443 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3444 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3445 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3446 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3447 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3448 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3449 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3450 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3451 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3452 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3453 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3454 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3455 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3456 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3457 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3458 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3459 disabled
3460 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3461 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3462 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3463 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3464 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3465 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3466 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3467 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3468 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3469 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3470 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3471 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3472 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3473 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3474 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3475 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3476 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3477 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3478 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3479 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3480 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3481 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3482 #### Windows (GPO)
3483 ```
3484 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3485 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3486 ```
3487 #### Windows (Intune)
3488 OMA-URI: (periods are replaced by underscores)
3489 ```
3490 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3491 ```
3492 Value (string):
3493 ```
3494 <enabled/> or <disabled/>
3495 ```
3496 #### macOS
3497 ```
3498 <dict>
3499 <key>Preferences</key>
3500 <dict>
3501 <key>boolean_preference_name</key>
3502 <true/> | <false/>
3503 <key>string_preference_name</key>
3504 <string>string_value</string>
3505 </dict>
3506 </dict>
3507 ```
3508 #### policies.json
3509 ```
3510 {
3511 "policies": {
3512 "Preferences": {
3513 "boolean_preference_name": true | false,
3514 "string_preference_name": "string_value"
3515 }
3516 }
3517 }
3518 ```
3519 ### PromptForDownloadLocation
3520 Ask where to save each file before downloading.
3521
3522 **Compatibility:** Firefox 68, Firefox ESR 68\
3523 **CCK2 Equivalent:** N/A\
3524 **Preferences Affected:** `browser.download.useDownloadDir`
3525
3526 #### Windows (GPO)
3527 ```
3528 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3529 ```
3530 #### Windows (Intune)
3531 OMA-URI:
3532 ```
3533 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3534 ```
3535 Value (string):
3536 ```
3537 <enabled/> or <disabled/>
3538 ```
3539 #### macOS
3540 ```
3541 <dict>
3542 <key>PromptForDownloadLocation</key>
3543 <true/> | <false/>
3544 </dict>
3545 ```
3546 #### policies.json
3547 ```
3548 {
3549 "policies": {
3550 "PromptForDownloadLocation": true | false
3551 }
3552 }
3553 ```
3554 ### Proxy
3555 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3556 To specify ports, append them to the hostnames with a colon (:).
3557
3558 `Mode` is the proxy method being used.
3559
3560 `Locked` is whether or not proxy settings can be changed.
3561
3562 `HTTPProxy` is the HTTP proxy server.
3563
3564 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3565
3566 `SSLProxy` is the SSL proxy server.
3567
3568 `FTPProxy` is the FTP proxy server.
3569
3570 `SOCKSProxy` is the SOCKS proxy server
3571
3572 `SOCKSVersion` is the SOCKS version (4 or 5)
3573
3574 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3575
3576 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3577
3578 `AutoLogin` means do not prompt for authentication if password is saved.
3579
3580 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3581
3582 **Compatibility:** Firefox 60, Firefox ESR 60\
3583 **CCK2 Equivalent:** `networkProxy*`\
3584 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3585
3586 #### Windows (GPO)
3587 ```
3588 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3589 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3590 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3591 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3592 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3593 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3594 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3595 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3596 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3597 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3598 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3599 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3600 ```
3601 #### Windows (Intune)
3602 OMA-URI:
3603 ```
3604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3605 ```
3606 Value (string):
3607 ```
3608 <enabled/>
3609 <data id="ProxyLocked" value="true | false"/>
3610 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3611 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3612 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3613 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3614 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3615 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3616 <data id="SOCKSVersion" value="4 | 5"/>
3617 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3618 <data id="Passthrough" value="<local>"/>
3619 <data id="AutoLogin" value="true | false"/>
3620 <data id="UseProxyForDNS" value="true | false"/>
3621 ```
3622 #### macOS
3623 ```
3624 <dict>
3625 <key>Proxy</key>
3626 <dict>
3627 <key>Mode</key>
3628 <string>none | system | manual | autoDetect | autoConfig</string>
3629 <key>Locked</key>
3630 <true> | </false>
3631 <key>HTTPProxy</key>
3632 <string>https://httpproxy.example.com</string>
3633 <key>UseHTTPProxyForAllProtocols</key>
3634 <true> | </false>
3635 <key>SSLProxy</key>
3636 <string>https://sslproxy.example.com</string>
3637 <key>FTPProxy</key>
3638 <string>https://ftpproxy.example.com</string>
3639 <key>SOCKSProxy</key>
3640 <string>https://socksproxy.example.com</string>
3641 <key>SOCKSVersion</key>
3642 <string>4 | 5</string>
3643 <key>Passthrough</key>
3644 <string>&lt;local>&gt;</string>
3645 <key>AutoConfigURL</key>
3646 <string>URL_TO_AUTOCONFIG</string>
3647 <key>AutoLogin</key>
3648 <true> | </false>
3649 <key>UseProxyForDNS</key>
3650 <true> | </false>
3651 </dict>
3652 </dict>
3653 ```
3654 #### policies.json
3655 ```
3656 {
3657 "policies": {
3658 "Proxy": {
3659 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3660 "Locked": true | false,
3661 "HTTPProxy": "hostname",
3662 "UseHTTPProxyForAllProtocols": true | false,
3663 "SSLProxy": "hostname",
3664 "FTPProxy": "hostname",
3665 "SOCKSProxy": "hostname",
3666 "SOCKSVersion": 4 | 5
3667 "Passthrough": "<local>",
3668 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3669 "AutoLogin": true | false,
3670 "UseProxyForDNS": true | false
3671 }
3672 }
3673 }
3674 ```
3675 ### RequestedLocales
3676 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3677
3678 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3679
3680 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3681 **CCK2 Equivalent:** N/A\
3682 **Preferences Affected:** N/A
3683 #### Windows (GPO)
3684 ```
3685 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3686 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3687
3688 or
3689
3690 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3691 ```
3692 #### Windows (Intune)
3693 OMA-URI:
3694 ```
3695 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3696 ```
3697 Value (string):
3698 ```
3699 <enabled/>
3700 <data id="Preferences_String" value="de,en-US"/>
3701 ```
3702 #### macOS
3703 ```
3704 <dict>
3705 <key>RequestedLocales</key>
3706 <array>
3707 <string>de</string>
3708 <string>en-US</string>
3709 </array>
3710 </dict>
3711
3712 or
3713
3714 <dict>
3715 <key>RequestedLocales</key>
3716 <string>de,en-US</string>
3717 </dict>
3718
3719 ```
3720 #### policies.json
3721 ```
3722 {
3723 "policies": {
3724 "RequestedLocales": ["de", "en-US"]
3725 }
3726 }
3727
3728 or
3729
3730 {
3731 "policies": {
3732 "RequestedLocales": "de,en-US"
3733 }
3734 }
3735 ```
3736 <a name="SanitizeOnShutdown"></a>
3737
3738 ### SanitizeOnShutdown (Selective)
3739 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3740
3741 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3742
3743 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3744 **CCK2 Equivalent:** N/A\
3745 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3746 #### Windows (GPO)
3747 ```
3748 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3749 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3750 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3751 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3752 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3753 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3754 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3755 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3756 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3757 ```
3758 #### Windows (Intune)
3759 OMA-URI:
3760 ```
3761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3762 ```
3763 Value (string):
3764 ```
3765 <enabled/> or <disabled/>
3766 ```
3767 #### macOS
3768 ```
3769 <dict>
3770 <key>SanitizeOnShutdown</key>
3771 <dict>
3772 <key>Cache</key>
3773 <true/> | <false/>
3774 <key>Cookies</key>
3775 <true/> | <false/>
3776 <key>Downloads</key>
3777 <true/> | <false/>
3778 <key>FormData</key>
3779 <true/> | <false/>
3780 <key>History</key>
3781 <true/> | <false/>
3782 <key>Sessions</key>
3783 <true/> | <false/>
3784 <key>SiteSettings</key>
3785 <true/> | <false/>
3786 <key>OfflineApps</key>
3787 <true/> | <false/>
3788 <key>Locked</key>
3789 <true/> | <false/>
3790 </dict>
3791 </dict>
3792 ```
3793 #### policies.json
3794 ```
3795 {
3796 "policies": {
3797 "SanitizeOnShutdown": {
3798 "Cache": true | false,
3799 "Cookies": true | false,
3800 "Downloads": true | false,
3801 "FormData": true | false,
3802 "History": true | false,
3803 "Sessions": true | false,
3804 "SiteSettings": true | false,
3805 "OfflineApps": true | false,
3806 "Locked": true | false
3807 }
3808 }
3809 }
3810 ```
3811 ### SanitizeOnShutdown (All)
3812 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3813
3814 **Compatibility:** Firefox 60, Firefox ESR 60\
3815 **CCK2 Equivalent:** N/A\
3816 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3817 #### Windows (GPO)
3818 ```
3819 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3820 ```
3821 #### Windows (Intune)
3822 OMA-URI:
3823 ```
3824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3825 ```
3826 Value (string):
3827 ```
3828 <enabled/> or <disabled/>
3829 ```
3830 #### macOS
3831 ```
3832 <dict>
3833 <key>SanitizeOnShutdown</key>
3834 <true/> | <false/>
3835 </dict>
3836 ```
3837 #### policies.json
3838 ```
3839 {
3840 "policies": {
3841 "SanitizeOnShutdown": true | false
3842 }
3843 }
3844 ```
3845 ### SearchBar
3846 Set whether or not search bar is displayed.
3847
3848 **Compatibility:** Firefox 60, Firefox ESR 60\
3849 **CCK2 Equivalent:** `showSearchBar`\
3850 **Preferences Affected:** N/A
3851
3852 #### Windows (GPO)
3853 ```
3854 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3855 ```
3856
3857 #### Windows (Intune)
3858 OMA-URI:
3859 ```
3860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3861 ```
3862 Value (string):
3863 ```
3864 <enabled/>
3865 <data id="Permissions" value="unified | separate"/>
3866 #### macOS
3867 ```
3868 <dict>
3869 <key>SearchBar</key>
3870 <string>unified | separate</string>
3871 </dict>
3872 ```
3873 #### policies.json
3874 ```
3875 {
3876 "policies": {
3877 "SearchBar": "unified" | "separate"
3878 }
3879 }
3880 ```
3881 <a name="SearchEngines"></a>
3882
3883 ### SearchEngines (This policy is only available on the ESR.)
3884
3885 ### SearchEngines | Default
3886
3887 Set the default search engine. This policy is only available on the ESR.
3888
3889 **Compatibility:** Firefox ESR 60\
3890 **CCK2 Equivalent:** `defaultSearchEngine`\
3891 **Preferences Affected:** N/A
3892
3893 #### Windows (GPO)
3894 ```
3895 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3896 ```
3897 #### Windows (Intune)
3898 OMA-URI:
3899 ```
3900 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3901 ```
3902 Value (string):
3903 ```
3904 <enabled/>
3905 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3906 ```
3907 #### macOS
3908 ```
3909 <dict>
3910 <key>SearchEngines</key>
3911 <dict>
3912 <key>Default</key>
3913 <string>NAME_OF_SEARCH_ENGINE</string>
3914 </dict>
3915 </dict>
3916 ```
3917 #### policies.json
3918 ```
3919 {
3920 "policies": {
3921 "SearchEngines": {
3922 "Default": "NAME_OF_SEARCH_ENGINE"
3923 }
3924 }
3925 }
3926 ```
3927 ### SearchEngines | PreventInstalls
3928
3929 Prevent installing search engines from webpages.
3930
3931 **Compatibility:** Firefox ESR 60\
3932 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3933 **Preferences Affected:** N/A
3934
3935 #### Windows (GPO)
3936 ```
3937 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3938 ```
3939 #### Windows (Intune)
3940 OMA-URI:
3941 ```
3942 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3943 ```
3944 Value (string):
3945 ```
3946 <enabled/> or <disabled/>
3947 ```
3948 #### macOS
3949 ```
3950 <dict>
3951 <key>SearchEngines</key>
3952 <dict>
3953 <key>PreventInstalls</key>
3954 <true/> | <false/>
3955 </dict>
3956 </dict>
3957 ```
3958 #### policies.json
3959 ```
3960 {
3961 "policies": {
3962 "SearchEngines": {
3963 "PreventInstalls": true | false
3964 }
3965 }
3966 }
3967 ```
3968 ### SearchEngines | Remove
3969
3970 Hide built-in search engines. This policy is only available on the ESR.
3971
3972 **Compatibility:** Firefox ESR 60.2\
3973 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3974 **Preferences Affected:** N/A
3975
3976 #### Windows (GPO)
3977 ```
3978 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3979 ```
3980 #### Windows (Intune)
3981 OMA-URI:
3982 ```
3983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3984 ```
3985 Value (string):
3986 ```
3987 <enabled/>
3988 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3989 ```
3990 #### macOS
3991 ```
3992 <dict>
3993 <key>SearchEngines</key>
3994 <dict>
3995 <key>Remove</key>
3996 <array>
3997 <string>NAME_OF_SEARCH_ENGINE</string>
3998 </array>
3999 </dict>
4000 </dict>
4001 ```
4002 #### policies.json
4003 ```
4004 {
4005 "policies": {
4006 "SearchEngines": {
4007 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4008 }
4009 }
4010 }
4011 ```
4012 ### SearchEngines | Add
4013
4014 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4015
4016 `Name` is the name of the search engine.
4017
4018 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4019
4020 `Method` is either GET or POST
4021
4022 `IconURL` is a URL for the icon to use.
4023
4024 `Alias` is a keyword to use for the engine.
4025
4026 `Description` is a description of the search engine.
4027
4028 `PostData` is the POST data as name value pairs separated by &.
4029
4030 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4031
4032 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4033 **CCK2 Equivalent:** `searchplugins`\
4034 **Preferences Affected:** N/A
4035
4036 #### Windows (GPO)
4037 ```
4038 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4039 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4040 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4041 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4042 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4043 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4044 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4045 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4046 ```
4047 #### Windows (Intune)
4048 OMA-URI:
4049 ```
4050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4051 ```
4052 Value (string):
4053 ```
4054 <enabled/>
4055 <data id="SearchEngine_Name" value="Example1"/>
4056 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4057 <data id="SearchEngine_Method" value="GET | POST"/>
4058 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4059 <data id="SearchEngine_Alias" value="example"/>
4060 <data id="SearchEngine_Description" value="Example Description"/>
4061 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4062 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4063 ```
4064 #### macOS
4065 ```
4066 <dict>
4067 <key>SearchEngines</key>
4068 <dict>
4069 <key>Add</key>
4070 <array>
4071 <dict>
4072 <key>Name</key>
4073 <string>Example1</string>
4074 <key>URLTemplate</key>
4075 <string>https://www.example.org/q={searchTerms}</string>
4076 <key>Method</key>
4077 <string>GET | POST </string>
4078 <key>IconURL</key>
4079 <string>https://www.example.org/favicon.ico</string>
4080 <key>Alias</key>
4081 <string>example</string>
4082 <key>Description</key>
4083 <string>Example Description</string>
4084 <key>SuggestURLTemplate</key>
4085 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4086 <key>PostData</key>
4087 <string>name=value&q={searchTerms}</string>
4088 </dict>
4089 <array>
4090 </dict>
4091 </dict>
4092 ```
4093 #### policies.json
4094 ```
4095 {
4096 "policies": {
4097 "SearchEngines": {
4098 "Add": [
4099 {
4100 "Name": "Example1",
4101 "URLTemplate": "https://www.example.org/q={searchTerms}",
4102 "Method": "GET" | "POST",
4103 "IconURL": "https://www.example.org/favicon.ico",
4104 "Alias": "example",
4105 "Description": "Description",
4106 "PostData": "name=value&q={searchTerms}",
4107 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4108 }
4109 ]
4110 }
4111 }
4112 }
4113 ```
4114 ### SearchSuggestEnabled
4115
4116 Enable search suggestions.
4117
4118 **Compatibility:** Firefox 68, Firefox ESR 68\
4119 **CCK2 Equivalent:** N/A\
4120 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4121
4122 #### Windows (GPO)
4123 ```
4124 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4125 ```
4126 #### Windows (Intune)
4127 OMA-URI:
4128 ```
4129 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4130 ```
4131 Value (string):
4132 ```
4133 <enabled/> or <disabled/>
4134 ```
4135 #### macOS
4136 ```
4137 <dict>
4138 <key>SearchSuggestEnabled</key>
4139 <true/> | <false/>
4140 </dict>
4141 ```
4142 #### policies.json
4143 ```
4144 {
4145 "policies": {
4146 "SearchSuggestEnabled": true | false
4147 }
4148 }
4149 ```
4150 ### SecurityDevices
4151
4152 Install PKCS #11 modules.
4153
4154 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4155 **CCK2 Equivalent:** `certs.devices`\
4156 **Preferences Affected:** N/A
4157
4158 #### Windows (GPO)
4159 ```
4160 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4161 ```
4162 #### Windows (Intune)
4163 OMA-URI:
4164 ```
4165 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4166 ```
4167 Value (string):
4168 ```
4169 <enabled/>
4170 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4171 ```
4172 #### macOS
4173 ```
4174 <dict>
4175 <key>SecurityDevices</key>
4176 <dict>
4177 <key>NAME_OF_DEVICE</key>
4178 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4179 </dict>
4180 </dict>
4181 ```
4182
4183 #### policies.json
4184 ```
4185 {
4186 "policies": {
4187 "SecurityDevices": {
4188 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4189 }
4190 }
4191 }
4192 ```
4193 ### SSLVersionMax
4194
4195 Set and lock the maximum version of TLS.
4196
4197 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4198 **CCK2 Equivalent:** N/A\
4199 **Preferences Affected:** `security.tls.version.max`
4200
4201 #### Windows (GPO)
4202 ```
4203 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4204 ```
4205 #### Windows (Intune)
4206 OMA-URI:
4207 ```
4208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4209 ```
4210 Value (string):
4211 ```
4212 <enabled/>
4213 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4214 ```
4215 #### macOS
4216 ```
4217 <dict>
4218 <key>SSLVersionMax</key>
4219 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4220 </dict>
4221 ```
4222
4223 #### policies.json
4224 ```
4225 {
4226 "policies": {
4227 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4228 }
4229 }
4230 ```
4231 ### SSLVersionMin
4232
4233 Set and lock the minimum version of TLS.
4234
4235 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4236 **CCK2 Equivalent:** N/A\
4237 **Preferences Affected:** `security.tls.version.min`
4238
4239 #### Windows (GPO)
4240 ```
4241 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4242 ```
4243 #### Windows (Intune)
4244 OMA-URI:
4245 ```
4246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4247 ```
4248 Value (string):
4249 ```
4250 <enabled/>
4251 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4252 ```
4253 #### macOS
4254 ```
4255 <dict>
4256 <key>SSLVersionMin</key>
4257 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4258 </dict>
4259 ```
4260
4261 #### policies.json
4262 ```
4263 {
4264 "policies": {
4265 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4266 }
4267 }
4268 ```
4269 ### SupportMenu
4270 Add a menuitem to the help menu for specifying support information.
4271
4272 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4273 **CCK2 Equivalent:** helpMenu\
4274 **Preferences Affected:** N/A
4275
4276 #### Windows (GPO)
4277 ```
4278 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4279 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4280 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4281 ```
4282 #### Windows (Intune)
4283 OMA-URI:
4284 ```
4285 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4286 ```
4287 Value (string):
4288 ```
4289 <enabled/>
4290 <data id="SupportMenuTitle" value="Support Menu"/>
4291 <data id="SupportMenuURL" value="http://example.com/support"/>
4292 <data id="SupportMenuAccessKey" value="S">
4293 ```
4294 #### macOS
4295 ```
4296 <dict>
4297 <key>SupportMenu</key>
4298 <dict>
4299 <key>Title</key>
4300 <string>SupportMenu</string>
4301 <key>URL</key>
4302 <string>http://example.com/support</string>
4303 <key>AccessKey</key>
4304 <string>S</string>
4305 </dict>
4306 </dict>
4307 ```
4308 #### policies.json
4309 ```
4310 {
4311 "policies": {
4312 "SupportMenu": {
4313 "Title": "Support Menu",
4314 "URL": "http://example.com/support",
4315 "AccessKey": "S"
4316 }
4317 }
4318 }
4319 ```
4320 ### UserMessaging
4321
4322 Prevent installing search engines from webpages.
4323
4324 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4325
4326 `ExtensionRecommendations` Don't recommend extensions.
4327
4328 `FeatureRecommendations` Don't recommend browser features.
4329
4330 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4331
4332 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4333 **CCK2 Equivalent:** N/A\
4334 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4335
4336 #### Windows (GPO)
4337 ```
4338 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4339 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4340 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4341 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4342 ```
4343 #### Windows (Intune)
4344 OMA-URI:
4345 ```
4346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4348 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4350 ```
4351 Value (string):
4352 ```
4353 <enabled/> or <disabled/>
4354 ```
4355 #### macOS
4356 ```
4357 <dict>
4358 <key>UserMessaging</key>
4359 <dict>
4360 <key>WhatsNew</key>
4361 <true/> | <false/>
4362 <key>ExtensionRecommendations</key>
4363 <true/> | <false/>
4364 <key>FeatureRecommendations</key>
4365 <true/> | <false/>
4366 <key>UrlbarInterventions</key>
4367 <true/> | <false/>
4368 </dict>
4369 </dict>
4370 ```
4371 #### policies.json
4372 ```
4373 {
4374 "policies": {
4375 "UserMessaging": {
4376 "WhatsNew": true | false,
4377 "ExtensionRecommendations": true | false,
4378 "FeatureRecommendations": true | false,
4379 "UrlbarInterventions": true | false
4380 }
4381 }
4382 }
4383 ```
4384 ### WebsiteFilter
4385 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4386
4387 **Compatibility:** Firefox 60, Firefox ESR 60\
4388 **CCK2 Equivalent:** N/A\
4389 **Preferences Affected:** N/A
4390
4391 #### Windows (GPO)
4392 ```
4393 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4394 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4395 ```
4396 #### Windows (Intune)
4397 OMA-URI:
4398 ```
4399 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4400 ```
4401 Value (string):
4402 ```
4403 <enabled/>
4404 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4405 ```
4406 OMA-URI:
4407 ```
4408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4409 ```
4410 Value (string):
4411 ```
4412 <enabled/>
4413 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4414 ```
4415 #### macOS
4416 ```
4417 <dict>
4418 <key>WebsiteFilter</key>
4419 <dict>
4420 <key>Block</key>
4421 <array>
4422 <string><all_urls></string>
4423 </array>
4424 <key>Exceptions</key>
4425 <array>
4426 <string>http://example.org/*</string>
4427 </array>
4428 </dict>
4429
4430 </dict>
4431 ```
4432 #### policies.json
4433 ```
4434 {
4435 "policies": {
4436 "WebsiteFilter": {
4437 "Block": ["<all_urls>"],
4438 "Exceptions": ["http://example.org/*"]
4439 }
4440 }
4441 }
4442 ```

patrick-canterino.de