]> git.p6c8.net - policy-templates.git/blob - README.md
cd5ffba19fe948c7464b3d32a68b6e27dd9be181
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
572
573 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
574
575 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
576 **CCK2 Equivalent:** N/A\
577 **Preferences Affected:** `security.enterprise_roots.enabled`
578
579 #### Windows (GPO)
580 ```
581 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
582 ```
583 #### Windows (Intune)
584 OMA-URI:
585 ```
586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
587 ```
588 Value (string):
589 ```
590 <enabled/> or <disabled/>
591 ```
592 #### macOS
593 ```
594 <dict>
595 <key>Certificates</key>
596 <dict>
597 <key>ImportEnterpriseRoots</key>
598 <true/> | <false/>
599 </dict>
600 </dict>
601 ```
602 #### policies.json
603 ```
604 {
605 "policies": {
606 "Certificates": {
607 "ImportEnterpriseRoots": true | false
608 }
609 }
610 }
611 ```
612 ### Certificates | Install
613
614 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
615
616 - Windows
617 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
618 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
619 - macOS
620 - /Library/Application Support/Mozilla/Certificates
621 - ~/Library/Application Support/Mozilla/Certificates
622 - Linux
623 - /usr/lib/mozilla/certificates
624 - /usr/lib64/mozilla/certificates
625 - ~/.mozilla/certificates
626
627 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
628
629 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
630
631 Certificates are installed using the trust string `CT,CT,`.
632
633 Binary (DER) and ASCII (PEM) certificates are both supported.
634
635 **Compatibility:** Firefox 64, Firefox ESR 64\
636 **CCK2 Equivalent:** `certs.ca`\
637 **Preferences Affected:** N/A
638
639 #### Windows (GPO)
640 ```
641 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
642 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
643 ```
644 #### Windows (Intune)
645 OMA-URI:
646 ```
647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
648 ```
649 Value (string):
650 ```
651 <enabled/>
652 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
653 ```
654 #### macOS
655 ```
656 <dict>
657 <key>Certificates</key>
658 <dict>
659 <key>Install</key>
660 <array>
661 <string>cert1.der</string>
662 <string>/Users/username/cert2.pem</string>
663 </array>
664 </dict>
665 </dict>
666 ```
667 #### policies.json
668 ```
669 {
670 "policies": {
671 "Certificates": {
672 "Install": ["cert1.der", "/home/username/cert2.pem"]
673 }
674 }
675 }
676 ```
677 ### Cookies
678 Configure cookie preferences.
679
680 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
681
682 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
683
684 `Default` determines whether cookies are accepted at all.
685
686 `AcceptThirdParty` determines how third-party cookies are handled.
687
688 `ExpireAtSessionEnd` determines when cookies expire.
689
690 `RejectTracker` only rejects cookies for trackers.
691
692 `Locked` prevents the user from changing cookie preferences.
693
694 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
695 **CCK2 Equivalent:** N/A\
696 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
697
698 #### Windows (GPO)
699 ```
700 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
701 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
702 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
704 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
706 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
707 ```
708 #### Windows (Intune)
709 OMA-URI:
710 ```
711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
712 ```
713 Value (string):
714 ```
715 <enabled/>
716 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
717 ```
718 OMA-URI:
719 ```
720 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
721 ```
722 Value (string):
723 ```
724 <enabled/>
725 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
726 ```
727 OMA-URI:
728 ```
729 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
730 ```
731 Value (string):
732 ```
733 <enabled/> or <disabled/>
734 ```
735 OMA-URI:
736 ```
737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
738 ```
739 Value (string):
740 ```
741 <enabled/>
742 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
743 ```
744 OMA-URI:
745 ```
746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
747 ```
748 Value (string):
749 ```
750 <enabled/> or <disabled/>
751 ```
752 OMA-URI:
753 ```
754 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
755 ```
756 Value (string):
757 ```
758 <enabled/> or <disabled/>
759 ```
760 OMA-URI:
761 ```
762 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
763 ```
764 Value (string):
765 ```
766 <enabled/> or <disabled/>
767 ```
768 #### macOS
769 ```
770 <dict>
771 <key>Cookies</key>
772 <dict>
773 <key>Allow</key>
774 <array>
775 <string>http://example.com</string>
776 </array>
777 <key>Block</key>
778 <array>
779 <string>http://example.org</string>
780 </array>
781 <key>Default</key>
782 <true/> | <false/>
783 <key>AcceptThirdParty</key>
784 <string>always | never | from-visited</string>
785 <key>ExpireAtSessionEnd</key>
786 <true/> | <false/>
787 <key>RejectTracker</key>
788 <true/> | <false/>
789 <key>Locked</key>
790 <true/> | <false/>
791 </dict>
792 </dict>
793 ```
794 #### policies.json
795 ```
796 {
797 "policies": {
798 "Cookies": {
799 "Allow": ["http://example.org/"],
800 "Block": ["http://example.edu/"],
801 "Default": true | false,
802 "AcceptThirdParty": "always" | "never" | "from-visited",
803 "ExpireAtSessionEnd": true | false,
804 "RejectTracker": true | false,
805 "Locked": true | false
806 }
807 }
808 }
809 ```
810 ### DisableSetDesktopBackground
811 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
812
813 **Compatibility:** Firefox 60, Firefox ESR 60\
814 **CCK2 Equivalent:** `removeSetDesktopBackground`\
815 **Preferences Affected:** N/A
816
817 #### Windows (GPO)
818 ```
819 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
820 ```
821 #### Windows (Intune)
822 OMA-URI:
823 ```
824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
825 ```
826 Value (string):
827 ```
828 <enabled/> or <disabled/>
829 ```
830 #### macOS
831 ```
832 <dict>
833 <key>DisableSetDesktopBackground</key>
834 <true/> | <false/>
835 </dict>
836 ```
837 #### policies.json
838 ```
839 {
840 "policies": {
841 "DisableSetDesktopBackground": true | false
842 }
843 }
844 ```
845 ### DisableMasterPasswordCreation
846 Remove the master password functionality.
847
848 **Compatibility:** Firefox 60, Firefox ESR 60\
849 **CCK2 Equivalent:** `noMasterPassword`\
850 **Preferences Affected:** N/A
851
852 #### Windows (GPO)
853 ```
854 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
855 ```
856 #### Windows (Intune)
857 OMA-URI:
858 ```
859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
860 ```
861 Value (string):
862 ```
863 <enabled/> or <disabled/>
864 ```
865 #### macOS
866 ```
867 <dict>
868 <key>DisableMasterPasswordCreation</key>
869 <true/> | <false/>
870 </dict>
871 ```
872 #### policies.json
873 ```
874 {
875 "policies": {
876 "DisableMasterPasswordCreation": true | false
877 }
878 }
879 ```
880 ### DisableAppUpdate
881 Turn off application updates.
882
883 **Compatibility:** Firefox 60, Firefox ESR 60\
884 **CCK2 Equivalent:** `disableFirefoxUpdates`\
885 **Preferences Affected:** N/A
886
887 #### Windows (GPO)
888 ```
889 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
890 ```
891 #### Windows (Intune)
892 OMA-URI:
893 ```
894 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
895 ```
896 Value (string):
897 ```
898 <enabled/> or <disabled/>
899 ```
900 #### macOS
901 ```
902 <dict>
903 <key>DisableAppUpdate</key>
904 <true/> | <false/>
905 </dict>
906 ```
907 #### policies.json
908 ```
909 {
910 "policies": {
911 "DisableAppUpdate": true | false
912 }
913 }
914 ```
915 ### DisableBuiltinPDFViewer
916 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
917
918 **Compatibility:** Firefox 60, Firefox ESR 60\
919 **CCK2 Equivalent:** `disablePDFjs`\
920 **Preferences Affected:** `pdfjs.disabled`
921
922 #### Windows (GPO)
923 ```
924 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
925 ```
926 #### Windows (Intune)
927 OMA-URI:
928 ```
929 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
930 ```
931 Value (string):
932 ```
933 <enabled/> or <disabled/>
934 ```
935 #### macOS
936 ```
937 <dict>
938 <key>DisableBuiltinPDFViewer</key>
939 <true/> | <false/>
940 </dict>
941 ```
942 #### policies.json
943 ```
944 {
945 "policies": {
946 "DisableBuiltinPDFViewer": true | false
947 }
948 }
949 ```
950 ### DisabledCiphers
951 Disable specific cryptographic ciphers.
952
953 ---
954 **Note:**
955
956 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
957
958 ---
959 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
960 **CCK2 Equivalent:** N/A\
961 **Preferences Affected:** N/A
962
963 #### Windows (GPO)
964 ```
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
975 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
976 ```
977 #### Windows (Intune)
978 OMA-URI:
979 ```
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
991 ```
992 Value (string):
993 ```
994 <enabled/> or <disabled/>
995 ```
996 #### macOS
997 ```
998 <dict>
999 <key>DisabledCiphers</key>
1000 <dict>
1001 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1006 <true/> | <false/>
1007 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1008 <true/> | <false/>
1009 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1010 <true/> | <false/>
1011 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1012 <true/> | <false/>
1013 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1014 <true/> | <false/>
1015 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1016 <true/> | <false/>
1017 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1018 <true/> | <false/>
1019 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1020 <true/> | <false/>
1021 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisabledCiphers" {
1031 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1032 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1035 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1037 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1039 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1040 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1041 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1042 }
1043 }
1044 }
1045 ```
1046 ### DisableDefaultBrowserAgent
1047 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1048
1049 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1050 **CCK2 Equivalent:** N/A\
1051 **Preferences Affected:** N/A
1052
1053 #### Windows (GPO)
1054 ```
1055 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1056 ```
1057 #### Windows (Intune)
1058 OMA-URI:
1059 ```
1060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1061 ```
1062 Value (string):
1063 ```
1064 <enabled/> or <disabled/>
1065 ```
1066 #### policies.json
1067 ```
1068 {
1069 "policies": {
1070 "DisableDefaultBrowserAgent": true | false
1071 }
1072 }
1073 ```
1074 ### DisableDeveloperTools
1075 Remove access to all developer tools.
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** `removeDeveloperTools`\
1079 **Preferences Affected:** `devtools.policy.disabled`
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableDeveloperTools</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableDeveloperTools": true | false
1106 }
1107 }
1108 ```
1109 ### DisableFeedbackCommands
1110 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** N/A\
1114 **Preferences Affected:** N/A
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableFeedbackCommands</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableFeedbackCommands": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFirefoxScreenshots
1145 Remove access to Firefox Screenshots.
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** N/A\
1149 **Preferences Affected:** `extensions.screenshots.disabled`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFirefoxScreenshots</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFirefoxScreenshots": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxAccounts
1180 Disable Firefox Accounts integration (Sync).
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** `disableSync`\
1184 **Preferences Affected:** `identity.fxaccounts.enabled`
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxAccounts</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxAccounts": true | false
1211 }
1212 }
1213 ```
1214 ### DisableFirefoxStudies
1215 Disable Firefox studies (Shield).
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** N/A\
1219 **Preferences Affected:** N/A
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableFirefoxStudies</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableFirefoxStudies": true | false
1246 }
1247 }
1248 ```
1249 ### DisableForgetButton
1250 Disable the "Forget" button.
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** `disableForget`\
1254 **Preferences Affected:** N/A
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableForgetButton</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableForgetButton": true | false
1281 }
1282 }
1283 ```
1284 ### DisableFormHistory
1285 Turn off saving information on web forms and the search bar.
1286
1287 **Compatibility:** Firefox 60, Firefox ESR 60\
1288 **CCK2 Equivalent:** `disableFormFill`\
1289 **Preferences Affected:** ` browser.formfill.enable`
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisableFormHistory</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisableFormHistory": true | false
1316 }
1317 }
1318 ```
1319 ### DisablePasswordReveal
1320 Do not allow passwords to be shown in saved logins
1321
1322 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1323 **CCK2 Equivalent:** N/A
1324 **Preferences Affected:** N/A
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisablePasswordReveal</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisablePasswordReveal": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePocket
1355 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePocket`\
1359 **Preferences Affected:** `extensions.pocket.enabled`
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePocket</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePocket": true | false
1386 }
1387 }
1388 ```
1389 ### DisablePrivateBrowsing
1390 Remove access to private browsing.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1394 **Preferences Affected:** N/A
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisablePrivateBrowsing</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisablePrivateBrowsing": true | false
1421 }
1422 }
1423 ```
1424 ### DisableProfileImport
1425 Disables the "Import data from another browser" option in the bookmarks window.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** N/A\
1429 **Preferences Affected:** N/A
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisableProfileImport</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisableProfileImport": true | false
1456 }
1457 }
1458 ```
1459 ### DisableProfileRefresh
1460 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1461
1462 **Compatibility:** Firefox 60, Firefox ESR 60\
1463 **CCK2 Equivalent:** `disableResetFirefox`\
1464 **Preferences Affected:** `browser.disableResetPrompt`
1465
1466 #### Windows (GPO)
1467 ```
1468 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1469 ```
1470 #### Windows (Intune)
1471 OMA-URI:
1472 ```
1473 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1474 ```
1475 Value (string):
1476 ```
1477 <enabled/> or <disabled/>
1478 ```
1479 #### macOS
1480 ```
1481 <dict>
1482 <key>DisableProfileRefresh</key>
1483 <true/> | <false/>
1484 </dict>
1485 ```
1486 #### policies.json
1487 ```
1488 {
1489 "policies": {
1490 "DisableProfileRefresh": true | false
1491 }
1492 }
1493 ```
1494 ### DisableSafeMode
1495 Disable safe mode within the browser.
1496
1497 On Windows, this disables safe mode via the command line as well.
1498
1499 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1500 **CCK2 Equivalent:** `disableSafeMode`\
1501 **Preferences Affected:** N/A
1502
1503 #### Windows (GPO)
1504 ```
1505 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1506 ```
1507 #### Windows (Intune)
1508 OMA-URI:
1509 ```
1510 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1511 ```
1512 Value (string):
1513 ```
1514 <enabled/> or <disabled/>
1515 ```
1516 #### macOS
1517 ```
1518 <dict>
1519 <key>DisableSafeMode</key>
1520 <true/> | <false/>
1521 </dict>
1522 ```
1523 #### policies.json
1524 ```
1525 {
1526 "policies": {
1527 "DisableSafeMode": true | false
1528 }
1529 }
1530 ```
1531 ### DisableSecurityBypass
1532 Prevent the user from bypassing security in certain cases.
1533
1534 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1535
1536 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1537
1538 **Compatibility:** Firefox 60, Firefox ESR 60\
1539 **CCK2 Equivalent:** N/A\
1540 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1541
1542 #### Windows (GPO)
1543 ```
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1545 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1546 ```
1547 #### Windows (Intune)
1548 OMA-URI:
1549 ```
1550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1551 ```
1552 Value (string):
1553 ```
1554 <enabled/> or <disabled/>
1555 ```
1556 OMA-URI:
1557 ```
1558 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1559 ```
1560 Value (string):
1561 ```
1562 <enabled/> or <disabled/>
1563 ```
1564
1565 #### macOS
1566 ```
1567 <dict>
1568 <key>DisableSecurityBypass</key>
1569 <dict>
1570 <key>InvalidCertificate</key>
1571 <true/> | <false/>
1572 <key><SafeBrowsing/key>
1573 <true/> | <false/>
1574 </dict>
1575 </dict>
1576 ```
1577 #### policies.json
1578 ```
1579 {
1580 "policies": {
1581 "DisableSecurityBypass": {
1582 "InvalidCertificate": true | false,
1583 "SafeBrowsing": true | false
1584 }
1585 }
1586 }
1587 ```
1588 ### DisableSystemAddonUpdate
1589 Prevent system add-ons from being installed or update.
1590
1591 **Compatibility:** Firefox 60, Firefox ESR 60\
1592 **CCK2 Equivalent:** N/A\
1593 **Preferences Affected:** N/A
1594
1595 #### Windows (GPO)
1596 ```
1597 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1598 ```
1599 #### Windows (Intune)
1600 OMA-URI:
1601 ```
1602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1603 ```
1604 Value (string):
1605 ```
1606 <enabled/> or <disabled/>
1607 ```
1608 #### macOS
1609 ```
1610 <dict>
1611 <key>DisableSystemAddonUpdate</key>
1612 <true/> | <false/>
1613 </dict>
1614 ```
1615 #### policies.json
1616 ```
1617 {
1618 "policies": {
1619 "DisableSystemAddonUpdate": true | false
1620 }
1621 }
1622 ```
1623 ### DisableTelemetry
1624 Prevent the upload of telemetry data.
1625
1626 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1627
1628 **Compatibility:** Firefox 60, Firefox ESR 60\
1629 **CCK2 Equivalent:** `disableTelemetry`\
1630 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1631
1632 #### Windows (GPO)
1633 ```
1634 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1635 ```
1636 #### Windows (Intune)
1637 OMA-URI:
1638 ```
1639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1640 ```
1641 Value (string):
1642 ```
1643 <enabled/> or <disabled/>
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>DisableTelemetry</key>
1649 <true/> | <false/>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "DisableTelemetry": true | false
1657 }
1658 }
1659 ```
1660 ### DisplayBookmarksToolbar
1661 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1662
1663 **Compatibility:** Firefox 60, Firefox ESR 60\
1664 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1665 **Preferences Affected:** N/A
1666
1667 #### Windows (GPO)
1668 ```
1669 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1670 ```
1671 #### Windows (Intune)
1672 OMA-URI:
1673 ```
1674 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1675 ```
1676 Value (string):
1677 ```
1678 <enabled/> or <disabled/>
1679 ```
1680 #### macOS
1681 ```
1682 <dict>
1683 <key>DisplayBookmarksToolbar</key>
1684 <true/> | <false/>
1685 </dict>
1686 ```
1687 #### policies.json
1688 ```
1689 {
1690 "policies": {
1691 "DisplayBookmarksToolbar": true | false
1692 }
1693 }
1694 ```
1695 ### DisplayMenuBar (Deprecated)
1696 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1697
1698 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1699 **CCK2 Equivalent:** `displayMenuBar`\
1700 **Preferences Affected:** N/A
1701
1702 #### Windows (GPO)
1703 ```
1704 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1705 ```
1706 #### macOS
1707 ```
1708 <dict>
1709 <key>DisplayMenuBar</key>
1710 <true/> | <false/>
1711 </dict>
1712 ```
1713 #### policies.json
1714 ```
1715 {
1716 "policies": {
1717 "DisplayMenuBar": true | false
1718 }
1719 }
1720 ```
1721 ### DisplayMenuBar
1722 Set the state of the menubar.
1723
1724 `always` means the menubar is shown and cannot be hidden.
1725
1726 `never` means the menubar is hidden and cannot be shown.
1727
1728 `default-on` means the menubar is on by default but can be hidden.
1729
1730 `default-off` means the menubar is off by default but can be shown.
1731
1732 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1733 **CCK2 Equivalent:** `displayMenuBar`\
1734 **Preferences Affected:** N/A
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1739 ```
1740 #### Windows (Intune)
1741 OMA-URI:
1742 ```
1743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1744 ```
1745 Value (string):
1746 ```
1747 <enabled/>
1748 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1749 ```
1750 #### macOS
1751 ```
1752 <dict>
1753 <key>DisplayMenuBar</key>
1754 <string>always | never | default-on | default-off</string>
1755 </dict>
1756 ```
1757 #### policies.json
1758 ```
1759 {
1760 "policies": {
1761 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1762 }
1763 }
1764 ```
1765 ### DNSOverHTTPS
1766 Configure DNS over HTTPS.
1767
1768 `Enabled` determines whether DNS over HTTPS is enabled
1769
1770 `ProviderURL` is a URL to another provider.
1771
1772 `Locked` prevents the user from changing DNS over HTTPS preferences.
1773
1774 `ExcludedDomains` excludes domains from DNS over HTTPS.
1775
1776 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1777 **CCK2 Equivalent:** N/A\
1778 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1779
1780 #### Windows (GPO)
1781 ```
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1785 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1786 ```
1787 #### Windows (Intune)
1788 OMA-URI:
1789 ```
1790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1791 ```
1792 Value (string):
1793 ```
1794 <enabled/> or <disabled/>
1795 ```
1796 OMA-URI:
1797 ```
1798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1799 ```
1800 Value (string):
1801 ```
1802 <enabled/>
1803 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1804 ```
1805 OMA-URI:
1806 ```
1807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1808 ```
1809 Value (string):
1810 ```
1811 <enabled/> or <disabled/>
1812 ```
1813 OMA-URI:
1814 ```
1815 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1816 ```
1817 Value (string):
1818 ```
1819 <enabled/>
1820 <data id="List" value="1&#xF000;example.com"/>
1821 ```
1822 #### macOS
1823 ```
1824 <dict>
1825 <key>DNSOverHTTPS</key>
1826 <dict>
1827 <key>Enabled</key>
1828 <true/> | <false/>
1829 <key>ProviderURL</key>
1830 <string>URL_TO_ALTERNATE_PROVIDER</string>
1831 <key>Locked</key>
1832 <true/> | <false/>
1833 <key>ExcludedDomains</key>
1834 <array>
1835 <string>example.com</string>
1836 </array>
1837 </dict>
1838 </dict>
1839 ```
1840 #### policies.json
1841 ```
1842 {
1843 "policies": {
1844 "DNSOverHTTPS": {
1845 "Enabled": true | false,
1846 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1847 "Locked": true | false,
1848 "ExcludedDomains": ["example.com"]
1849 }
1850 }
1851 }
1852 ```
1853 ### DontCheckDefaultBrowser
1854 Don't check if Firefox is the default browser at startup.
1855
1856 **Compatibility:** Firefox 60, Firefox ESR 60\
1857 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1858 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1859
1860 #### Windows (GPO)
1861 ```
1862 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1863 ```
1864 #### Windows (Intune)
1865 OMA-URI:
1866 ```
1867 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1868 ```
1869 Value (string):
1870 ```
1871 <enabled/> or <disabled/>
1872 ```
1873 #### macOS
1874 ```
1875 <dict>
1876 <key>DontCheckDefaultBrowser</key>
1877 <true/> | <false/>
1878 </dict>
1879 ```
1880 #### policies.json
1881 ```
1882 {
1883 "policies": {
1884 "DontCheckDefaultBrowser": true | false
1885 }
1886 }
1887 ```
1888 ### DefaultDownloadDirectory
1889 Set the default download directory.
1890
1891 You can use ${home} for the native home directory.
1892
1893 **Compatibility:** Firefox 68, Firefox ESR 68\
1894 **CCK2 Equivalent:** N/A\
1895 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1896
1897 #### Windows (GPO)
1898 ```
1899 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1900 ```
1901 #### Windows (Intune)
1902 OMA-URI:
1903 ```
1904 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1905 ```
1906 Value (string):
1907 ```
1908 <enabled/>
1909 <data id="Preferences_String" value="${home}\Downloads"/>
1910 ```
1911 #### macOS
1912 ```
1913 <dict>
1914 <key>DefaultDownloadDirectory</key>
1915 <string>${home}/Downloads</string>
1916 </dict>
1917 ```
1918 #### policies.json (macOS and Linux)
1919 ```
1920 {
1921 "policies": {
1922 "DefaultDownloadDirectory": "${home}/Downloads"
1923 }
1924 ```
1925 #### policies.json (Windows)
1926 ```
1927 {
1928 "policies": {
1929 "DefaultDownloadDirectory": "${home}\\Downloads"
1930 }
1931 ```
1932 ### DownloadDirectory
1933 Set and lock the download directory.
1934
1935 You can use ${home} for the native home directory.
1936
1937 **Compatibility:** Firefox 68, Firefox ESR 68\
1938 **CCK2 Equivalent:** N/A\
1939 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1940
1941 #### Windows (GPO)
1942 ```
1943 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1944 ```
1945 #### Windows (Intune)
1946 OMA-URI:
1947 ```
1948 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1949 ```
1950 Value (string):
1951 ```
1952 <enabled/>
1953 <data id="Preferences_String" value="${home}\Downloads"/>
1954 ```
1955 #### macOS
1956 ```
1957 <dict>
1958 <key>DownloadDirectory</key>
1959 <string>${home}/Downloads</string>
1960 </dict>
1961 ```
1962 #### policies.json (macOS and Linux)
1963 ```
1964 {
1965 "policies": {
1966 "DownloadDirectory": "${home}/Downloads"
1967 }
1968 ```
1969 #### policies.json (Windows)
1970 ```
1971 {
1972 "policies": {
1973 "DownloadDirectory": "${home}\\Downloads"
1974 }
1975 ```
1976 ### EnableTrackingProtection
1977 Configure tracking protection.
1978
1979 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1980
1981 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1982
1983 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1984
1985 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1986
1987 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1988
1989 `Exceptions` are origins for which tracking protection is not enabled.
1990
1991 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1992 **CCK2 Equivalent:** N/A\
1993 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1994
1995 #### Windows (GPO)
1996 ```
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2001 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2002 ```
2003 #### Windows (Intune)
2004 OMA-URI:
2005 ```
2006 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2007 ```
2008 Value (string):
2009 ```
2010 <enabled/>
2011 <data id="TrackingProtectionLocked" value="true | false"/>
2012 <data id="Cryptomining" value="true | false"/>
2013 <data id="Fingerprinting" value="true | false"/>
2014 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2015 ```
2016 #### macOS
2017 ```
2018 <dict>
2019 <key>EnableTrackingProtection</key>
2020 <dict>
2021 <key>Value</key>
2022 <true/> | <false/>
2023 <key><Locked</key>
2024 <true/> | <false/>
2025 <key><Cryptomining</key>
2026 <true/> | <false/>
2027 <key><Fingerprinting</key>
2028 <true/> | <false/>
2029 <key>Exceptions</key>
2030 <array>
2031 <string>https://example.com</string>
2032 </array>
2033 </dict>
2034 </dict>
2035 ```
2036 #### policies.json
2037 ```
2038 {
2039 "policies": {
2040 "EnableTrackingProtection": {
2041 "Value": true | false,
2042 "Locked": true | false,
2043 "Cryptomining": true | false,
2044 "Fingerprinting": true | false,
2045 "Exceptions": ["https://example.com"]
2046 }
2047 }
2048 ```
2049 ### EncryptedMediaExtensions
2050 Enable or disable Encrypted Media Extensions and optionally lock it.
2051
2052 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2053
2054 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2055
2056 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2057 **CCK2 Equivalent:** N/A\
2058 **Preferences Affected:** `media.eme.enabled`
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2063 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2064 ```
2065 #### Windows (Intune)
2066 OMA-URI:
2067 ```
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2070 ```
2071 Value (string):
2072 ```
2073 <enabled/>or <disabled/>
2074 ```
2075 #### macOS
2076 ```
2077 <dict>
2078 <key>EncryptedMediaExtensions</key>
2079 <dict>
2080 <key>Enabled</key>
2081 <true/> | <false/>
2082 <key><Locked</key>
2083 <true/> | <false/>
2084 </dict>
2085 </dict>
2086 ```
2087 #### policies.json
2088 ```
2089 {
2090 "policies": {
2091 "EncryptedMediaExtensions": {
2092 "Enabled": true | false,
2093 "Locked": true | false
2094 }
2095 }
2096 ```
2097 ### EnterprisePoliciesEnabled
2098 Enable policy support on macOS.
2099
2100 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2101 **CCK2 Equivalent:** N/A\
2102 **Preferences Affected:** N/A
2103
2104 #### macOS
2105 ```
2106 <dict>
2107 <key>EnterprisePoliciesEnabled</key>
2108 <true/>
2109 </dict>
2110 ```
2111 ### Extensions
2112 Control the installation, uninstallation and locking of extensions.
2113
2114 `Install` is a list of URLs or native paths for extensions to be installed.
2115
2116 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2117
2118 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2119
2120 **Compatibility:** Firefox 60, Firefox ESR 60\
2121 **CCK2 Equivalent:** `addons`\
2122 **Preferences Affected:** N/A
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2128 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2129 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2130 ```
2131 #### Windows (Intune)
2132 OMA-URI:
2133 ```
2134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2135 ```
2136 Value (string):
2137 ```
2138 <enabled/>
2139 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2140 ```
2141 OMA-URI:
2142 ```
2143 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2144 ```
2145 Value (string):
2146 ```
2147 <enabled/>
2148 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2149 ```
2150 OMA-URI:
2151 ```
2152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2153 ```
2154 Value (string):
2155 ```
2156 <enabled/>
2157 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2158 ```
2159 #### macOS
2160 ```
2161 <dict>
2162 <key>Extensions</key>
2163 <dict>
2164 <key>Install</key>
2165 <array>
2166 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2167 <string>//path/to/xpi</string>
2168 </array>
2169 <key>Uninstall</key>
2170 <array>
2171 <string>bad_addon_id@mozilla.org</string>
2172 </array>
2173 <key>Locked</key>
2174 <array>
2175 <string>addon_id@mozilla.org</string>
2176 </array>
2177 </dict>
2178 </dict>
2179 ```
2180 #### policies.json
2181 ```
2182 {
2183 "policies": {
2184 "Extensions": {
2185 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2186 "Uninstall": ["bad_addon_id@mozilla.org"],
2187 "Locked": ["addon_id@mozilla.org"]
2188 }
2189 }
2190 }
2191 ```
2192 ### ExtensionSettings
2193 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2194
2195 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2196
2197 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2198
2199 The configuration for each extension is another dictionary that can contain the fields documented below.
2200
2201 | Name | Description |
2202 | --- | --- |
2203 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2204 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2205 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2206 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2207 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2208 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2209 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2210 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2211 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2212 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2213
2214 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2215 **CCK2 Equivalent:** N/A\
2216 **Preferences Affected:** N/A
2217
2218 #### Windows (GPO)
2219 ```
2220 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2221 {
2222 "*": {
2223 "blocked_install_message": "Custom error message.",
2224 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2225 "installation_mode": "blocked",
2226 "allowed_types": ["extension"]
2227 },
2228 "uBlock0@raymondhill.net": {
2229 "installation_mode": "force_installed",
2230 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2231 },
2232 "https-everywhere@eff.org": {
2233 "installation_mode": "allowed",
2234 }
2235 }
2236 ```
2237 #### Windows (Intune)
2238 OMA-URI:
2239 ```
2240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2241 ```
2242 Value (string):
2243 ```
2244 <enabled/>
2245 <data id="ExtensionSettings" value='
2246 "*": {
2247 "blocked_install_message": "Custom error message.",
2248 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2249 "installation_mode": "blocked",
2250 "allowed_types": ["extension"]
2251 },
2252 "uBlock0@raymondhill.net": {
2253 "installation_mode": "force_installed",
2254 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2255 },
2256 "https-everywhere@eff.org": {
2257 "installation_mode": "allowed",
2258 }'/>
2259 ```
2260 #### macOS
2261 ```
2262 <dict>
2263 <key>ExtensionSettings</key>
2264 <dict>
2265 <key>*</key>
2266 <dict>
2267 <key>blocked_install_message</key>
2268 <string>Custom error message.</string>
2269 <key>install_sources</key>
2270 <array>
2271 <string>about:addons</string>
2272 <string>https://addons.mozilla.org/</string>
2273 </array>
2274 <key>installation_mode</key>
2275 <string>blocked</string>
2276 <key>allowed_types</key>
2277 <array>
2278 <string>extension</string>
2279 </array>
2280 </dict>
2281 <key>uBlock0@raymondhill.net</key>
2282 <dict>
2283 <key>installation_mode</key>
2284 <string>force_installed</string>
2285 <key>install_url</key>
2286 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2287 </dict>
2288 <key>https-everywhere@eff.org</key>
2289 <dict>
2290 <key>installation_mode</key>
2291 <string>allowed</string>
2292 </dict>
2293 </dict>
2294 </dict>
2295 ```
2296 #### policies.json
2297 ```
2298 {
2299 "policies": {
2300 "ExtensionSettings": {
2301 "*": {
2302 "blocked_install_message": "Custom error message.",
2303 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2304 "installation_mode": "blocked",
2305 "allowed_types": ["extension"]
2306 },
2307 "uBlock0@raymondhill.net": {
2308 "installation_mode": "force_installed",
2309 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2310 },
2311 "https-everywhere@eff.org": {
2312 "installation_mode": "allowed"
2313 }
2314 }
2315 }
2316 }
2317 ```
2318 ### ExtensionUpdate
2319 Control extension updates.
2320
2321 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2322 **CCK2 Equivalent:** N/A\
2323 **Preferences Affected:** `extensions.update.enabled`
2324
2325 #### Windows (GPO)
2326 ```
2327 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2328 ```
2329 #### Windows (Intune)
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2333 ```
2334 Value (string):
2335 ```
2336 <enabled/> or <disabled/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>ExtensionUpdate</key>
2342 <true/> | <false/>
2343 </dict>
2344 ```
2345 #### policies.json
2346 ```
2347 {
2348 "policies": {
2349 "ExtensionUpdate": true | false
2350 }
2351 }
2352 ```
2353 ### FlashPlugin
2354 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2355
2356 `Allow` is a list of origins where Flash are allowed.
2357
2358 `Block` is a list of origins where Flash is not allowed.
2359
2360 `Default` determines whether or not Flash is allowed by default.
2361
2362 `Locked` prevents the user from changing Flash preferences.
2363
2364 **Compatibility:** Firefox 60, Firefox ESR 60\
2365 **CCK2 Equivalent:** `permissions.plugin`\
2366 **Preferences Affected:** `plugin.state.flash`
2367
2368 #### Windows (GPO)
2369 ```
2370 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2371 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2372 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2373 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2374 ```
2375 #### Windows (Intune)
2376 OMA-URI:
2377 ```
2378 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2379 ```
2380 Value (string):
2381 ```
2382 <enabled/>
2383 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2384 ```
2385 OMA-URI:
2386 ```
2387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2388 ```
2389 Value (string):
2390 ```
2391 <enabled/> or <disabled/>
2392 ```
2393 OMA-URI:
2394 ```
2395 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2396 ```
2397 Value (string):
2398 ```
2399 <enabled/> or <disabled/>
2400 ```
2401 #### macOS
2402 ```
2403 <dict>
2404 <key>FlashPlugin</key>
2405 <dict>
2406 <key>Allow</key>
2407 <array>
2408 <string>http://example.org</string>
2409 </array>
2410 <key>Block</key>
2411 <array>
2412 <string>http://example.edu</string>
2413 </array>
2414 <key>Default</key>
2415 <true/> | <false/>
2416 <key>Locked</key>
2417 <true/> | <false/>
2418 </dict>
2419 </dict>
2420 ```
2421 #### policies.json
2422 ```
2423 {
2424 "policies": {
2425 "FlashPlugin": {
2426 "Allow": ["http://example.org/"],
2427 "Block": ["http://example.edu/"],
2428 "Default": true | false,
2429 "Locked": true | false
2430 }
2431 }
2432 }
2433 ```
2434
2435
2436
2437 ### Handlers
2438 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2439
2440 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2441
2442 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2443
2444 | Name | Description |
2445 | --- | --- |
2446 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2447 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2448 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2449 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2450 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2451 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2452
2453 **Compatibility:** Firefox 78, Firefox ESR 78\
2454 **CCK2 Equivalent:** N/A\
2455 **Preferences Affected:** N/A
2456
2457 #### Windows (GPO)
2458 ```
2459 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2460 {
2461 "mimeTypes": {
2462 "application/msword": {
2463 "action": "useSystemDefault",
2464 "ask": true | false
2465 }
2466 },
2467 "schemes": {
2468 "mailto": {
2469 "action": "useHelperApp",
2470 "ask": true | false,
2471 "handlers": [{
2472 "name": "Gmail",
2473 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2474 }]
2475 }
2476 },
2477 "extensions": {
2478 "pdf": {
2479 "action": "useHelperApp",
2480 "ask": true | false,
2481 "handlers": [{
2482 "name": "Adobe Acrobat",
2483 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2484 }]
2485 }
2486 }
2487 }
2488 ```
2489 #### Windows (Intune)
2490 OMA-URI:
2491 ```
2492 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2493 ```
2494 Value (string):
2495 ```
2496 <enabled/>
2497 <data id="Handlers" value='
2498 {
2499 "mimeTypes": {
2500 "application/msword": {
2501 "action": "useSystemDefault",
2502 "ask": true | false
2503 }
2504 },
2505 "schemes": {
2506 "mailto": {
2507 "action": "useHelperApp",
2508 "ask": true | false,
2509 "handlers": [{
2510 "name": "Gmail",
2511 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2512 }]
2513 }
2514 },
2515 "extensions": {
2516 "pdf": {
2517 "action": "useHelperApp",
2518 "ask": true | false,
2519 "handlers": [{
2520 "name": "Adobe Acrobat",
2521 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2522 }]
2523 }
2524 }
2525 }
2526 '/>
2527 ```
2528 #### macOS
2529 ```
2530 <dict>
2531 <key>Handlers</key>
2532 <dict>
2533 <key>mimeTypes</key>
2534 <dict>
2535 <key>application/msword</key>
2536 <dict>
2537 <key>action</key>
2538 <string>useSystemDefault</string>
2539 <key>ask</key>
2540 <true/> | <false/>
2541 </dict>
2542 </dict>
2543 <key>schemes</key>
2544 <dict>
2545 <key>mailto</key>
2546 <dict>
2547 <key>action</key>
2548 <string>useHelperApp</string>
2549 <key>ask</key>
2550 <true/> | <false/>
2551 <key>handlers</key>
2552 <array>
2553 <dict>
2554 <key>name</key>
2555 <string>Gmail</string>
2556 <key>uriTemplate</key>
2557 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2558 </dict>
2559 </array>
2560 </dict>
2561 </dict>
2562 <key>extensions</key>
2563 <dict>
2564 <key>pdf</key>
2565 <dict>
2566 <key>action</key>
2567 <string>useHelperApp</string>
2568 <key>ask</key>
2569 <true/> | <false/>
2570 <key>handlers</key>
2571 <array>
2572 <dict>
2573 <key>name</key>
2574 <string>Adobe Acrobat</string>
2575 <key>path</key>
2576 <string>/System/Applications/Preview.app</string>
2577 </dict>
2578 </array>
2579 </dict>
2580 </dict>
2581 </dict>
2582 </dict>
2583 ```
2584 #### policies.json
2585 ```
2586 {
2587 "policies": {
2588 "Handlers": {
2589 "mimeTypes": {
2590 "application/msword": {
2591 "action": "useSystemDefault",
2592 "ask": false
2593 }
2594 },
2595 "schemes": {
2596 "mailto": {
2597 "action": "useHelperApp",
2598 "ask": true | false,
2599 "handlers": [{
2600 "name": "Gmail",
2601 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2602 }]
2603 }
2604 },
2605 "extensions": {
2606 "pdf": {
2607 "action": "useHelperApp",
2608 "ask": true | false,
2609 "handlers": [{
2610 "name": "Adobe Acrobat",
2611 "path": "/usr/bin/acroread"
2612 }]
2613 }
2614 }
2615 }
2616 }
2617 }
2618 ```
2619 ### FirefoxHome
2620 Customize the Firefox Home page.
2621
2622 **Compatibility:** Firefox 68, Firefox ESR 68\
2623 **CCK2 Equivalent:** N/A\
2624 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2625
2626 #### Windows (GPO)
2627 ```
2628 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2629 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2630 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2631 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2632 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2633 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2634 ```
2635 #### Windows (Intune)
2636 OMA-URI:
2637 ```
2638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2639 ```
2640 Value (string):
2641 ```
2642 <enabled/>
2643 <data id="FirefoxHome_Search" value="true | false"/>
2644 <data id="FirefoxHome_TopSites" value="true | false"/>
2645 <data id="FirefoxHome_Highlights" value="true | false"/>
2646 <data id="FirefoxHome_Pocket" value="true | false"/>
2647 <data id="FirefoxHome_Snippets" value="true | false"/>
2648 <data id="FirefoxHome_Locked" value="true | false"/>
2649 ```
2650 #### macOS
2651 ```
2652 <dict>
2653 <key>FirefoxHome</key>
2654 <dict>
2655 <key>Search</key>
2656 <true/> | <false/>
2657 <key>TopSites</key>
2658 <true/> | <false/>
2659 <key>Highlights</key>
2660 <true/> | <false/>
2661 <key>Pocket</key>
2662 <true/> | <false/>
2663 <key>Snippets</key>
2664 <true/> | <false/>
2665 <key>Locked</key>
2666 <true/> | <false/>
2667 </dict>
2668 </dict>
2669 ```
2670 #### policies.json
2671 ```
2672 {
2673 "policies": {
2674 "FirefoxHome": {
2675 "Search": true | false,
2676 "TopSites": true | false,
2677 "Highlights": true | false,
2678 "Pocket": true | false,
2679 "Snippets": true | false,
2680 "Locked": true | false
2681 }
2682 }
2683 }
2684 ```
2685 ### HardwareAcceleration
2686 Control hardware acceleration.
2687
2688 **Compatibility:** Firefox 60, Firefox ESR 60\
2689 **CCK2 Equivalent:** N/A\
2690 **Preferences Affected:** `layers.acceleration.disabled`
2691
2692 #### Windows (GPO)
2693 ```
2694 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2695 ```
2696 #### Windows (Intune)
2697 OMA-URI:
2698 ```
2699 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2700 ```
2701 Value (string):
2702 ```
2703 <enabled/> or <disabled/>
2704 ```
2705 #### macOS
2706 ```
2707 <dict>
2708 <key>HardwareAcceleration</key>
2709 <true/> | <false/>
2710 </dict>
2711 ```
2712 #### policies.json
2713 ```
2714 {
2715 "policies": {
2716 "HardwareAcceleration": true | false
2717 }
2718 }
2719 ```
2720 ### Homepage
2721 Configure the default homepage and how Firefox starts.
2722
2723 `URL` is the default homepage.
2724
2725 `Locked` prevents the user from changing homepage preferences.
2726
2727 `Additional` allows for more than one homepage.
2728
2729 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2730
2731 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2732
2733 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2734 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2735 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2736
2737 #### Windows (GPO)
2738 ```
2739 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2740 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2741 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2742 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2743 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2744 ```
2745 #### Windows (Intune)
2746 OMA-URI:
2747 ```
2748 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2749 ```
2750 Value (string):
2751 ```
2752 <enabled/>
2753
2754 <data id="HomepageURL" value="https://example.com"/>
2755 <data id="HomepageLocked" value="true | false"/>
2756 ```
2757 OMA-URI:
2758 ```
2759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2760 ```
2761 Value (string):
2762 ```
2763 <enabled/>
2764
2765 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2766 ```
2767 OMA-URI:
2768 ```
2769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2770 ```
2771 Value (string):
2772 ```
2773 <enabled/>
2774
2775 <data id="StartPage" value="none | homepage | previous-session"/>
2776 ```
2777 #### macOS
2778 ```
2779 <dict>
2780 <key>Homepage</key>
2781 <dict>
2782 <key>URL</key>
2783 <string>http://example.com</string>
2784 <key>Locked</key>
2785 <true/> | <false/>
2786 <key>Additional</key>
2787 <array>
2788 <string>http://example.org</string>
2789 <string>http://example.edu</string>
2790 </array>
2791 <key>StartPage</key>
2792 <string>none | homepage | previous-session | homepage-locked</string>
2793 </dict>
2794 </dict>
2795 ```
2796 #### policies.json
2797 ```
2798 {
2799 "policies": {
2800 "Homepage": {
2801 "URL": "http://example.com/",
2802 "Locked": true | false,
2803 "Additional": ["http://example.org/",
2804 "http://example.edu/"],
2805 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2806 }
2807 }
2808 }
2809 ```
2810 ### InstallAddonsPermission
2811 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2812
2813 `Allow` is a list of origins where extension installs are allowed.
2814
2815 `Default` determines whether or not extension installs are allowed by default.
2816
2817 **Compatibility:** Firefox 60, Firefox ESR 60\
2818 **CCK2 Equivalent:** `permissions.install`\
2819 **Preferences Affected:** `xpinstall.enabled`
2820
2821 #### Windows (GPO)
2822 ```
2823 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2824 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2825 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2826 ```
2827 #### Windows (Intune)
2828 OMA-URI:
2829 ```
2830 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2831 ```
2832 Value (string):
2833 ```
2834 <enabled/>
2835 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2836 ```
2837 OMA-URI:
2838 ```
2839 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2840 ```
2841 Value (string):
2842 ```
2843 <enabled/>
2844 ```
2845 #### macOS
2846 ```
2847 <dict>
2848 <key>InstallAddonsPermission</key>
2849 <dict>
2850 <key>Allow</key>
2851 <array>
2852 <string>http://example.org</string>
2853 <string>http://example.edu</string>
2854 </array>
2855 <key>Default</key>
2856 <true/> | <false/>
2857 </dict>
2858 </dict>
2859 ```
2860 #### policies.json
2861 ```
2862 {
2863 "policies": {
2864 "InstallAddonsPermission": {
2865 "Allow": ["http://example.org/",
2866 "http://example.edu/"],
2867 "Default": true | false
2868 }
2869 }
2870 }
2871 ```
2872 ### LegacyProfiles
2873 Disable the feature enforcing a separate profile for each installation.
2874
2875 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2876
2877 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2878
2879 This policy only work on Windows via GPO (not policies.json).
2880
2881 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2882 **CCK2 Equivalent:** N/A\
2883 **Preferences Affected:** N/A
2884
2885 #### Windows (GPO)
2886 ```
2887 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2888 ```
2889 #### Windows (Intune)
2890 OMA-URI:
2891 ```
2892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2893 ```
2894 Value (string):
2895 ```
2896 <enabled/> or <disabled/>
2897 ```
2898 ### LocalFileLinks
2899 Enable linking to local files by origin.
2900
2901 **Compatibility:** Firefox 68, Firefox ESR 68\
2902 **CCK2 Equivalent:** N/A\
2903 **Preferences Affected:** `capability.policy.localfilelinks.*`
2904
2905 #### Windows (GPO)
2906 ```
2907 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2908 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2909 ```
2910 #### Windows (Intune)
2911 OMA-URI:
2912 ```
2913 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2914 ```
2915 Value (string):
2916 ```
2917 <enabled/>
2918 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2919 ```
2920 #### macOS
2921 ```
2922 <dict>
2923 <key>LocalFileLinks</key>
2924 <array>
2925 <string>http://example.org</string>
2926 <string>http://example.edu</string>
2927 </array>
2928 </dict>
2929 ```
2930 #### policies.json
2931 ```
2932 {
2933 "policies": {
2934 "LocalFileLinks": ["http://example.org/",
2935 "http://example.edu/"]
2936 }
2937 }
2938 ```
2939 ### NetworkPrediction
2940 Enable or disable network prediction (DNS prefetching).
2941
2942 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2943 **CCK2 Equivalent:** N/A\
2944 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2945
2946 #### Windows (GPO)
2947 ```
2948 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2949 ```
2950 #### Windows (Intune)
2951 OMA-URI:
2952 ```
2953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2954 ```
2955 Value (string):
2956 ```
2957 <enabled/> or <disabled/>
2958 ```
2959 #### macOS
2960 ```
2961 <dict>
2962 <key>NetworkPrediction</key>
2963 <true/> | <false/>
2964 </dict>
2965 ```
2966 #### policies.json
2967 ```
2968 {
2969 "policies": {
2970 "NetworkPrediction": true | false
2971 }
2972 ```
2973 ### NewTabPage
2974 Enable or disable the New Tab page.
2975
2976 **Compatibility:** Firefox 68, Firefox ESR 68\
2977 **CCK2 Equivalent:** N/A\
2978 **Preferences Affected:** `browser.newtabpage.enabled`
2979
2980 #### Windows (GPO)
2981 ```
2982 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2983 ```
2984 #### Windows (Intune)
2985 OMA-URI:
2986 ```
2987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2988 ```
2989 Value (string):
2990 ```
2991 <enabled/> or <disabled/>
2992 ```
2993 #### macOS
2994 ```
2995 <dict>
2996 <key>NewTabPage</key>
2997 <true/> | <false/>
2998 </dict>
2999 ```
3000 #### policies.json
3001 ```
3002 {
3003 "policies": {
3004 "NewTabPage": true | false
3005 }
3006 ```
3007 ### NoDefaultBookmarks
3008 Disable the creation of default bookmarks.
3009
3010 This policy is only effective if the user profile has not been created yet.
3011
3012 **Compatibility:** Firefox 60, Firefox ESR 60\
3013 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3014 **Preferences Affected:** N/A
3015
3016 #### Windows (GPO)
3017 ```
3018 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3019 ```
3020 #### Windows (Intune)
3021 OMA-URI:
3022 ```
3023 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3024 ```
3025 Value (string):
3026 ```
3027 <enabled/> or <disabled/>
3028 ```
3029 #### macOS
3030 ```
3031 <dict>
3032 <key>NoDefaultBookmarks</key>
3033 <true/> | <false/>
3034 </dict>
3035 ```
3036 #### policies.json
3037 ```
3038 {
3039 "policies": {
3040 "NoDefaultBookmarks": true | false
3041 }
3042 }
3043 ```
3044 ### OfferToSaveLogins
3045 Control whether or not Firefox offers to save passwords.
3046
3047 **Compatibility:** Firefox 60, Firefox ESR 60\
3048 **CCK2 Equivalent:** `dontRememberPasswords`\
3049 **Preferences Affected:** `signon.rememberSignons`
3050
3051 #### Windows (GPO)
3052 ```
3053 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3054 ```
3055 #### Windows (Intune)
3056 OMA-URI:
3057 ```
3058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3059 ```
3060 Value (string):
3061 ```
3062 <enabled/> or <disabled/>
3063 ```
3064 #### macOS
3065 ```
3066 <dict>
3067 <key>OfferToSaveLogins</key>
3068 <true/> | <false/>
3069 </dict>
3070 ```
3071 #### policies.json
3072 ```
3073 {
3074 "policies": {
3075 "OfferToSaveLogins": true | false
3076 }
3077 }
3078 ```
3079 ### OfferToSaveLoginsDefault
3080 Sets the default value of signon.rememberSignons without locking it.
3081
3082 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3083 **CCK2 Equivalent:** `dontRememberPasswords`\
3084 **Preferences Affected:** `signon.rememberSignons`
3085
3086 #### Windows (GPO)
3087 ```
3088 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3089 ```
3090 #### Windows (Intune)
3091 OMA-URI:
3092 ```
3093 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3094 ```
3095 Value (string):
3096 ```
3097 <enabled/> or <disabled/>
3098 ```
3099 #### macOS
3100 ```
3101 <dict>
3102 <key>OfferToSaveLoginsDefault</key>
3103 <true/> | <false/>
3104 </dict>
3105 ```
3106 #### policies.json
3107 ```
3108 {
3109 "policies": {
3110 "OfferToSaveLoginsDefault": true | false
3111 }
3112 }
3113 ```
3114 ### OverrideFirstRunPage
3115 Override the first run page. If the value is blank, no first run page is displayed.
3116
3117 **Compatibility:** Firefox 60, Firefox ESR 60\
3118 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3119 **Preferences Affected:** `startup.homepage_welcome_url`
3120
3121 #### Windows (GPO)
3122 ```
3123 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3124 ```
3125 #### Windows (Intune)
3126 OMA-URI:
3127 ```
3128 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3129 ```
3130 Value (string):
3131 ```
3132 <enabled/>
3133 <data id="OverridePage" value="https://example.com"/>
3134 ```
3135 #### macOS
3136 ```
3137 <dict>
3138 <key>OverrideFirstRunPage</key>
3139 <string>http://example.org</string>
3140 </dict>
3141 ```
3142 #### policies.json
3143 ```
3144 {
3145 "policies": {
3146 "OverrideFirstRunPage": "http://example.org"
3147 }
3148 ```
3149 ### OverridePostUpdatePage
3150 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3151
3152 **Compatibility:** Firefox 60, Firefox ESR 60\
3153 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3154 **Preferences Affected:** `startup.homepage_override_url`
3155
3156 #### Windows (GPO)
3157 ```
3158 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3159 ```
3160 #### Windows (Intune)
3161 OMA-URI:
3162 ```
3163 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3164 ```
3165 Value (string):
3166 ```
3167 <enabled/>
3168 <data id="OverridePage" value="https://example.com"/>
3169 ```
3170 #### macOS
3171 ```
3172 <dict>
3173 <key>OverridePostUpdatePage</key>
3174 <string>http://example.org</string>
3175 </dict>
3176 ```
3177 #### policies.json
3178 ```
3179 {
3180 "policies": {
3181 "OverridePostUpdatePage": "http://example.org"
3182 }
3183 ```
3184 ### PasswordManagerEnabled
3185 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3186
3187 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3188 **CCK2 Equivalent:** N/A\
3189 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3190
3191 #### Windows (GPO)
3192 ```
3193 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3194 ```
3195 #### Windows (Intune)
3196 OMA-URI:
3197 ```
3198 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3199 ```
3200 Value (string):
3201 ```
3202 <enabled/> or <disabled/>
3203 ```
3204 #### macOS
3205 ```
3206 <dict>
3207 <key>PasswordManagerEnabled</key>
3208 <true/> | <false/>
3209 </dict>
3210 ```
3211 #### policies.json
3212 ```
3213 {
3214 "policies": {
3215 "PasswordManagerEnabled": true | false
3216 }
3217 }
3218 ```
3219 ### PDFjs
3220 Disable or configure PDF.js, the built-in PDF viewer.
3221
3222 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3223
3224 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3225
3226 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3227
3228 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3229 **CCK2 Equivalent:** N/A\
3230 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3231
3232 #### Windows (GPO)
3233 ```
3234 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3235 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3236 ```
3237 #### Windows (Intune)
3238 OMA-URI:
3239 ```
3240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3242 ```
3243 Value (string):
3244 ```
3245 <enabled/>or <disabled/>
3246 ```
3247 #### macOS
3248 ```
3249 <dict>
3250 <key>PDFjs</key>
3251 <dict>
3252 <key>Enabled</key>
3253 <true/> | <false/>
3254 <key><EnablePermissions</key>
3255 <true/> | <false/>
3256 </dict>
3257 </dict>
3258 ```
3259 #### policies.json
3260 ```
3261 {
3262 "policies": {
3263 "PSFjs": {
3264 "Enabled": true | false,
3265 "EnablePermissions": true | false
3266 }
3267 }
3268 ```
3269 ### Permissions
3270 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3271
3272 `Allow` is a list of origins where the feature is allowed.
3273
3274 `Block` is a list of origins where the feature is not allowed.
3275
3276 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3277
3278 `Locked` prevents the user from changing preferences for the feature.
3279
3280 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3281
3282 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3283 **CCK2 Equivalent:** N/A\
3284 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3285
3286 #### Windows (GPO)
3287 ```
3288 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3289 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3290 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3291 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3292 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3293 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3294 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3295 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3296 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3297 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3298 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3299 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3300 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3301 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3302 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3303 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3304 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3305 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3306 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3307 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3308 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3309 ```
3310 #### Windows (Intune)
3311 OMA-URI:
3312 ```
3313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3314 ```
3315 Value (string):
3316 ```
3317 <enabled/> or <disabled/>
3318 ```
3319 OMA-URI:
3320 ```
3321 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3322 ```
3323 Value (string):
3324 ```
3325 <enabled/> or <disabled/>
3326 ```
3327 OMA-URI:
3328 ```
3329 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3330 ```
3331 Value (string):
3332 ```
3333 <enabled/>
3334 <data id="Permissions" value="1&#xF000;https://example.org"/>
3335 ```
3336 OMA-URI:
3337 ```
3338 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3339 ```
3340 Value (string):
3341 ```
3342 <enabled/> or <disabled/>
3343 ```
3344 OMA-URI:
3345 ```
3346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3347 ```
3348 Value (string):
3349 ```
3350 <enabled/> or <disabled/>
3351 ```
3352 OMA-URI:
3353 ```
3354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3355 ```
3356 Value (string):
3357 ```
3358 <enabled/>
3359 <data id="Permissions" value="1&#xF000;https://example.org"/>
3360 ```
3361 OMA-URI:
3362 ```
3363 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3364 ```
3365 Value (string):
3366 ```
3367 <enabled/>
3368 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3369 ```
3370 OMA-URI:
3371 ```
3372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3373 ```
3374 Value (string):
3375 ```
3376 <enabled/>
3377 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3378 ```
3379 OMA-URI:
3380 ```
3381 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3382 ```
3383 Value (string):
3384 ```
3385 <enabled/> or <disabled/>
3386 ```
3387 #### macOS
3388 ```
3389 <dict>
3390 <key>Permissions</key>
3391 <dict>
3392 <key>Camera</key>
3393 <dict>
3394 <key>Allow</key>
3395 <array>
3396 <string>https://example.org</string>
3397 <string>https://example.org:1234</string>
3398 </array>
3399 <key>Block</key>
3400 <array>
3401 <string>https://example.edu</string>
3402 </array>
3403 <key>BlockNewRequests</key>
3404 <true/> | <false/>
3405 <key>Locked</key>
3406 <true/> | <false/>
3407 </dict>
3408 <key>Microphone</key>
3409 <dict>
3410 <key>Allow</key>
3411 <array>
3412 <string>https://example.org</string>
3413 </array>
3414 <key>Block</key>
3415 <array>
3416 <string>https://example.edu</string>
3417 </array>
3418 <key>BlockNewRequests</key>
3419 <true/> | <false/>
3420 <key>Locked</key>
3421 <true/> | <false/>
3422 </dict>
3423 <key>Location</key>
3424 <dict>
3425 <key>Allow</key>
3426 <array>
3427 <string>https://example.org</string>
3428 </array>
3429 <key>Block</key>
3430 <array>
3431 <string>https://example.edu</string>
3432 </array>
3433 <key>BlockNewRequests</key>
3434 <true/> | <false/>
3435 <key>Locked</key>
3436 <true/> | <false/>
3437 </dict>
3438 <key>Notifications</key>
3439 <dict>
3440 <key>Allow</key>
3441 <array>
3442 <string>https://example.org</string>
3443 </array>
3444 <key>Block</key>
3445 <array>
3446 <string>https://example.edu</string>
3447 </array>
3448 <key>BlockNewRequests</key>
3449 <true/>
3450 <key>Locked</key>
3451 <true/>
3452 </dict>
3453 <key>Autoplay</key>
3454 <dict>
3455 <key>Allow</key>
3456 <array>
3457 <string>https://example.org</string>
3458 </array>
3459 <key>Block</key>
3460 <array>
3461 <string>https://example.edu</string>
3462 </array>
3463 <key>Default</key>
3464 <string>allow-audio-video | block-audio | block-audio-video</string>
3465 <key>Locked</key>
3466 <true/> | <false/>
3467 </dict>
3468 </dict>
3469 </dict>
3470 ```
3471 #### policies.json
3472 ```
3473 {
3474 "policies": {
3475 "Permissions": {
3476 "Camera": {
3477 "Allow": ["https://example.org","https://example.org:1234"],
3478 "Block": ["https://example.edu"],
3479 "BlockNewRequests": true | false,
3480 "Locked": true | false
3481 },
3482 "Microphone": {
3483 "Allow": ["https://example.org"],
3484 "Block": ["https://example.edu"],
3485 "BlockNewRequests": true | false,
3486 "Locked": true | false
3487 },
3488 "Location": {
3489 "Allow": ["https://example.org"],
3490 "Block": ["https://example.edu"],
3491 "BlockNewRequests": true | false,
3492 "Locked": true | false
3493 },
3494 "Notifications": {
3495 "Allow": ["https://example.org"],
3496 "Block": ["https://example.edu"],
3497 "BlockNewRequests": true | false,
3498 "Locked": true | false
3499 },
3500 "Autoplay": {
3501 "Allow": ["https://example.org"],
3502 "Block": ["https://example.edu"],
3503 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3504 "Locked": true | false
3505 }
3506 }
3507 }
3508 }
3509 ```
3510 ### PictureInPicture
3511
3512 Enable or disable Picture-in-Picture.
3513
3514 **Compatibility:** Firefox 78, Firefox ESR 78\
3515 **CCK2 Equivalent:** N/A\
3516 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3517
3518 #### Windows (GPO)
3519 ```
3520 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3521 ```
3522 #### Windows (Intune)
3523 OMA-URI:
3524 ```
3525 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3526 ```
3527 Value (string):
3528 ```
3529 <enabled/> or <disabled/>
3530 ```
3531 #### macOS
3532 ```
3533 <dict>
3534 <key>PictureInPicture</key>
3535 <true/> | <false/>
3536 </dict>
3537 ```
3538 #### policies.json
3539 ```
3540 {
3541 "policies": {
3542 "PictureInPicture": true | false
3543 }
3544 }
3545 ```
3546 ### PopupBlocking
3547 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3548
3549 `Allow` is a list of origins where popup-windows are allowed.
3550
3551 `Default` determines whether or not pop-up windows are allowed by default.
3552
3553 `Locked` prevents the user from changing pop-up preferences.
3554
3555 **Compatibility:** Firefox 60, Firefox ESR 60\
3556 **CCK2 Equivalent:** `permissions.popup`\
3557 **Preferences Affected:** `dom.disable_open_during_load`
3558
3559 #### Windows (GPO)
3560 ```
3561 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3562 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3563 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3564 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3565 ```
3566 #### Windows (Intune)
3567 OMA-URI:
3568 ```
3569 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3570 ```
3571 Value (string):
3572 ```
3573 <enabled/>
3574 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3575 ```
3576 OMA-URI:
3577 ```
3578 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3579 ```
3580 Value (string):
3581 ```
3582 <enabled/> or <disabled/>
3583 ```
3584 OMA-URI:
3585 ```
3586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3587 ```
3588 Value (string):
3589 ```
3590 <enabled/> or <disabled/>
3591 ```
3592 #### macOS
3593 ```
3594 <dict>
3595 <key>PopupBlocking</key>
3596 <dict>
3597 <key>Allow</key>
3598 <array>
3599 <string>http://example.org</string>
3600 <string>http://example.edu</string>
3601 </array>
3602 <key>Default</key>
3603 <true/> | <false/>
3604 <key>Locked</key>
3605 <true/> | <false/>
3606 </dict>
3607 </dict>
3608 ```
3609 #### policies.json
3610 ```
3611 {
3612 "policies": {
3613 "PopupBlocking": {
3614 "Allow": ["http://example.org/",
3615 "http://example.edu/"],
3616 "Default": true | false,
3617 "Locked": true | false
3618 }
3619 }
3620 }
3621 ```
3622 ### Preferences
3623 Set and lock certain preferences.
3624
3625 **Compatibility:** See below\
3626 **CCK2 Equivalent:** `preferences`\
3627 **Preferences Affected:** See below
3628
3629 | Preference | Type | Compatibility | Default
3630 | --- | --- | --- | ---
3631 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3632 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3633 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3634 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3635 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3637 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3639 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3641 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3643 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3644 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3645 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3647 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3648 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3649 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3650 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3651 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3653 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3655 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3657 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3659 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3661 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3663 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3665 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3667 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3669 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3671 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3673 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3675 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3677 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3679 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3680 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3681 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3682 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3683 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3685 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3686 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3687 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3689 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3691 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3693 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3695 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3697 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3698 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3699 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3700 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3701 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3702 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3703 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3704 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3705 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3706 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3707 disabled
3708 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3709 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3710 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3711 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3712 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3714 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3716 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3718 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3720 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3721 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3722 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3723 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3724 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3725 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3726 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3727 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3728 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3729 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3730 #### Windows (GPO)
3731 ```
3732 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3733 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3734 ```
3735 #### Windows (Intune)
3736 OMA-URI: (periods are replaced by underscores)
3737 ```
3738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3739 ```
3740 Value (string):
3741 ```
3742 <enabled/> or <disabled/>
3743 ```
3744 OMA-URI: (periods are replaced by underscores)
3745 ```
3746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
3747 ```
3748 Value (string):
3749 ```
3750 <enabled/>
3751 <data id="Preferences_String" value="string_value"/>
3752 ```
3753 #### macOS
3754 ```
3755 <dict>
3756 <key>Preferences</key>
3757 <dict>
3758 <key>boolean_preference_name</key>
3759 <true/> | <false/>
3760 <key>string_preference_name</key>
3761 <string>string_value</string>
3762 </dict>
3763 </dict>
3764 ```
3765 #### policies.json
3766 ```
3767 {
3768 "policies": {
3769 "Preferences": {
3770 "boolean_preference_name": true | false,
3771 "string_preference_name": "string_value"
3772 }
3773 }
3774 }
3775 ```
3776 ### PromptForDownloadLocation
3777 Ask where to save each file before downloading.
3778
3779 **Compatibility:** Firefox 68, Firefox ESR 68\
3780 **CCK2 Equivalent:** N/A\
3781 **Preferences Affected:** `browser.download.useDownloadDir`
3782
3783 #### Windows (GPO)
3784 ```
3785 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3786 ```
3787 #### Windows (Intune)
3788 OMA-URI:
3789 ```
3790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3791 ```
3792 Value (string):
3793 ```
3794 <enabled/> or <disabled/>
3795 ```
3796 #### macOS
3797 ```
3798 <dict>
3799 <key>PromptForDownloadLocation</key>
3800 <true/> | <false/>
3801 </dict>
3802 ```
3803 #### policies.json
3804 ```
3805 {
3806 "policies": {
3807 "PromptForDownloadLocation": true | false
3808 }
3809 }
3810 ```
3811 ### Proxy
3812 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3813 To specify ports, append them to the hostnames with a colon (:).
3814
3815 `Mode` is the proxy method being used.
3816
3817 `Locked` is whether or not proxy settings can be changed.
3818
3819 `HTTPProxy` is the HTTP proxy server.
3820
3821 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3822
3823 `SSLProxy` is the SSL proxy server.
3824
3825 `FTPProxy` is the FTP proxy server.
3826
3827 `SOCKSProxy` is the SOCKS proxy server
3828
3829 `SOCKSVersion` is the SOCKS version (4 or 5)
3830
3831 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3832
3833 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3834
3835 `AutoLogin` means do not prompt for authentication if password is saved.
3836
3837 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3838
3839 **Compatibility:** Firefox 60, Firefox ESR 60\
3840 **CCK2 Equivalent:** `networkProxy*`\
3841 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3842
3843 #### Windows (GPO)
3844 ```
3845 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3846 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3847 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3848 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3849 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3850 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3851 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3852 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3853 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3854 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3855 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3856 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3857 ```
3858 #### Windows (Intune)
3859 OMA-URI:
3860 ```
3861 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3862 ```
3863 Value (string):
3864 ```
3865 <enabled/>
3866 <data id="ProxyLocked" value="true | false"/>
3867 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3868 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3869 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3870 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3871 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3872 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3873 <data id="SOCKSVersion" value="4 | 5"/>
3874 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3875 <data id="Passthrough" value="<local>"/>
3876 <data id="AutoLogin" value="true | false"/>
3877 <data id="UseProxyForDNS" value="true | false"/>
3878 ```
3879 #### macOS
3880 ```
3881 <dict>
3882 <key>Proxy</key>
3883 <dict>
3884 <key>Mode</key>
3885 <string>none | system | manual | autoDetect | autoConfig</string>
3886 <key>Locked</key>
3887 <true> | </false>
3888 <key>HTTPProxy</key>
3889 <string>https://httpproxy.example.com</string>
3890 <key>UseHTTPProxyForAllProtocols</key>
3891 <true> | </false>
3892 <key>SSLProxy</key>
3893 <string>https://sslproxy.example.com</string>
3894 <key>FTPProxy</key>
3895 <string>https://ftpproxy.example.com</string>
3896 <key>SOCKSProxy</key>
3897 <string>https://socksproxy.example.com</string>
3898 <key>SOCKSVersion</key>
3899 <string>4 | 5</string>
3900 <key>Passthrough</key>
3901 <string>&lt;local>&gt;</string>
3902 <key>AutoConfigURL</key>
3903 <string>URL_TO_AUTOCONFIG</string>
3904 <key>AutoLogin</key>
3905 <true> | </false>
3906 <key>UseProxyForDNS</key>
3907 <true> | </false>
3908 </dict>
3909 </dict>
3910 ```
3911 #### policies.json
3912 ```
3913 {
3914 "policies": {
3915 "Proxy": {
3916 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3917 "Locked": true | false,
3918 "HTTPProxy": "hostname",
3919 "UseHTTPProxyForAllProtocols": true | false,
3920 "SSLProxy": "hostname",
3921 "FTPProxy": "hostname",
3922 "SOCKSProxy": "hostname",
3923 "SOCKSVersion": 4 | 5
3924 "Passthrough": "<local>",
3925 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3926 "AutoLogin": true | false,
3927 "UseProxyForDNS": true | false
3928 }
3929 }
3930 }
3931 ```
3932 ### RequestedLocales
3933 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3934
3935 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3936
3937 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3938 **CCK2 Equivalent:** N/A\
3939 **Preferences Affected:** N/A
3940 #### Windows (GPO)
3941 ```
3942 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3943 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3944
3945 or
3946
3947 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3948 ```
3949 #### Windows (Intune)
3950 OMA-URI:
3951 ```
3952 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3953 ```
3954 Value (string):
3955 ```
3956 <enabled/>
3957 <data id="Preferences_String" value="de,en-US"/>
3958 ```
3959 #### macOS
3960 ```
3961 <dict>
3962 <key>RequestedLocales</key>
3963 <array>
3964 <string>de</string>
3965 <string>en-US</string>
3966 </array>
3967 </dict>
3968
3969 or
3970
3971 <dict>
3972 <key>RequestedLocales</key>
3973 <string>de,en-US</string>
3974 </dict>
3975
3976 ```
3977 #### policies.json
3978 ```
3979 {
3980 "policies": {
3981 "RequestedLocales": ["de", "en-US"]
3982 }
3983 }
3984
3985 or
3986
3987 {
3988 "policies": {
3989 "RequestedLocales": "de,en-US"
3990 }
3991 }
3992 ```
3993 <a name="SanitizeOnShutdown"></a>
3994
3995 ### SanitizeOnShutdown (Selective)
3996 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3997
3998 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3999
4000 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4001 **CCK2 Equivalent:** N/A\
4002 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4003 #### Windows (GPO)
4004 ```
4005 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4006 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4007 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4008 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4009 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4010 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4011 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4012 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4013 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4014 ```
4015 #### Windows (Intune)
4016 OMA-URI:
4017 ```
4018 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4019 ```
4020 Value (string):
4021 ```
4022 <enabled/> or <disabled/>
4023 ```
4024 #### macOS
4025 ```
4026 <dict>
4027 <key>SanitizeOnShutdown</key>
4028 <dict>
4029 <key>Cache</key>
4030 <true/> | <false/>
4031 <key>Cookies</key>
4032 <true/> | <false/>
4033 <key>Downloads</key>
4034 <true/> | <false/>
4035 <key>FormData</key>
4036 <true/> | <false/>
4037 <key>History</key>
4038 <true/> | <false/>
4039 <key>Sessions</key>
4040 <true/> | <false/>
4041 <key>SiteSettings</key>
4042 <true/> | <false/>
4043 <key>OfflineApps</key>
4044 <true/> | <false/>
4045 <key>Locked</key>
4046 <true/> | <false/>
4047 </dict>
4048 </dict>
4049 ```
4050 #### policies.json
4051 ```
4052 {
4053 "policies": {
4054 "SanitizeOnShutdown": {
4055 "Cache": true | false,
4056 "Cookies": true | false,
4057 "Downloads": true | false,
4058 "FormData": true | false,
4059 "History": true | false,
4060 "Sessions": true | false,
4061 "SiteSettings": true | false,
4062 "OfflineApps": true | false,
4063 "Locked": true | false
4064 }
4065 }
4066 }
4067 ```
4068 ### SanitizeOnShutdown (All)
4069 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4070
4071 **Compatibility:** Firefox 60, Firefox ESR 60\
4072 **CCK2 Equivalent:** N/A\
4073 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4074 #### Windows (GPO)
4075 ```
4076 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4077 ```
4078 #### Windows (Intune)
4079 OMA-URI:
4080 ```
4081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4082 ```
4083 Value (string):
4084 ```
4085 <enabled/> or <disabled/>
4086 ```
4087 #### macOS
4088 ```
4089 <dict>
4090 <key>SanitizeOnShutdown</key>
4091 <true/> | <false/>
4092 </dict>
4093 ```
4094 #### policies.json
4095 ```
4096 {
4097 "policies": {
4098 "SanitizeOnShutdown": true | false
4099 }
4100 }
4101 ```
4102 ### SearchBar
4103 Set whether or not search bar is displayed.
4104
4105 **Compatibility:** Firefox 60, Firefox ESR 60\
4106 **CCK2 Equivalent:** `showSearchBar`\
4107 **Preferences Affected:** N/A
4108
4109 #### Windows (GPO)
4110 ```
4111 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4112 ```
4113
4114 #### Windows (Intune)
4115 OMA-URI:
4116 ```
4117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4118 ```
4119 Value (string):
4120 ```
4121 <enabled/>
4122 <data id="Permissions" value="unified | separate"/>
4123 ```
4124 #### macOS
4125 ```
4126 <dict>
4127 <key>SearchBar</key>
4128 <string>unified | separate</string>
4129 </dict>
4130 ```
4131 #### policies.json
4132 ```
4133 {
4134 "policies": {
4135 "SearchBar": "unified" | "separate"
4136 }
4137 }
4138 ```
4139 <a name="SearchEngines"></a>
4140
4141 ### SearchEngines (This policy is only available on the ESR.)
4142
4143 ### SearchEngines | Default
4144
4145 Set the default search engine. This policy is only available on the ESR.
4146
4147 **Compatibility:** Firefox ESR 60\
4148 **CCK2 Equivalent:** `defaultSearchEngine`\
4149 **Preferences Affected:** N/A
4150
4151 #### Windows (GPO)
4152 ```
4153 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4154 ```
4155 #### Windows (Intune)
4156 OMA-URI:
4157 ```
4158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4159 ```
4160 Value (string):
4161 ```
4162 <enabled/>
4163 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4164 ```
4165 #### macOS
4166 ```
4167 <dict>
4168 <key>SearchEngines</key>
4169 <dict>
4170 <key>Default</key>
4171 <string>NAME_OF_SEARCH_ENGINE</string>
4172 </dict>
4173 </dict>
4174 ```
4175 #### policies.json
4176 ```
4177 {
4178 "policies": {
4179 "SearchEngines": {
4180 "Default": "NAME_OF_SEARCH_ENGINE"
4181 }
4182 }
4183 }
4184 ```
4185 ### SearchEngines | PreventInstalls
4186
4187 Prevent installing search engines from webpages.
4188
4189 **Compatibility:** Firefox ESR 60\
4190 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4191 **Preferences Affected:** N/A
4192
4193 #### Windows (GPO)
4194 ```
4195 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4196 ```
4197 #### Windows (Intune)
4198 OMA-URI:
4199 ```
4200 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4201 ```
4202 Value (string):
4203 ```
4204 <enabled/> or <disabled/>
4205 ```
4206 #### macOS
4207 ```
4208 <dict>
4209 <key>SearchEngines</key>
4210 <dict>
4211 <key>PreventInstalls</key>
4212 <true/> | <false/>
4213 </dict>
4214 </dict>
4215 ```
4216 #### policies.json
4217 ```
4218 {
4219 "policies": {
4220 "SearchEngines": {
4221 "PreventInstalls": true | false
4222 }
4223 }
4224 }
4225 ```
4226 ### SearchEngines | Remove
4227
4228 Hide built-in search engines. This policy is only available on the ESR.
4229
4230 **Compatibility:** Firefox ESR 60.2\
4231 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4232 **Preferences Affected:** N/A
4233
4234 #### Windows (GPO)
4235 ```
4236 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4237 ```
4238 #### Windows (Intune)
4239 OMA-URI:
4240 ```
4241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4242 ```
4243 Value (string):
4244 ```
4245 <enabled/>
4246 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4247 ```
4248 #### macOS
4249 ```
4250 <dict>
4251 <key>SearchEngines</key>
4252 <dict>
4253 <key>Remove</key>
4254 <array>
4255 <string>NAME_OF_SEARCH_ENGINE</string>
4256 </array>
4257 </dict>
4258 </dict>
4259 ```
4260 #### policies.json
4261 ```
4262 {
4263 "policies": {
4264 "SearchEngines": {
4265 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4266 }
4267 }
4268 }
4269 ```
4270 ### SearchEngines | Add
4271
4272 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4273
4274 `Name` is the name of the search engine.
4275
4276 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4277
4278 `Method` is either GET or POST
4279
4280 `IconURL` is a URL for the icon to use.
4281
4282 `Alias` is a keyword to use for the engine.
4283
4284 `Description` is a description of the search engine.
4285
4286 `PostData` is the POST data as name value pairs separated by &.
4287
4288 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4289
4290 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4291 **CCK2 Equivalent:** `searchplugins`\
4292 **Preferences Affected:** N/A
4293
4294 #### Windows (GPO)
4295 ```
4296 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4297 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4298 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4299 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4300 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4301 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4302 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4303 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4304 ```
4305 #### Windows (Intune)
4306 OMA-URI:
4307 ```
4308 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4309 ```
4310 Value (string):
4311 ```
4312 <enabled/>
4313 <data id="SearchEngine_Name" value="Example1"/>
4314 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4315 <data id="SearchEngine_Method" value="GET | POST"/>
4316 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4317 <data id="SearchEngine_Alias" value="example"/>
4318 <data id="SearchEngine_Description" value="Example Description"/>
4319 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4320 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4321 ```
4322 #### macOS
4323 ```
4324 <dict>
4325 <key>SearchEngines</key>
4326 <dict>
4327 <key>Add</key>
4328 <array>
4329 <dict>
4330 <key>Name</key>
4331 <string>Example1</string>
4332 <key>URLTemplate</key>
4333 <string>https://www.example.org/q={searchTerms}</string>
4334 <key>Method</key>
4335 <string>GET | POST </string>
4336 <key>IconURL</key>
4337 <string>https://www.example.org/favicon.ico</string>
4338 <key>Alias</key>
4339 <string>example</string>
4340 <key>Description</key>
4341 <string>Example Description</string>
4342 <key>SuggestURLTemplate</key>
4343 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4344 <key>PostData</key>
4345 <string>name=value&q={searchTerms}</string>
4346 </dict>
4347 <array>
4348 </dict>
4349 </dict>
4350 ```
4351 #### policies.json
4352 ```
4353 {
4354 "policies": {
4355 "SearchEngines": {
4356 "Add": [
4357 {
4358 "Name": "Example1",
4359 "URLTemplate": "https://www.example.org/q={searchTerms}",
4360 "Method": "GET" | "POST",
4361 "IconURL": "https://www.example.org/favicon.ico",
4362 "Alias": "example",
4363 "Description": "Description",
4364 "PostData": "name=value&q={searchTerms}",
4365 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4366 }
4367 ]
4368 }
4369 }
4370 }
4371 ```
4372 ### SearchSuggestEnabled
4373
4374 Enable search suggestions.
4375
4376 **Compatibility:** Firefox 68, Firefox ESR 68\
4377 **CCK2 Equivalent:** N/A\
4378 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4379
4380 #### Windows (GPO)
4381 ```
4382 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4383 ```
4384 #### Windows (Intune)
4385 OMA-URI:
4386 ```
4387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4388 ```
4389 Value (string):
4390 ```
4391 <enabled/> or <disabled/>
4392 ```
4393 #### macOS
4394 ```
4395 <dict>
4396 <key>SearchSuggestEnabled</key>
4397 <true/> | <false/>
4398 </dict>
4399 ```
4400 #### policies.json
4401 ```
4402 {
4403 "policies": {
4404 "SearchSuggestEnabled": true | false
4405 }
4406 }
4407 ```
4408 ### SecurityDevices
4409
4410 Install PKCS #11 modules.
4411
4412 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4413 **CCK2 Equivalent:** `certs.devices`\
4414 **Preferences Affected:** N/A
4415
4416 #### Windows (GPO)
4417 ```
4418 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4419 ```
4420 #### Windows (Intune)
4421 OMA-URI:
4422 ```
4423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4424 ```
4425 Value (string):
4426 ```
4427 <enabled/>
4428 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4429 ```
4430 #### macOS
4431 ```
4432 <dict>
4433 <key>SecurityDevices</key>
4434 <dict>
4435 <key>NAME_OF_DEVICE</key>
4436 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4437 </dict>
4438 </dict>
4439 ```
4440
4441 #### policies.json
4442 ```
4443 {
4444 "policies": {
4445 "SecurityDevices": {
4446 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4447 }
4448 }
4449 }
4450 ```
4451 ### SSLVersionMax
4452
4453 Set and lock the maximum version of TLS.
4454
4455 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4456 **CCK2 Equivalent:** N/A\
4457 **Preferences Affected:** `security.tls.version.max`
4458
4459 #### Windows (GPO)
4460 ```
4461 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4462 ```
4463 #### Windows (Intune)
4464 OMA-URI:
4465 ```
4466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4467 ```
4468 Value (string):
4469 ```
4470 <enabled/>
4471 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4472 ```
4473 #### macOS
4474 ```
4475 <dict>
4476 <key>SSLVersionMax</key>
4477 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4478 </dict>
4479 ```
4480
4481 #### policies.json
4482 ```
4483 {
4484 "policies": {
4485 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4486 }
4487 }
4488 ```
4489 ### SSLVersionMin
4490
4491 Set and lock the minimum version of TLS.
4492
4493 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4494 **CCK2 Equivalent:** N/A\
4495 **Preferences Affected:** `security.tls.version.min`
4496
4497 #### Windows (GPO)
4498 ```
4499 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4500 ```
4501 #### Windows (Intune)
4502 OMA-URI:
4503 ```
4504 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4505 ```
4506 Value (string):
4507 ```
4508 <enabled/>
4509 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4510 ```
4511 #### macOS
4512 ```
4513 <dict>
4514 <key>SSLVersionMin</key>
4515 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4516 </dict>
4517 ```
4518
4519 #### policies.json
4520 ```
4521 {
4522 "policies": {
4523 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4524 }
4525 }
4526 ```
4527 ### SupportMenu
4528 Add a menuitem to the help menu for specifying support information.
4529
4530 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4531 **CCK2 Equivalent:** helpMenu\
4532 **Preferences Affected:** N/A
4533
4534 #### Windows (GPO)
4535 ```
4536 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4537 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4538 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4539 ```
4540 #### Windows (Intune)
4541 OMA-URI:
4542 ```
4543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4544 ```
4545 Value (string):
4546 ```
4547 <enabled/>
4548 <data id="SupportMenuTitle" value="Support Menu"/>
4549 <data id="SupportMenuURL" value="http://example.com/support"/>
4550 <data id="SupportMenuAccessKey" value="S">
4551 ```
4552 #### macOS
4553 ```
4554 <dict>
4555 <key>SupportMenu</key>
4556 <dict>
4557 <key>Title</key>
4558 <string>SupportMenu</string>
4559 <key>URL</key>
4560 <string>http://example.com/support</string>
4561 <key>AccessKey</key>
4562 <string>S</string>
4563 </dict>
4564 </dict>
4565 ```
4566 #### policies.json
4567 ```
4568 {
4569 "policies": {
4570 "SupportMenu": {
4571 "Title": "Support Menu",
4572 "URL": "http://example.com/support",
4573 "AccessKey": "S"
4574 }
4575 }
4576 }
4577 ```
4578 ### UserMessaging
4579
4580 Prevent installing search engines from webpages.
4581
4582 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4583
4584 `ExtensionRecommendations` Don't recommend extensions.
4585
4586 `FeatureRecommendations` Don't recommend browser features.
4587
4588 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4589
4590 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4591 **CCK2 Equivalent:** N/A\
4592 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4593
4594 #### Windows (GPO)
4595 ```
4596 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4597 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4598 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4599 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4600 ```
4601 #### Windows (Intune)
4602 OMA-URI:
4603 ```
4604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4606 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4607 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4608 ```
4609 Value (string):
4610 ```
4611 <enabled/> or <disabled/>
4612 ```
4613 #### macOS
4614 ```
4615 <dict>
4616 <key>UserMessaging</key>
4617 <dict>
4618 <key>WhatsNew</key>
4619 <true/> | <false/>
4620 <key>ExtensionRecommendations</key>
4621 <true/> | <false/>
4622 <key>FeatureRecommendations</key>
4623 <true/> | <false/>
4624 <key>UrlbarInterventions</key>
4625 <true/> | <false/>
4626 </dict>
4627 </dict>
4628 ```
4629 #### policies.json
4630 ```
4631 {
4632 "policies": {
4633 "UserMessaging": {
4634 "WhatsNew": true | false,
4635 "ExtensionRecommendations": true | false,
4636 "FeatureRecommendations": true | false,
4637 "UrlbarInterventions": true | false
4638 }
4639 }
4640 }
4641 ```
4642 ### WebsiteFilter
4643 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4644
4645 **Compatibility:** Firefox 60, Firefox ESR 60\
4646 **CCK2 Equivalent:** N/A\
4647 **Preferences Affected:** N/A
4648
4649 #### Windows (GPO)
4650 ```
4651 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4652 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4653 ```
4654 #### Windows (Intune)
4655 OMA-URI:
4656 ```
4657 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4658 ```
4659 Value (string):
4660 ```
4661 <enabled/>
4662 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4663 ```
4664 OMA-URI:
4665 ```
4666 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4667 ```
4668 Value (string):
4669 ```
4670 <enabled/>
4671 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4672 ```
4673 #### macOS
4674 ```
4675 <dict>
4676 <key>WebsiteFilter</key>
4677 <dict>
4678 <key>Block</key>
4679 <array>
4680 <string><all_urls></string>
4681 </array>
4682 <key>Exceptions</key>
4683 <array>
4684 <string>http://example.org/*</string>
4685 </array>
4686 </dict>
4687
4688 </dict>
4689 ```
4690 #### policies.json
4691 ```
4692 {
4693 "policies": {
4694 "WebsiteFilter": {
4695 "Block": ["<all_urls>"],
4696 "Exceptions": ["http://example.org/*"]
4697 }
4698 }
4699 }
4700 ```

patrick-canterino.de