]> git.p6c8.net - policy-templates.git/blob - README.md
Correct SecurityDevices syntax
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
53 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
54 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
55 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
56 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
57 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
58 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
59 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
60 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
61 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
62 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
63 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
64 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
65 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
66 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
67 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
68 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
69 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
70 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
71 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
72 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
73 | **[`Preferences`](#preferences)** | Set and lock some preferences.
74 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
75 | **[`Proxy`](#proxy)** | Configure proxy settings.
76 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
77 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
78 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
79 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
80 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
81 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
82 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
83 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
84 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
87 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
88 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
89 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
90 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
91 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
92
93 ### AppAutoUpdate
94
95 Enable or disable **automatic** application update.
96
97 If set to true, application updates are installed without user approval.
98
99 If set to false, application updates are downloaded but the user can choose when to install the update.
100
101 If you have disabled updates via DisableAppUpdate, this policy has no effect.
102
103 **Compatibility:** Firefox 75, Firefox ESR 68.7\
104 **CCK2 Equivalent:** N/A\
105 **Preferences Affected:** app.update.auto
106
107 #### Windows (GPO)
108 ```
109 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
110 ```
111 #### Windows (Intune)
112 OMA-URI:
113 ```
114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
115 ```
116 Value (string):
117 ```
118 <enabled/> or <disabled/>
119 ```
120 #### macOS
121 ```
122 <dict>
123 <key>AppAutoUpdate</key>
124 <true/> | <false/>
125 </dict>
126 ```
127 #### policies.json
128 ```
129 {
130 "policies": {
131 "AppAutoUpdate": true | false
132 }
133 }
134 ```
135 ### AppUpdateURL
136
137 Change the URL for application update.
138
139 **Compatibility:** Firefox 62, Firefox ESR 60.2\
140 **CCK2 Equivalent:** N/A\
141 **Preferences Affected:** `app.update.url`
142
143 #### Windows (GPO)
144 ```
145 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
146 ```
147 #### Windows (Intune)
148 OMA-URI:
149 ```
150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
151 ```
152 Value (string):
153 ```
154 <enabled/>
155 <data id="AppUpdateURL" value="https://yoursite.com"/>
156 ```
157 #### macOS
158 ```
159 <dict>
160 <key>AppUpdateURL</key>
161 <string>https://yoursite.com</string>
162 </dict>
163 ```
164 #### policies.json
165 ```
166 {
167 "policies": {
168 "AppUpdateURL": "https://yoursite.com"
169 }
170 }
171 ```
172 ### Authentication
173
174 Configure sites that support integrated authentication.
175
176 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
177
178 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
179 **CCK2 Equivalent:** N/A\
180 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
181
182 #### Windows (GPO)
183 ```
184 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
185 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
186 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
191 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
192 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
194 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
195 ```
196 #### Windows (Intune)
197 OMA-URI:
198 ```
199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
200 ```
201 Value (string):
202 ```
203 <enabled/>
204 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
205 ```
206 OMA-URI:
207 ```
208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
209 ```
210 Value (string):
211 ```
212 <enabled/>
213 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
214 ```
215 OMA-URI:
216 ```
217 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
218 ```
219 Value (string):
220 ```
221 <enabled/>
222 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
223 ```
224 OMA-URI:
225 ```
226 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
227 ```
228 Value (string):
229 ```
230 <enabled/>
231 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
232 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
233 ```
234 OMA-URI:
235 ```
236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
237 ```
238 Value (string):
239 ```
240 <enabled/>
241 <data id="StartPage" value="none | homepage | previous-session"/>
242 ```
243 #### macOS
244 ```
245 <dict>
246 <key>Authentication</key>
247 <dict>
248 <key>SPNEGO</key>
249 <array>
250 <string>mydomain.com</string>
251 <string>https://myotherdomain.com</string>
252 </array>
253 <key>Delegated</key>
254 <array>
255 <string>mydomain.com</string>
256 <string>https://myotherdomain.com</string>
257 </array>
258 <key>NTLM</key>
259 <array>
260 <string>mydomain.com</string>
261 <string>https://myotherdomain.com</string>
262 </array>
263 <key>AllowNonFQDN</key>
264 <dict>
265 <key>SPNEGO</key>
266 <true/> | <false/>
267 <key>NTLM</key>
268 <true/> | <false/>
269 </dict>
270 <key>AllowProxies</key>
271 <dict>
272 <key>SPNEGO</key>
273 <true/> | <false/>
274 <key>NTLM</key>
275 <true/> | <false/>
276 </dict>
277 <key>Locked</key>
278 <true/> | <false/>
279 </dict>
280 </dict>
281 ```
282 #### policies.json
283 ```
284 {
285 "policies": {
286 "Authentication": {
287 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
288 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
289 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
290 "AllowNonFQDN": {
291 "SPNEGO": true | false,
292 "NTLM": true | false
293 },
294 "AllowProxies": {
295 "SPNEGO": true | false,
296 "NTLM": true | false
297 },
298 "Locked": true | false
299 }
300 }
301 }
302 ```
303 ### BlockAboutAddons
304
305 Block access to the Add-ons Manager (about:addons).
306
307 **Compatibility:** Firefox 60, Firefox ESR 60\
308 **CCK2 Equivalent:** `disableAddonsManager`\
309 **Preferences Affected:** N/A
310
311 #### Windows (GPO)
312 ```
313 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
314 ```
315 #### Windows (Intune)
316 OMA-URI:
317 ```
318 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
319 ```
320 Value (string):
321 ```
322 <enabled/> or <disabled/>
323 ```
324 #### macOS
325 ```
326 <dict>
327 <key>BlockAboutAddons</key>
328 <true/> | <false/>
329 </dict>
330 ```
331 #### policies.json
332 ```
333 {
334 "policies": {
335 "BlockAboutAddons": true | false
336 }
337 }
338 ```
339 ### BlockAboutConfig
340
341 Block access to about:config.
342
343 **Compatibility:** Firefox 60, Firefox ESR 60\
344 **CCK2 Equivalent:** `disableAboutConfig`\
345 **Preferences Affected:** N/A
346
347 #### Windows (GPO)
348 ```
349 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
350 ```
351 #### Windows (Intune)
352 OMA-URI:
353 ```
354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
355 ```
356 Value (string):
357 ```
358 <enabled/> or <disabled/>
359 ```
360 #### macOS
361 ```
362 <dict>
363 <key>BlockAboutConfig</key>
364 <true/> | <false/>
365 </dict>
366 ```
367 #### policies.json
368 ```
369 {
370 "policies": {
371 "BlockAboutConfig": true | false
372 }
373 }
374 ```
375 ### BlockAboutProfiles
376
377 Block access to About Profiles (about:profiles).
378
379 **Compatibility:** Firefox 60, Firefox ESR 60\
380 **CCK2 Equivalent:** `disableAboutProfiles`\
381 **Preferences Affected:** N/A
382
383 #### Windows (GPO)
384 ```
385 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
386 ```
387 #### Windows (Intune)
388 OMA-URI:
389 ```
390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
391 ```
392 Value (string):
393 ```
394 <enabled/> or <disabled/>
395 ```
396 #### macOS
397 ```
398 <dict>
399 <key>BlockAboutProfiles</key>
400 <true/> | <false/>
401 </dict>
402 ```
403 #### policies.json
404 ```
405 {
406 "policies": {
407 "BlockAboutProfiles": true | false
408 }
409 }
410 ```
411 ### BlockAboutSupport
412
413 Block access to Troubleshooting Information (about:support).
414
415 **Compatibility:** Firefox 60, Firefox ESR 60\
416 **CCK2 Equivalent:** `disableAboutSupport`\
417 **Preferences Affected:** N/A
418
419 #### Windows (GPO)
420 ```
421 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
422 ```
423 #### Windows (Intune)
424 OMA-URI:
425 ```
426 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
427 ```
428 Value (string):
429 ```
430 <enabled/> or <disabled/>
431 ```
432 #### macOS
433 ```
434 <dict>
435 <key>BlockAboutSupport</key>
436 <true/> | <false/>
437 </dict>
438 ```
439 #### policies.json
440 ```
441 {
442 "policies": {
443 "BlockAboutSupport": true | false
444 }
445 }
446 ```
447 ### Bookmarks
448
449 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
450
451 **Compatibility:** Firefox 60, Firefox ESR 60\
452 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
453 **Preferences Affected:** N/A
454
455 #### Windows (GPO)
456 ```
457 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
458 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
459 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
460 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
461 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
462 ```
463 #### Windows (Intune)
464 OMA-URI:
465 ```
466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
467 ```
468 Value (string):
469 ```
470 <enabled/>
471 <data id="BookmarkTitle" value="Example"/>
472 <data id="BookmarkURL" value="https://example.com"/>
473 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
474 <data id="BookmarkPlacement" value="toolbar | menu"/>
475 <data id="BookmarkFolder" value="FolderName"/>
476 ```
477 #### macOS
478 ```
479 <dict>
480 <key>Bookmarks</key>
481 <array>
482 <dict>
483 <key>Title</key>
484 <string>Example</string>
485 <key>URL</key>
486 <string>https://example.com</string>
487 <key>Favicon</key>
488 <string>https://example.com/favicon.ico</string>
489 <key>Placement</key>
490 <string>toolbar | menu</string>
491 <key>Folder</key>
492 <string>FolderName</string>
493 </dict>
494 </array>
495 </dict>
496 ```
497 #### policies.json
498 ```
499 {
500 "policies": {
501 "Bookmarks": [
502 {
503 "Title": "Example",
504 "URL": "https://example.com",
505 "Favicon": "https://example.com/favicon.ico",
506 "Placement": "toolbar" | "menu",
507 "Folder": "FolderName"
508 }
509 ]
510 }
511 }
512 ```
513 ### CaptivePortal
514 Enable or disable the detection of captive portals.
515
516 **Compatibility:** Firefox 67, Firefox ESR 60.7\
517 **CCK2 Equivalent:** N/A\
518 **Preferences Affected:** `network.captive-portal-service.enabled`
519
520 #### Windows (GPO)
521 ```
522 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
523 ```
524 #### Windows (Intune)
525 OMA-URI:
526 ```
527 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
528 ```
529 Value (string):
530 ```
531 <enabled/> or <disabled/>
532 ```
533 #### macOS
534 ```
535 <dict>
536 <key>CaptivePortal</key>
537 <true/> | <false/>
538 </dict>
539 ```
540 #### policies.json
541 ```
542 {
543 "policies": {
544 "CaptivePortal": true | false
545 }
546 }
547 ```
548 ### Certificates
549
550 ### Certificates | ImportEnterpriseRoots
551
552 Trust certificates that have been added to the operating system certificate store by a user or administrator.
553
554 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
555
556 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
557 **CCK2 Equivalent:** N/A\
558 **Preferences Affected:** `security.enterprise_roots.enabled`
559
560 #### Windows (GPO)
561 ```
562 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
563 ```
564 #### Windows (Intune)
565 OMA-URI:
566 ```
567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
568 ```
569 Value (string):
570 ```
571 <enabled/> or <disabled/>
572 ```
573 #### macOS
574 ```
575 <dict>
576 <key>Certificates</key>
577 <dict>
578 <key>ImportEnterpriseRoots</key>
579 <true/> | <false/>
580 </dict>
581 </dict>
582 ```
583 #### policies.json
584 ```
585 {
586 "policies": {
587 "Certificates": {
588 "ImportEnterpriseRoots": true | false
589 }
590 }
591 }
592 ```
593 ### Certificates | Install
594
595 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
596
597 - Windows
598 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
599 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
600 - macOS
601 - /Library/Application Support/Mozilla/Certificates
602 - ~/Library/Application Support/Mozilla/Certificates
603 - Linux
604 - /usr/lib/mozilla/certificates
605 - /usr/lib64/mozilla/certificates
606 - ~/.mozilla/certificates
607
608 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
609
610 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
611
612 Certificates are installed using the trust string `CT,CT,`.
613
614 Binary (DER) and ASCII (PEM) certificates are both supported.
615
616 **Compatibility:** Firefox 64, Firefox ESR 64\
617 **CCK2 Equivalent:** `certs.ca`\
618 **Preferences Affected:** N/A
619
620 #### Windows (GPO)
621 ```
622 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
623 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
624 ```
625 #### Windows (Intune)
626 OMA-URI:
627 ```
628 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
629 ```
630 Value (string):
631 ```
632 <enabled/>
633 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
634 ```
635 #### macOS
636 ```
637 <dict>
638 <key>Certificates</key>
639 <dict>
640 <key>Install</key>
641 <array>
642 <string>cert1.der</string>
643 <string>/Users/username/cert2.pem</string>
644 </array>
645 </dict>
646 </dict>
647 ```
648 #### policies.json
649 ```
650 {
651 "policies": {
652 "Certificates": {
653 "Install": ["cert1.der", "/home/username/cert2.pem"]
654 }
655 }
656 }
657 ```
658 ### Cookies
659 Configure cookie preferences.
660
661 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
662
663 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
664
665 `Default` determines whether cookies are accepted at all.
666
667 `AcceptThirdParty` determines how third-party cookies are handled.
668
669 `ExpireAtSessionEnd` determines when cookies expire.
670
671 `RejectTracker` only rejects cookies for trackers.
672
673 `Locked` prevents the user from changing cookie preferences.
674
675 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
676 **CCK2 Equivalent:** N/A\
677 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
678
679 #### Windows (GPO)
680 ```
681 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
682 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
683 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
684 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
685 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
686 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
687 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
688 ```
689 #### Windows (Intune)
690 OMA-URI:
691 ```
692 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
693 ```
694 Value (string):
695 ```
696 <enabled/>
697 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
698 ```
699 OMA-URI:
700 ```
701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
702 ```
703 Value (string):
704 ```
705 <enabled/>
706 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
707 ```
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
711 ```
712 Value (string):
713 ```
714 <enabled/> or <disabled/>
715 ```
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
719 ```
720 Value (string):
721 ```
722 <enabled/>
723 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
724 ```
725 OMA-URI:
726 ```
727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
728 ```
729 Value (string):
730 ```
731 <enabled/> or <disabled/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
736 ```
737 Value (string):
738 ```
739 <enabled/> or <disabled/>
740 ```
741 OMA-URI:
742 ```
743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
744 ```
745 Value (string):
746 ```
747 <enabled/> or <disabled/>
748 ```
749 #### macOS
750 ```
751 <dict>
752 <key>Cookies</key>
753 <dict>
754 <key>Allow</key>
755 <array>
756 <string>http://example.com</string>
757 </array>
758 <key>Block</key>
759 <array>
760 <string>http://example.org</string>
761 </array>
762 <key>Default</key>
763 <true/> | <false/>
764 <key>AcceptThirdParty</key>
765 <string>always | never | from-visited</string>
766 <key>ExpireAtSessionEnd</key>
767 <true/> | <false/>
768 <key>RejectTracker</key>
769 <true/> | <false/>
770 <key>Locked</key>
771 <true/> | <false/>
772 </dict>
773 </dict>
774 ```
775 #### policies.json
776 ```
777 {
778 "policies": {
779 "Cookies": {
780 "Allow": ["http://example.org/"],
781 "Block": ["http://example.edu/"],
782 "Default": true | false,
783 "AcceptThirdParty": "always" | "never" | "from-visited",
784 "ExpireAtSessionEnd": true | false,
785 "RejectTracker": true | false,
786 "Locked": true | false
787 }
788 }
789 }
790 ```
791 ### DisableSetDesktopBackground
792 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
793
794 **Compatibility:** Firefox 60, Firefox ESR 60\
795 **CCK2 Equivalent:** `removeSetDesktopBackground`\
796 **Preferences Affected:** N/A
797
798 #### Windows (GPO)
799 ```
800 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
801 ```
802 #### Windows (Intune)
803 OMA-URI:
804 ```
805 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
806 ```
807 Value (string):
808 ```
809 <enabled/> or <disabled/>
810 ```
811 #### macOS
812 ```
813 <dict>
814 <key>DisableSetDesktopBackground</key>
815 <true/> | <false/>
816 </dict>
817 ```
818 #### policies.json
819 ```
820 {
821 "policies": {
822 "DisableSetDesktopBackground": true | false
823 }
824 }
825 ```
826 ### DisableMasterPasswordCreation
827 Remove the master password functionality.
828
829 **Compatibility:** Firefox 60, Firefox ESR 60\
830 **CCK2 Equivalent:** `noMasterPassword`\
831 **Preferences Affected:** N/A
832
833 #### Windows (GPO)
834 ```
835 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
836 ```
837 #### Windows (Intune)
838 OMA-URI:
839 ```
840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
841 ```
842 Value (string):
843 ```
844 <enabled/> or <disabled/>
845 ```
846 #### macOS
847 ```
848 <dict>
849 <key>DisableMasterPasswordCreation</key>
850 <true/> | <false/>
851 </dict>
852 ```
853 #### policies.json
854 ```
855 {
856 "policies": {
857 "DisableMasterPasswordCreation": true | false
858 }
859 }
860 ```
861 ### DisableAppUpdate
862 Turn off application updates.
863
864 **Compatibility:** Firefox 60, Firefox ESR 60\
865 **CCK2 Equivalent:** `disableFirefoxUpdates`\
866 **Preferences Affected:** N/A
867
868 #### Windows (GPO)
869 ```
870 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
871 ```
872 #### Windows (Intune)
873 OMA-URI:
874 ```
875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
876 ```
877 Value (string):
878 ```
879 <enabled/> or <disabled/>
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableAppUpdate</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### policies.json
889 ```
890 {
891 "policies": {
892 "DisableAppUpdate": true | false
893 }
894 }
895 ```
896 ### DisableBuiltinPDFViewer
897 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
898
899 **Compatibility:** Firefox 60, Firefox ESR 60\
900 **CCK2 Equivalent:** `disablePDFjs`\
901 **Preferences Affected:** `pdfjs.disabled`
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
906 ```
907 #### Windows (Intune)
908 OMA-URI:
909 ```
910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
911 ```
912 Value (string):
913 ```
914 <enabled/> or <disabled/>
915 ```
916 #### macOS
917 ```
918 <dict>
919 <key>DisableBuiltinPDFViewer</key>
920 <true/> | <false/>
921 </dict>
922 ```
923 #### policies.json
924 ```
925 {
926 "policies": {
927 "DisableBuiltinPDFViewer": true | false
928 }
929 }
930 ```
931 ### DisabledCiphers
932 Disable specific cryptographic ciphers.
933
934 **Compatibility:** Firefox 76, Firefox ESR 68.8\
935 **CCK2 Equivalent:** N/A\
936 **Preferences Affected:** N/A
937
938 #### Windows (GPO)
939 ```
940 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
941 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
942 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
943 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
944 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
945 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
946 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
947 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
948 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
949 ```
950 #### Windows (Intune)
951 OMA-URI:
952 ```
953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
954 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
955 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
956 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
958 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
959 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
962 ```
963 Value (string):
964 ```
965 <enabled/> or <disabled/>
966 ```
967 #### macOS
968 ```
969 <dict>
970 <key>DisabledCiphers</key>
971 <dict>
972 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
973 <true/> | <false/>
974 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
975 <true/> | <false/>
976 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
977 <true/> | <false/>
978 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
979 <true/> | <false/>
980 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
981 <true/> | <false/>
982 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
983 <true/> | <false/>
984 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
985 <true/> | <false/>
986 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
987 <true/> | <false/>
988 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
989 <true/> | <false/>
990 </dict>
991 </dict>
992 ```
993 #### policies.json
994 ```
995 {
996 "policies": {
997 "DisabledCiphers" {
998 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
999 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1000 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1001 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1002 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1003 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1004 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1005 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1006 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1007 }
1008 }
1009 }
1010 ```
1011 ### DisableDefaultBrowserAgent
1012 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1013
1014 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1015 **CCK2 Equivalent:** N/A\
1016 **Preferences Affected:** N/A
1017
1018 #### Windows (GPO)
1019 ```
1020 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1021 ```
1022 #### Windows (Intune)
1023 OMA-URI:
1024 ```
1025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1026 ```
1027 Value (string):
1028 ```
1029 <enabled/> or <disabled/>
1030 ```
1031 #### policies.json
1032 ```
1033 {
1034 "policies": {
1035 "DisableDefaultBrowserAgent": true | false
1036 }
1037 }
1038 ```
1039 ### DisableDeveloperTools
1040 Remove access to all developer tools.
1041
1042 **Compatibility:** Firefox 60, Firefox ESR 60\
1043 **CCK2 Equivalent:** `removeDeveloperTools`\
1044 **Preferences Affected:** `devtools.policy.disabled`
1045
1046 #### Windows (GPO)
1047 ```
1048 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1049 ```
1050 #### Windows (Intune)
1051 OMA-URI:
1052 ```
1053 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1054 ```
1055 Value (string):
1056 ```
1057 <enabled/> or <disabled/>
1058 ```
1059 #### macOS
1060 ```
1061 <dict>
1062 <key>DisableDeveloperTools</key>
1063 <true/> | <false/>
1064 </dict>
1065 ```
1066 #### policies.json
1067 ```
1068 {
1069 "policies": {
1070 "DisableDeveloperTools": true | false
1071 }
1072 }
1073 ```
1074 ### DisableFeedbackCommands
1075 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** N/A\
1079 **Preferences Affected:** N/A
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableFeedbackCommands</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableFeedbackCommands": true | false
1106 }
1107 }
1108 ```
1109 ### DisableFirefoxScreenshots
1110 Remove access to Firefox Screenshots.
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** N/A\
1114 **Preferences Affected:** `extensions.screenshots.disabled`
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableFirefoxScreenshots</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableFirefoxScreenshots": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFirefoxAccounts
1145 Disable Firefox Accounts integration (Sync).
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** `disableSync`\
1149 **Preferences Affected:** `identity.fxaccounts.enabled`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFirefoxAccounts</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFirefoxAccounts": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxStudies
1180 Disable Firefox studies (Shield).
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** N/A\
1184 **Preferences Affected:** N/A
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxStudies</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxStudies": true | false
1211 }
1212 }
1213 ```
1214 ### DisableForgetButton
1215 Disable the "Forget" button.
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** `disableForget`\
1219 **Preferences Affected:** N/A
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableForgetButton</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableForgetButton": true | false
1246 }
1247 }
1248 ```
1249 ### DisableFormHistory
1250 Turn off saving information on web forms and the search bar.
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** `disableFormFill`\
1254 **Preferences Affected:** ` browser.formfill.enable`
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableFormHistory</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableFormHistory": true | false
1281 }
1282 }
1283 ```
1284 ### DisablePasswordReveal
1285 Do not allow passwords to be shown in saved logins
1286
1287 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1288 **CCK2 Equivalent:** N/A
1289 **Preferences Affected:** N/A
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisablePasswordReveal</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisablePasswordReveal": true | false
1316 }
1317 }
1318 ```
1319 ### DisablePocket
1320 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1321
1322 **Compatibility:** Firefox 60, Firefox ESR 60\
1323 **CCK2 Equivalent:** `disablePocket`\
1324 **Preferences Affected:** `extensions.pocket.enabled`
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisablePocket</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisablePocket": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePrivateBrowsing
1355 Remove access to private browsing.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1359 **Preferences Affected:** N/A
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePrivateBrowsing</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePrivateBrowsing": true | false
1386 }
1387 }
1388 ```
1389 ### DisableProfileImport
1390 Disables the "Import data from another browser" option in the bookmarks window.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** N/A\
1394 **Preferences Affected:** N/A
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisableProfileImport</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisableProfileImport": true | false
1421 }
1422 }
1423 ```
1424 ### DisableProfileRefresh
1425 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** `disableResetFirefox`\
1429 **Preferences Affected:** `browser.disableResetPrompt`
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisableProfileRefresh</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisableProfileRefresh": true | false
1456 }
1457 }
1458 ```
1459 ### DisableSafeMode
1460 Disable safe mode within the browser.
1461
1462 On Windows, this disables safe mode via the command line as well.
1463
1464 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1465 **CCK2 Equivalent:** `disableSafeMode`\
1466 **Preferences Affected:** N/A
1467
1468 #### Windows (GPO)
1469 ```
1470 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1471 ```
1472 #### Windows (Intune)
1473 OMA-URI:
1474 ```
1475 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1476 ```
1477 Value (string):
1478 ```
1479 <enabled/> or <disabled/>
1480 ```
1481 #### macOS
1482 ```
1483 <dict>
1484 <key>DisableSafeMode</key>
1485 <true/> | <false/>
1486 </dict>
1487 ```
1488 #### policies.json
1489 ```
1490 {
1491 "policies": {
1492 "DisableSafeMode": true | false
1493 }
1494 }
1495 ```
1496 ### DisableSecurityBypass
1497 Prevent the user from bypassing security in certain cases.
1498
1499 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1500
1501 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1502
1503 **Compatibility:** Firefox 60, Firefox ESR 60\
1504 **CCK2 Equivalent:** N/A\
1505 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1506
1507 #### Windows (GPO)
1508 ```
1509 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1510 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1511 ```
1512 #### Windows (Intune)
1513 OMA-URI:
1514 ```
1515 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1516 ```
1517 Value (string):
1518 ```
1519 <enabled/> or <disabled/>
1520 ```
1521 OMA-URI:
1522 ```
1523 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1524 ```
1525 Value (string):
1526 ```
1527 <enabled/> or <disabled/>
1528 ```
1529
1530 #### macOS
1531 ```
1532 <dict>
1533 <key>DisableSecurityBypass</key>
1534 <dict>
1535 <key>InvalidCertificate</key>
1536 <true/> | <false/>
1537 <key><SafeBrowsing/key>
1538 <true/> | <false/>
1539 </dict>
1540 </dict>
1541 ```
1542 #### policies.json
1543 ```
1544 {
1545 "policies": {
1546 "DisableSecurityBypass": {
1547 "InvalidCertificate": true false,
1548 "SafeBrowsing": true false
1549 }
1550 }
1551 }
1552 ```
1553 ### DisableSystemAddonUpdate
1554 Prevent system add-ons from being installed or update.
1555
1556 **Compatibility:** Firefox 60, Firefox ESR 60\
1557 **CCK2 Equivalent:** N/A\
1558 **Preferences Affected:** N/A
1559
1560 #### Windows (GPO)
1561 ```
1562 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1563 ```
1564 #### Windows (Intune)
1565 OMA-URI:
1566 ```
1567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1568 ```
1569 Value (string):
1570 ```
1571 <enabled/> or <disabled/>
1572 ```
1573 #### macOS
1574 ```
1575 <dict>
1576 <key>DisableSystemAddonUpdate</key>
1577 <true/> | <false/>
1578 </dict>
1579 ```
1580 #### policies.json
1581 ```
1582 {
1583 "policies": {
1584 "DisableSystemAddonUpdate": true | false
1585 }
1586 }
1587 ```
1588 ### DisableTelemetry
1589 Prevent the upload of telemetry data.
1590
1591 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1592
1593 **Compatibility:** Firefox 60, Firefox ESR 60\
1594 **CCK2 Equivalent:** `disableTelemetry`\
1595 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1596
1597 #### Windows (GPO)
1598 ```
1599 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1600 ```
1601 #### Windows (Intune)
1602 OMA-URI:
1603 ```
1604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1605 ```
1606 Value (string):
1607 ```
1608 <enabled/> or <disabled/>
1609 ```
1610 #### macOS
1611 ```
1612 <dict>
1613 <key>DisableTelemetry</key>
1614 <true/> | <false/>
1615 </dict>
1616 ```
1617 #### policies.json
1618 ```
1619 {
1620 "policies": {
1621 "DisableTelemetry": true | false
1622 }
1623 }
1624 ```
1625 ### DisplayBookmarksToolbar
1626 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1627
1628 **Compatibility:** Firefox 60, Firefox ESR 60\
1629 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1630 **Preferences Affected:** N/A
1631
1632 #### Windows (GPO)
1633 ```
1634 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1635 ```
1636 #### Windows (Intune)
1637 OMA-URI:
1638 ```
1639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1640 ```
1641 Value (string):
1642 ```
1643 <enabled/> or <disabled/>
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>DisplayBookmarksToolbar</key>
1649 <true/> | <false/>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "DisplayBookmarksToolbar": true | false
1657 }
1658 }
1659 ```
1660 ### DisplayMenuBar (Deprecated)
1661 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1662
1663 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1664 **CCK2 Equivalent:** `displayMenuBar`\
1665 **Preferences Affected:** N/A
1666
1667 #### Windows (GPO)
1668 ```
1669 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1670 ```
1671 #### macOS
1672 ```
1673 <dict>
1674 <key>DisplayMenuBar</key>
1675 <true/> | <false/>
1676 </dict>
1677 ```
1678 #### policies.json
1679 ```
1680 {
1681 "policies": {
1682 "DisplayMenuBar": true | false
1683 }
1684 }
1685 ```
1686 ### DisplayMenuBar
1687 Set the state of the menubar.
1688
1689 `always` means the menubar is shown and cannot be hidden.
1690
1691 `never` means the menubar is hidden and cannot be shown.
1692
1693 `default-on` means the menubar is on by default but can be hidden.
1694
1695 `default-off` means the menubar is off by default but can be shown.
1696
1697 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1698 **CCK2 Equivalent:** `displayMenuBar`\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1704 ```
1705 #### Windows (Intune)
1706 OMA-URI:
1707 ```
1708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1709 ```
1710 Value (string):
1711 ```
1712 <enabled/>
1713 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1714 ```
1715 #### macOS
1716 ```
1717 <dict>
1718 <key>DisplayMenuBar</key>
1719 <string>always | never | default-on | default-off</string>
1720 </dict>
1721 ```
1722 #### policies.json
1723 ```
1724 {
1725 "policies": {
1726 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1727 }
1728 }
1729 ```
1730 ### DNSOverHTTPS
1731 Configure DNS over HTTPS.
1732
1733 `Enabled` determines whether DNS over HTTPS is enabled
1734
1735 `ProviderURL` is a URL to another provider.
1736
1737 `Locked` prevents the user from changing DNS over HTTPS preferences.
1738
1739 `ExcludedDomains` excludes domains from DNS over HTTPS.
1740
1741 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1742 **CCK2 Equivalent:** N/A\
1743 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1744
1745 #### Windows (GPO)
1746 ```
1747 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1748 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1749 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1750 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1751 ```
1752 #### Windows (Intune)
1753 OMA-URI:
1754 ```
1755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1756 ```
1757 Value (string):
1758 ```
1759 <enabled/> or <disabled/>
1760 ```
1761 OMA-URI:
1762 ```
1763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1764 ```
1765 Value (string):
1766 ```
1767 <enabled/>
1768 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1769 ```
1770 OMA-URI:
1771 ```
1772 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1773 ```
1774 Value (string):
1775 ```
1776 <enabled/> or <disabled/>
1777 ```
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/>
1785 <data id="List" value="1&#xF000;example.com"/>
1786 ```
1787 #### macOS
1788 ```
1789 <dict>
1790 <key>DNSOverHTTPS</key>
1791 <dict>
1792 <key>Enabled</key>
1793 <true/> | <false/>
1794 <key>ProviderURL</key>
1795 <string>URL_TO_ALTERNATE_PROVIDER</string>
1796 <key>Locked</key>
1797 <true/> | <false/>
1798 <key>ExcludedDomains</key>
1799 <array>
1800 <string>example.com</string>
1801 </array>
1802 </dict>
1803 </dict>
1804 ```
1805 #### policies.json
1806 ```
1807 {
1808 "policies": {
1809 "DNSOverHTTPS": {
1810 "Enabled": true | false,
1811 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1812 "Locked": true | false,
1813 "ExcludedDomains": ["example.com"]
1814 }
1815 }
1816 }
1817 ```
1818 ### DontCheckDefaultBrowser
1819 Don't check if Firefox is the default browser at startup.
1820
1821 **Compatibility:** Firefox 60, Firefox ESR 60\
1822 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1823 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1824
1825 #### Windows (GPO)
1826 ```
1827 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1828 ```
1829 #### Windows (Intune)
1830 OMA-URI:
1831 ```
1832 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1833 ```
1834 Value (string):
1835 ```
1836 <enabled/> or <disabled/>
1837 ```
1838 #### macOS
1839 ```
1840 <dict>
1841 <key>DontCheckDefaultBrowser</key>
1842 <true/> | <false/>
1843 </dict>
1844 ```
1845 #### policies.json
1846 ```
1847 {
1848 "policies": {
1849 "DontCheckDefaultBrowser": true | false
1850 }
1851 }
1852 ```
1853 ### DefaultDownloadDirectory
1854 Set the default download directory.
1855
1856 You can use ${home} for the native home directory.
1857
1858 **Compatibility:** Firefox 68, Firefox ESR 68\
1859 **CCK2 Equivalent:** N/A\
1860 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1861
1862 #### Windows (GPO)
1863 ```
1864 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1865 ```
1866 #### Windows (Intune)
1867 OMA-URI:
1868 ```
1869 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1870 ```
1871 Value (string):
1872 ```
1873 <enabled/>
1874 <data id="Preferences_String" value="${home}\Downloads"/>
1875 ```
1876 #### macOS
1877 ```
1878 <dict>
1879 <key>DefaultDownloadDirectory</key>
1880 <string>${home}/Downloads</string>
1881 </dict>
1882 ```
1883 #### policies.json (macOS and Linux)
1884 ```
1885 {
1886 "policies": {
1887 "DefaultDownloadDirectory": "${home}/Downloads"
1888 }
1889 ```
1890 #### policies.json (Windows)
1891 ```
1892 {
1893 "policies": {
1894 "DefaultDownloadDirectory": "${home}\\Downloads"
1895 }
1896 ```
1897 ### DownloadDirectory
1898 Set and lock the download directory.
1899
1900 You can use ${home} for the native home directory.
1901
1902 **Compatibility:** Firefox 68, Firefox ESR 68\
1903 **CCK2 Equivalent:** N/A\
1904 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1905
1906 #### Windows (GPO)
1907 ```
1908 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1909 ```
1910 #### Windows (Intune)
1911 OMA-URI:
1912 ```
1913 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1914 ```
1915 Value (string):
1916 ```
1917 <enabled/>
1918 <data id="Preferences_String" value="${home}\Downloads"/>
1919 ```
1920 #### macOS
1921 ```
1922 <dict>
1923 <key>DownloadDirectory</key>
1924 <string>${home}/Downloads</string>
1925 </dict>
1926 ```
1927 #### policies.json (macOS and Linux)
1928 ```
1929 {
1930 "policies": {
1931 "DownloadDirectory": "${home}/Downloads"
1932 }
1933 ```
1934 #### policies.json (Windows)
1935 ```
1936 {
1937 "policies": {
1938 "DownloadDirectory": "${home}\\Downloads"
1939 }
1940 ```
1941 ### EnableTrackingProtection
1942 Configure tracking protection.
1943
1944 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1945
1946 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1947
1948 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1949
1950 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1951
1952 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1953
1954 `Exceptions` are origins for which tracking protection is not enabled.
1955
1956 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1957 **CCK2 Equivalent:** N/A\
1958 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1959
1960 #### Windows (GPO)
1961 ```
1962 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1963 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1964 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1965 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1966 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1967 ```
1968 #### Windows (Intune)
1969 OMA-URI:
1970 ```
1971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1972 ```
1973 Value (string):
1974 ```
1975 <enabled/>
1976 <data id="TrackingProtectionLocked" value="true | false"/>
1977 <data id="Cryptomining" value="true | false"/>
1978 <data id="Fingerprinting" value="true | false"/>
1979 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1980 ```
1981 #### macOS
1982 ```
1983 <dict>
1984 <key>EnableTrackingProtection</key>
1985 <dict>
1986 <key>Value</key>
1987 <true/> | <false/>
1988 <key><Locked</key>
1989 <true/> | <false/>
1990 <key><Cryptomining</key>
1991 <true/> | <false/>
1992 <key><Fingerprinting</key>
1993 <true/> | <false/>
1994 <key>Exceptions</key>
1995 <array>
1996 <string>https://example.com</string>
1997 </array>
1998 </dict>
1999 </dict>
2000 ```
2001 #### policies.json
2002 ```
2003 {
2004 "policies": {
2005 "EnableTrackingProtection": {
2006 "Value": [true, false],
2007 "Locked": [true, false],
2008 "Cryptomining": [true, false],
2009 "Fingerprinting": [true, false],
2010 "Exceptions": ["https://example.com"]
2011 }
2012 }
2013 ```
2014 ### EnterprisePoliciesEnabled
2015 Enable policy support on macOS.
2016
2017 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2018 **CCK2 Equivalent:** N/A\
2019 **Preferences Affected:** N/A
2020
2021 #### macOS
2022 ```
2023 <dict>
2024 <key>EnterprisePoliciesEnabled</key>
2025 <true/>
2026 </dict>
2027 ```
2028 ### Extensions
2029 Control the installation, uninstallation and locking of extensions.
2030
2031 `Install` is a list of URLs or native paths for extensions to be installed.
2032
2033 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2034
2035 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2036
2037 **Compatibility:** Firefox 60, Firefox ESR 60\
2038 **CCK2 Equivalent:** `addons`\
2039 **Preferences Affected:** N/A
2040
2041 #### Windows (GPO)
2042 ```
2043 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2044 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2045 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2046 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2047 ```
2048 #### macOS
2049 ```
2050 <dict>
2051 <key>Extensions</key>
2052 <dict>
2053 <key>Install</key>
2054 <array>
2055 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2056 <string>//path/to/xpi</string>
2057 </array>
2058 <key>Uninstall</key>
2059 <array>
2060 <string>bad_addon_id@mozilla.org</string>
2061 </array>
2062 <key>Locked</key>
2063 <array>
2064 <string>addon_id@mozilla.org</string>
2065 </array>
2066 </dict>
2067 </dict>
2068 ```
2069 #### policies.json
2070 ```
2071 {
2072 "policies": {
2073 "Extensions": {
2074 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2075 "Uninstall": ["bad_addon_id@mozilla.org"],
2076 "Locked": ["addon_id@mozilla.org"]
2077 }
2078 }
2079 }
2080 ```
2081 ### ExtensionSettings
2082 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2083
2084 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2085
2086 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2087
2088 The configuration for each extension is another dictionary that can contain the fields documented below.
2089
2090 | Name | Description |
2091 | --- | --- |
2092 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2093 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2094 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2095 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2096 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2097 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2098 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2099 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2100 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2101
2102 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2103 **CCK2 Equivalent:** N/A\
2104 **Preferences Affected:** N/A
2105
2106 #### Windows (GPO)
2107 ```
2108 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2109 {
2110 "*": {
2111 "blocked_install_message": "Custom error message.",
2112 "install_sources": ["https://addons.mozilla.org/"],
2113 "installation_mode": "blocked",
2114 "allowed_types": ["extension"]
2115 },
2116 "uBlock0@raymondhill.net": {
2117 "installation_mode": "force_installed",
2118 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2119 }
2120 }
2121 ```
2122 #### Windows (Intune)
2123 OMA-URI:
2124 ```
2125 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2126 ```
2127 Value (string):
2128 ```
2129 <enabled/>
2130 <data id="ExtensionSettings" value='
2131 "*": {
2132 "blocked_install_message": "Custom error message.",
2133 "install_sources": ["https://addons.mozilla.org/"],
2134 "installation_mode": "blocked",
2135 "allowed_types": ["extension"]
2136 },
2137 "uBlock0@raymondhill.net": {
2138 "installation_mode": "force_installed",
2139 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2140 }'/>
2141 ```
2142 #### macOS
2143 ```
2144 <dict>
2145 <key>ExtensionSettings</key>
2146 <dict>
2147 <key>*</key>
2148 <dict>
2149 <key>blocked_install_message</key>
2150 <string>Custom error message.</string>
2151 <key>install_sources</key>
2152 <array>
2153 <string>https://addons.mozilla.org/</string>
2154 </array>
2155 <key>installation_mode</key>
2156 <string>blocked</string>
2157 <key>allowed_types</key>
2158 <array>
2159 <string>extension</string>
2160 </array>
2161 </dict>
2162 <key>uBlock0@raymondhill.net</key>
2163 <dict>
2164 <key>installation_mode</key>
2165 <string>force_installed</string>
2166 <key>install_url</key>
2167 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2168 </dict>
2169 </dict>
2170 </dict>
2171 ```
2172 #### policies.json
2173 ```
2174 {
2175 "policies": {
2176 "ExtensionSettings": {
2177 "*": {
2178 "blocked_install_message": "Custom error message.",
2179 "install_sources": ["https://addons.mozilla.org/"],
2180 "installation_mode": "blocked",
2181 "allowed_types": ["extension"]
2182 },
2183 "uBlock0@raymondhill.net": {
2184 "installation_mode": "force_installed",
2185 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2186 }
2187 }
2188 }
2189 }
2190 ```
2191 ### ExtensionUpdate
2192 Control extension updates.
2193
2194 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2195 **CCK2 Equivalent:** N/A\
2196 **Preferences Affected:** `extensions.update.enabled`
2197
2198 #### Windows (GPO)
2199 ```
2200 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2201 ```
2202 #### Windows (Intune)
2203 OMA-URI:
2204 ```
2205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2206 ```
2207 Value (string):
2208 ```
2209 <enabled/> or <disabled/>
2210 ```
2211 #### macOS
2212 ```
2213 <dict>
2214 <key>ExtensionUpdate</key>
2215 <true/> | <false/>
2216 </dict>
2217 ```
2218 #### policies.json
2219 ```
2220 {
2221 "policies": {
2222 "ExtensionUpdate": true | false
2223 }
2224 }
2225 ```
2226 ### FlashPlugin
2227 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2228
2229 `Allow` is a list of origins where Flash are allowed.
2230
2231 `Block` is a list of origins where Flash is not allowed.
2232
2233 `Default` determines whether or not Flash is allowed by default.
2234
2235 `Locked` prevents the user from changing Flash preferences.
2236
2237 **Compatibility:** Firefox 60, Firefox ESR 60\
2238 **CCK2 Equivalent:** `permissions.plugin`\
2239 **Preferences Affected:** `plugin.state.flash`
2240
2241 #### Windows (GPO)
2242 ```
2243 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2244 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2245 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2246 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2247 ```
2248 #### Windows (Intune)
2249 OMA-URI:
2250 ```
2251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2252 ```
2253 Value (string):
2254 ```
2255 <enabled/>
2256 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2257 ```
2258 OMA-URI:
2259 ```
2260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2261 ```
2262 Value (string):
2263 ```
2264 <enabled/> or <disabled/>
2265 ```
2266 OMA-URI:
2267 ```
2268 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2269 ```
2270 Value (string):
2271 ```
2272 <enabled/> or <disabled/>
2273 ```
2274 #### macOS
2275 ```
2276 <dict>
2277 <key>FlashPlugin</key>
2278 <dict>
2279 <key>Allow</key>
2280 <array>
2281 <string>http://example.org</string>
2282 </array>
2283 <key>Block</key>
2284 <array>
2285 <string>http://example.edu</string>
2286 </array>
2287 <key>Default</key>
2288 <true/> | <false/>
2289 <key>Locked</key>
2290 <true/> | <false/>
2291 </dict>
2292 </dict>
2293 ```
2294 #### policies.json
2295 ```
2296 {
2297 "policies": {
2298 "FlashPlugin": {
2299 "Allow": ["http://example.org/"],
2300 "Block": ["http://example.edu/"],
2301 "Default": true | false,
2302 "Locked": true | false
2303 }
2304 }
2305 }
2306 ```
2307 ### FirefoxHome
2308 Customize the Firefox Home page.
2309
2310 **Compatibility:** Firefox 68, Firefox ESR 68\
2311 **CCK2 Equivalent:** N/A\
2312 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2313
2314 #### Windows (GPO)
2315 ```
2316 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2317 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2318 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2319 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2320 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2321 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2322 ```
2323 #### Windows (Intune)
2324 OMA-URI:
2325 ```
2326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2327 ```
2328 Value (string):
2329 ```
2330 <enabled/>
2331 <data id="FirefoxHome_Search" value="true | false"/>
2332 <data id="FirefoxHome_TopSites" value="true | false"/>
2333 <data id="FirefoxHome_Highlights" value="true | false"/>
2334 <data id="FirefoxHome_Pocket" value="true | false"/>
2335 <data id="FirefoxHome_Snippets" value="true | false"/>
2336 <data id="FirefoxHome_Locked" value="true | false"/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>FirefoxHome</key>
2342 <dict>
2343 <key>Search</key>
2344 <true/> | <false/>
2345 <key>TopSites</key>
2346 <true/> | <false/>
2347 <key>Highlights</key>
2348 <true/> | <false/>
2349 <key>Pocket</key>
2350 <true/> | <false/>
2351 <key>Snippets</key>
2352 <true/> | <false/>
2353 <key>Locked</key>
2354 <true/> | <false/>
2355 </dict>
2356 </dict>
2357 ```
2358 #### policies.json
2359 ```
2360 {
2361 "policies": {
2362 "FirefoxHome": {
2363 "Search": true | false,
2364 "TopSites": true | false,
2365 "Highlights": true | false,
2366 "Pocket": true | false,
2367 "Snippets": true | false,
2368 "Locked": true | false
2369 }
2370 }
2371 }
2372 ```
2373 ### HardwareAcceleration
2374 Control hardware acceleration.
2375
2376 **Compatibility:** Firefox 60, Firefox ESR 60\
2377 **CCK2 Equivalent:** N/A\
2378 **Preferences Affected:** `layers.acceleration.disabled`
2379
2380 #### Windows (GPO)
2381 ```
2382 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2383 ```
2384 #### Windows (Intune)
2385 OMA-URI:
2386 ```
2387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2388 ```
2389 Value (string):
2390 ```
2391 <enabled/> or <disabled/>
2392 ```
2393 #### macOS
2394 ```
2395 <dict>
2396 <key>HardwareAcceleration</key>
2397 <true/> | <false/>
2398 </dict>
2399 ```
2400 #### policies.json
2401 ```
2402 {
2403 "policies": {
2404 "HardwareAcceleration": true | false
2405 }
2406 }
2407 ```
2408 ### Homepage
2409 Configure the default homepage and how Firefox starts.
2410
2411 `URL` is the default homepage.
2412
2413 `Locked` prevents the user from changing homepage preferences.
2414
2415 `Additional` allows for more than one homepage.
2416
2417 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2418
2419 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2420 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2421 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2422
2423 #### Windows (GPO)
2424 ```
2425 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2426 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2427 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2428 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2429 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2430 ```
2431 #### Windows (Intune)
2432 OMA-URI:
2433 ```
2434 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2435 ```
2436 Value (string):
2437 ```
2438 <enabled/>
2439
2440 <data id="HomepageURL" value="https://example.com"/>
2441 <data id="HomepageLocked" value="true | false"/>
2442 ```
2443 OMA-URI:
2444 ```
2445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2446 ```
2447 Value (string):
2448 ```
2449 <enabled/>
2450
2451 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2452 ```
2453 OMA-URI:
2454 ```
2455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2456 ```
2457 Value (string):
2458 ```
2459 <enabled/>
2460
2461 <data id="StartPage" value="none | homepage | previous-session"/>
2462 ```
2463 #### macOS
2464 ```
2465 <dict>
2466 <key>Homepage</key>
2467 <dict>
2468 <key>URL</key>
2469 <string>http://example.com</string>
2470 <key>Locked</key>
2471 <true/> | <false/>
2472 <key>Additional</key>
2473 <array>
2474 <string>http://example.org</string>
2475 <string>http://example.edu</string>
2476 </array>
2477 <key>StartPage</key>
2478 <string>none | homepage | previous-session</string>
2479 </dict>
2480 </dict>
2481 ```
2482 #### policies.json
2483 ```
2484 {
2485 "policies": {
2486 "Homepage": {
2487 "URL": "http://example.com/",
2488 "Locked": true | false,
2489 "Additional": ["http://example.org/",
2490 "http://example.edu/"],
2491 "StartPage": "none" | "homepage" | "previous-session"
2492 }
2493 }
2494 }
2495 ```
2496 ### InstallAddonsPermission
2497 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2498
2499 `Allow` is a list of origins where extension installs are allowed.
2500
2501 `Default` determines whether or not extension installs are allowed by default.
2502
2503 **Compatibility:** Firefox 60, Firefox ESR 60\
2504 **CCK2 Equivalent:** `permissions.install`\
2505 **Preferences Affected:** `xpinstall.enabled`
2506
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2510 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2511 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2512 ```
2513 #### Windows (Intune)
2514 OMA-URI:
2515 ```
2516 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2517 ```
2518 Value (string):
2519 ```
2520 <enabled/>
2521 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2522 ```
2523 OMA-URI:
2524 ```
2525 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2526 ```
2527 Value (string):
2528 ```
2529 <enabled/>
2530 ```
2531 #### macOS
2532 ```
2533 <dict>
2534 <key>InstallAddonsPermission</key>
2535 <dict>
2536 <key>Allow</key>
2537 <array>
2538 <string>http://example.org</string>
2539 <string>http://example.edu</string>
2540 </array>
2541 <key>Default</key>
2542 <true/> | <false/>
2543 </dict>
2544 </dict>
2545 ```
2546 #### policies.json
2547 ```
2548 {
2549 "policies": {
2550 "InstallAddonsPermission": {
2551 "Allow": ["http://example.org/",
2552 "http://example.edu/"],
2553 "Default": true | false
2554 }
2555 }
2556 }
2557 ```
2558 ### LegacyProfiles
2559 Disable the feature enforcing a separate profile for each installation.
2560
2561 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2562
2563 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2564
2565 This policy only work on Windows via GPO (not policies.json).
2566
2567 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2568 **CCK2 Equivalent:** N/A\
2569 **Preferences Affected:** N/A
2570
2571 #### Windows (GPO)
2572 ```
2573 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2574 ```
2575 #### Windows (Intune)
2576 OMA-URI:
2577 ```
2578 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2579 ```
2580 Value (string):
2581 ```
2582 <enabled/> or <disabled/>
2583 ```
2584 ### LocalFileLinks
2585 Enable linking to local files by origin.
2586
2587 **Compatibility:** Firefox 68, Firefox ESR 68\
2588 **CCK2 Equivalent:** N/A\
2589 **Preferences Affected:** `capability.policy.localfilelinks.*`
2590
2591 #### Windows (GPO)
2592 ```
2593 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2594 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2595 ```
2596 #### Windows (Intune)
2597 OMA-URI:
2598 ```
2599 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2600 ```
2601 Value (string):
2602 ```
2603 <enabled/>
2604 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2605 ```
2606 #### macOS
2607 ```
2608 <dict>
2609 <key>LocalFileLinks</key>
2610 <array>
2611 <string>http://example.org</string>
2612 <string>http://example.edu</string>
2613 </array>
2614 </dict>
2615 ```
2616 #### policies.json
2617 ```
2618 {
2619 "policies": {
2620 "LocalFileLinks": ["http://example.org/",
2621 "http://example.edu/"]
2622 }
2623 }
2624 ```
2625 ### NetworkPrediction
2626 Enable or disable network prediction (DNS prefetching).
2627
2628 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2629 **CCK2 Equivalent:** N/A\
2630 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2631
2632 #### Windows (GPO)
2633 ```
2634 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2635 ```
2636 #### Windows (Intune)
2637 OMA-URI:
2638 ```
2639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2640 ```
2641 Value (string):
2642 ```
2643 <enabled/> or <disabled/>
2644 ```
2645 #### macOS
2646 ```
2647 <dict>
2648 <key>NetworkPrediction</key>
2649 <true/> | <false/>
2650 </dict>
2651 ```
2652 #### policies.json
2653 ```
2654 {
2655 "policies": {
2656 "NetworkPrediction": true | false
2657 }
2658 ```
2659 ### NewTabPage
2660 Enable or disable the New Tab page.
2661
2662 **Compatibility:** Firefox 68, Firefox ESR 68\
2663 **CCK2 Equivalent:** N/A\
2664 **Preferences Affected:** `browser.newtabpage.enabled`
2665
2666 #### Windows (GPO)
2667 ```
2668 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2669 ```
2670 #### Windows (Intune)
2671 OMA-URI:
2672 ```
2673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2674 ```
2675 Value (string):
2676 ```
2677 <enabled/> or <disabled/>
2678 ```
2679 #### macOS
2680 ```
2681 <dict>
2682 <key>NewTabPage</key>
2683 <true/> | <false/>
2684 </dict>
2685 ```
2686 #### policies.json
2687 ```
2688 {
2689 "policies": {
2690 "NewTabPage": true | false
2691 }
2692 ```
2693 ### NoDefaultBookmarks
2694 Disable the creation of default bookmarks.
2695
2696 This policy is only effective if the user profile has not been created yet.
2697
2698 **Compatibility:** Firefox 60, Firefox ESR 60\
2699 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2700 **Preferences Affected:** N/A
2701
2702 #### Windows (GPO)
2703 ```
2704 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2705 ```
2706 #### Windows (Intune)
2707 OMA-URI:
2708 ```
2709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2710 ```
2711 Value (string):
2712 ```
2713 <enabled/> or <disabled/>
2714 ```
2715 #### macOS
2716 ```
2717 <dict>
2718 <key>NoDefaultBookmarks</key>
2719 <true/> | <false/>
2720 </dict>
2721 ```
2722 #### policies.json
2723 ```
2724 {
2725 "policies": {
2726 "NoDefaultBookmarks": true | false
2727 }
2728 }
2729 ```
2730 ### OfferToSaveLogins
2731 Control whether or not Firefox offers to save passwords.
2732
2733 **Compatibility:** Firefox 60, Firefox ESR 60\
2734 **CCK2 Equivalent:** `dontRememberPasswords`\
2735 **Preferences Affected:** `signon.rememberSignons`
2736
2737 #### Windows (GPO)
2738 ```
2739 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2740 ```
2741 #### Windows (Intune)
2742 OMA-URI:
2743 ```
2744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2745 ```
2746 Value (string):
2747 ```
2748 <enabled/> or <disabled/>
2749 ```
2750 #### macOS
2751 ```
2752 <dict>
2753 <key>OfferToSaveLogins</key>
2754 <true/> | <false/>
2755 </dict>
2756 ```
2757 #### policies.json
2758 ```
2759 {
2760 "policies": {
2761 "OfferToSaveLogins": true | false
2762 }
2763 }
2764 ```
2765 ### OfferToSaveLoginsDefault
2766 Sets the default value of signon.rememberSignons without locking it.
2767
2768 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2769 **CCK2 Equivalent:** `dontRememberPasswords`\
2770 **Preferences Affected:** `signon.rememberSignons`
2771
2772 #### Windows (GPO)
2773 ```
2774 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2775 ```
2776 #### Windows (Intune)
2777 OMA-URI:
2778 ```
2779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2780 ```
2781 Value (string):
2782 ```
2783 <enabled/> or <disabled/>
2784 ```
2785 #### macOS
2786 ```
2787 <dict>
2788 <key>OfferToSaveLoginsDefault</key>
2789 <true/> | <false/>
2790 </dict>
2791 ```
2792 #### policies.json
2793 ```
2794 {
2795 "policies": {
2796 "OfferToSaveLoginsDefault": true | false
2797 }
2798 }
2799 ```
2800 ### OverrideFirstRunPage
2801 Override the first run page. If the value is blank, no first run page is displayed.
2802
2803 **Compatibility:** Firefox 60, Firefox ESR 60\
2804 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2805 **Preferences Affected:** `startup.homepage_welcome_url`
2806
2807 #### Windows (GPO)
2808 ```
2809 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2810 ```
2811 #### Windows (Intune)
2812 OMA-URI:
2813 ```
2814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2815 ```
2816 Value (string):
2817 ```
2818 <enabled/>
2819 <data id="OverridePage" value="https://example.com"/>
2820 ```
2821 #### macOS
2822 ```
2823 <dict>
2824 <key>OverrideFirstRunPage</key>
2825 <string>http://example.org</string>
2826 </dict>
2827 ```
2828 #### policies.json
2829 ```
2830 {
2831 "policies": {
2832 "OverrideFirstRunPage": "http://example.org"
2833 }
2834 ```
2835 ### OverridePostUpdatePage
2836 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2837
2838 **Compatibility:** Firefox 60, Firefox ESR 60\
2839 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2840 **Preferences Affected:** `startup.homepage_override_url`
2841
2842 #### Windows (GPO)
2843 ```
2844 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2845 ```
2846 #### Windows (Intune)
2847 OMA-URI:
2848 ```
2849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2850 ```
2851 Value (string):
2852 ```
2853 <enabled/>
2854 <data id="OverridePage" value="https://example.com"/>
2855 ```
2856 #### macOS
2857 ```
2858 <dict>
2859 <key>OverridePostUpdatePage</key>
2860 <string>http://example.org</string>
2861 </dict>
2862 ```
2863 #### policies.json
2864 ```
2865 {
2866 "policies": {
2867 "OverridePostUpdatePage": "http://example.org"
2868 }
2869 ```
2870 ### PasswordManagerEnabled
2871 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2872
2873 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2874 **CCK2 Equivalent:** N/A\
2875 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2876
2877 #### Windows (GPO)
2878 ```
2879 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2880 ```
2881 #### Windows (Intune)
2882 OMA-URI:
2883 ```
2884 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2885 ```
2886 Value (string):
2887 ```
2888 <enabled/> or <disabled/>
2889 ```
2890 #### macOS
2891 ```
2892 <dict>
2893 <key>PasswordManagerEnabled</key>
2894 <true/> | <false/>
2895 </dict>
2896 ```
2897 #### policies.json
2898 ```
2899 {
2900 "policies": {
2901 "PasswordManagerEnabled": true | false
2902 }
2903 }
2904 ```
2905 ### Permissions
2906 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2907
2908 `Allow` is a list of origins where the feature is allowed.
2909
2910 `Block` is a list of origins where the feature is not allowed.
2911
2912 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2913
2914 `Locked` prevents the user from changing preferences for the feature.
2915
2916 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2917
2918 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2919 **CCK2 Equivalent:** N/A\
2920 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2921
2922 #### Windows (GPO)
2923 ```
2924 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2925 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2926 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2927 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2928 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2929 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2930 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2931 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2932 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2933 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2934 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2935 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2936 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2937 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2938 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2939 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2940 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2941 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2942 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2943 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
2944 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
2945 ```
2946 #### Windows (Intune)
2947 OMA-URI:
2948 ```
2949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
2950 ```
2951 Value (string):
2952 ```
2953 <enabled/> or <disabled/>
2954 ```
2955 OMA-URI:
2956 ```
2957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
2958 ```
2959 Value (string):
2960 ```
2961 <enabled/> or <disabled/>
2962 ```
2963 OMA-URI:
2964 ```
2965 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
2966 ```
2967 Value (string):
2968 ```
2969 <enabled/>
2970 <data id="Permissions" value="1&#xF000;https://example.org"/>
2971 ```
2972 OMA-URI:
2973 ```
2974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
2975 ```
2976 Value (string):
2977 ```
2978 <enabled/> or <disabled/>
2979 ```
2980 OMA-URI:
2981 ```
2982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
2983 ```
2984 Value (string):
2985 ```
2986 <enabled/> or <disabled/>
2987 ```
2988 OMA-URI:
2989 ```
2990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
2991 ```
2992 Value (string):
2993 ```
2994 <enabled/>
2995 <data id="Permissions" value="1&#xF000;https://example.org"/>
2996 ```
2997 OMA-URI:
2998 ```
2999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3000 ```
3001 Value (string):
3002 ```
3003 <enabled/>
3004 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3005 ```
3006 OMA-URI:
3007 ```
3008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3009 ```
3010 Value (string):
3011 ```
3012 <enabled/>
3013 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3014 ```
3015 OMA-URI:
3016 ```
3017 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3018 ```
3019 Value (string):
3020 ```
3021 <enabled/> or <disabled/>
3022 #### macOS
3023 ```
3024 <dict>
3025 <key>Permissions</key>
3026 <dict>
3027 <key>Camera</key>
3028 <dict>
3029 <key>Allow</key>
3030 <array>
3031 <string>https://example.org</string>
3032 <string>https://example.org:1234</string>
3033 </array>
3034 <key>Block</key>
3035 <array>
3036 <string>https://example.edu</string>
3037 </array>
3038 <key>BlockNewRequests</key>
3039 <true/> | <false/>
3040 <key>Locked</key>
3041 <true/> | <false/>
3042 </dict>
3043 <key>Microphone</key>
3044 <dict>
3045 <key>Allow</key>
3046 <array>
3047 <string>https://example.org</string>
3048 </array>
3049 <key>Block</key>
3050 <array>
3051 <string>https://example.edu</string>
3052 </array>
3053 <key>BlockNewRequests</key>
3054 <true/> | <false/>
3055 <key>Locked</key>
3056 <true/> | <false/>
3057 </dict>
3058 <key>Location</key>
3059 <dict>
3060 <key>Allow</key>
3061 <array>
3062 <string>https://example.org</string>
3063 </array>
3064 <key>Block</key>
3065 <array>
3066 <string>https://example.edu</string>
3067 </array>
3068 <key>BlockNewRequests</key>
3069 <true/> | <false/>
3070 <key>Locked</key>
3071 <true/> | <false/>
3072 </dict>
3073 <key>Notifications</key>
3074 <dict>
3075 <key>Allow</key>
3076 <array>
3077 <string>https://example.org</string>
3078 </array>
3079 <key>Block</key>
3080 <array>
3081 <string>https://example.edu</string>
3082 </array>
3083 <key>BlockNewRequests</key>
3084 <true/>
3085 <key>Locked</key>
3086 <true/>
3087 </dict>
3088 <key>Autoplay</key>
3089 <dict>
3090 <key>Allow</key>
3091 <array>
3092 <string>https://example.org</string>
3093 </array>
3094 <key>Block</key>
3095 <array>
3096 <string>https://example.edu</string>
3097 </array>
3098 <key>Default</key>
3099 <string>allow-audio-video | block-audio | block-audio-video</string>
3100 <key>Locked</key>
3101 <true/> | <false/>
3102 </dict>
3103 </dict>
3104 </dict>
3105 ```
3106 #### policies.json
3107 ```
3108 {
3109 "policies": {
3110 "Permissions": {
3111 "Camera": {
3112 "Allow": ["https://example.org","https://example.org:1234"],
3113 "Block": ["https://example.edu"],
3114 "BlockNewRequests": true | false,
3115 "Locked": true | false
3116 },
3117 "Microphone": {
3118 "Allow": ["https://example.org"],
3119 "Block": ["https://example.edu"],
3120 "BlockNewRequests": true | false,
3121 "Locked": true | false
3122 },
3123 "Location": {
3124 "Allow": ["https://example.org"],
3125 "Block": ["https://example.edu"],
3126 "BlockNewRequests": true | false,
3127 "Locked": true | false
3128 },
3129 "Notifications": {
3130 "Allow": ["https://example.org"],
3131 "Block": ["https://example.edu"],
3132 "BlockNewRequests": true | false,
3133 "Locked": true | false
3134 },
3135 "Autoplay": {
3136 "Allow": ["https://example.org"],
3137 "Block": ["https://example.edu"],
3138 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3139 "Locked": true | false
3140 }
3141 }
3142 }
3143 }
3144 ```
3145 ### PopupBlocking
3146 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3147
3148 `Allow` is a list of origins where popup-windows are allowed.
3149
3150 `Default` determines whether or not pop-up windows are allowed by default.
3151
3152 `Locked` prevents the user from changing pop-up preferences.
3153
3154 **Compatibility:** Firefox 60, Firefox ESR 60\
3155 **CCK2 Equivalent:** `permissions.popup`\
3156 **Preferences Affected:** `dom.disable_open_during_load`
3157
3158 #### Windows (GPO)
3159 ```
3160 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3161 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3162 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3163 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3164 ```
3165 #### Windows (Intune)
3166 OMA-URI:
3167 ```
3168 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3169 ```
3170 Value (string):
3171 ```
3172 <enabled/>
3173 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3174 ```
3175 OMA-URI:
3176 ```
3177 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3178 ```
3179 Value (string):
3180 ```
3181 <enabled/> or <disabled/>
3182 ```
3183 OMA-URI:
3184 ```
3185 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3186 ```
3187 Value (string):
3188 ```
3189 <enabled/> or <disabled/>
3190 ```
3191 #### macOS
3192 ```
3193 <dict>
3194 <key>PopupBlocking</key>
3195 <dict>
3196 <key>Allow</key>
3197 <array>
3198 <string>http://example.org</string>
3199 <string>http://example.edu</string>
3200 </array>
3201 <key>Default</key>
3202 <true/> | <false/>
3203 <key>Locked</key>
3204 <true/> | <false/>
3205 </dict>
3206 </dict>
3207 ```
3208 #### policies.json
3209 ```
3210 {
3211 "policies": {
3212 "PopupBlocking": {
3213 "Allow": ["http://example.org/",
3214 "http://example.edu/"],
3215 "Default": true | false,
3216 "Locked": true | false
3217 }
3218 }
3219 }
3220 ```
3221 ### Preferences
3222 Set and lock certain preferences.
3223
3224 **Compatibility:** See below\
3225 **CCK2 Equivalent:** `preferences`\
3226 **Preferences Affected:** See below
3227
3228 | Preference | Type | Compatibility | Default
3229 | --- | --- | --- | ---
3230 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3231 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3232 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3233 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3234 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3235 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3236 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3237 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3238 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3239 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3240 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3241 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3242 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3243 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3244 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3245 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3246 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3247 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3248 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3249 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3250 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3251 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3252 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3253 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3254 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3255 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3256 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3257 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3258 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3259 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3260 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3261 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3262 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3263 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3264 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3265 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3266 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3267 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3268 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3269 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3270 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3271 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3272 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3273 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3274 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3275 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3276 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3277 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3278 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3279 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3280 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3281 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3282 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3283 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3284 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3285 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3286 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3287 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3288 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3289 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3290 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3291 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3292 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3293 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3294 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3295 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3296 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3297 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3298 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3299 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3300 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3301 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3302 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3303 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3304 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3305 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3306 disabled
3307 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3308 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3309 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3310 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3311 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3312 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3313 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3314 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3315 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3316 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3317 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3318 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3319 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3320 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3321 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3323 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3324 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3325 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3327 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3328 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3329 #### Windows (GPO)
3330 ```
3331 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3332 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3333 ```
3334 #### Windows (Intune)
3335 OMA-URI: (periods are replaced by underscores)
3336 ```
3337 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3338 ```
3339 Value (string):
3340 ```
3341 <enabled/> or <disabled/>
3342 ```
3343 #### macOS
3344 ```
3345 <dict>
3346 <key>Preferences</key>
3347 <dict>
3348 <key>boolean_preference_name</key>
3349 <true/> | <false/>
3350 <key>string_preference_name</key>
3351 <string>string_value</string>
3352 </dict>
3353 </dict>
3354 ```
3355 #### policies.json
3356 ```
3357 {
3358 "policies": {
3359 "Preferences": {
3360 "boolean_preference_name": true | false,
3361 "string_preference_name": "string_value"
3362 }
3363 }
3364 }
3365 ```
3366 ### PromptForDownloadLocation
3367 Ask where to save each file before downloading.
3368
3369 **Compatibility:** Firefox 68, Firefox ESR 68\
3370 **CCK2 Equivalent:** N/A\
3371 **Preferences Affected:** `browser.download.useDownloadDir`
3372
3373 #### Windows (GPO)
3374 ```
3375 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3376 ```
3377 #### Windows (Intune)
3378 OMA-URI:
3379 ```
3380 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3381 ```
3382 Value (string):
3383 ```
3384 <enabled/> or <disabled/>
3385 ```
3386 #### macOS
3387 ```
3388 <dict>
3389 <key>PromptForDownloadLocation</key>
3390 <true/> | <false/>
3391 </dict>
3392 ```
3393 #### policies.json
3394 ```
3395 {
3396 "policies": {
3397 "PromptForDownloadLocation": true | false
3398 }
3399 }
3400 ```
3401 ### Proxy
3402 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3403 To specify ports, append them to the hostnames with a colon (:).
3404
3405 `Mode` is the proxy method being used.
3406
3407 `Locked` is whether or not proxy settings can be changed.
3408
3409 `HTTPProxy` is the HTTP proxy server.
3410
3411 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3412
3413 `SSLProxy` is the SSL proxy server.
3414
3415 `FTPProxy` is the FTP proxy server.
3416
3417 `SOCKSProxy` is the SOCKS proxy server
3418
3419 `SOCKSVersion` is the SOCKS version (4 or 5)
3420
3421 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3422
3423 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3424
3425 `AutoLogin` means do not prompt for authentication if password is saved.
3426
3427 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3428
3429 **Compatibility:** Firefox 60, Firefox ESR 60\
3430 **CCK2 Equivalent:** `networkProxy*`\
3431 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3432
3433 #### Windows (GPO)
3434 ```
3435 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3436 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3437 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3438 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3439 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3440 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3441 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3442 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3443 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3444 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3445 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3446 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3447 ```
3448 #### Windows (Intune)
3449 OMA-URI:
3450 ```
3451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3452 ```
3453 Value (string):
3454 ```
3455 <enabled/>
3456 <data id="ProxyLocked" value="true | false"/>
3457 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3458 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3459 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3460 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3461 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3462 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3463 <data id="SOCKSVersion" value="4 | 5"/>
3464 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3465 <data id="Passthrough" value="<local>"/>
3466 <data id="AutoLogin" value="true | false"/>
3467 <data id="UseProxyForDNS" value="true | false"/>
3468 ```
3469 #### macOS
3470 ```
3471 <dict>
3472 <key>Proxy</key>
3473 <dict>
3474 <key>Mode</key>
3475 <string>none | system | manual | autoDetect | autoConfig</string>
3476 <key>Locked</key>
3477 <true> | </false>
3478 <key>HTTPProxy</key>
3479 <string>https://httpproxy.example.com</string>
3480 <key>UseHTTPProxyForAllProtocols</key>
3481 <true> | </false>
3482 <key>SSLProxy</key>
3483 <string>https://sslproxy.example.com</string>
3484 <key>FTPProxy</key>
3485 <string>https://ftpproxy.example.com</string>
3486 <key>SOCKSProxy</key>
3487 <string>https://socksproxy.example.com</string>
3488 <key>SOCKSVersion</key>
3489 <string>4 | 5</string>
3490 <key>Passthrough</key>
3491 <string>&lt;local>&gt;</string>
3492 <key>AutoConfigURL</key>
3493 <string>URL_TO_AUTOCONFIG</string>
3494 <key>AutoLogin</key>
3495 <true> | </false>
3496 <key>UseProxyForDNS</key>
3497 <true> | </false>
3498 </dict>
3499 </dict>
3500 ```
3501 #### policies.json
3502 ```
3503 {
3504 "policies": {
3505 "Proxy": {
3506 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3507 "Locked": [true, false],
3508 "HTTPProxy": "hostname",
3509 "UseHTTPProxyForAllProtocols": [true, false],
3510 "SSLProxy": "hostname",
3511 "FTPProxy": "hostname",
3512 "SOCKSProxy": "hostname",
3513 "SOCKSVersion": 4 | 5
3514 "Passthrough": "<local>",
3515 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3516 "AutoLogin": [true, false],
3517 "UseProxyForDNS": [true, false]
3518 }
3519 }
3520 }
3521 ```
3522 ### RequestedLocales
3523 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3524
3525 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3526
3527 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3528 **CCK2 Equivalent:** N/A\
3529 **Preferences Affected:** N/A
3530 #### Windows (GPO)
3531 ```
3532 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3533 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3534
3535 or
3536
3537 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3538 ```
3539 #### Windows (Intune)
3540 OMA-URI:
3541 ```
3542 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3543 ```
3544 Value (string):
3545 ```
3546 <enabled/>
3547 <data id="Preferences_String" value="de,en-US"/>
3548 ```
3549 #### macOS
3550 ```
3551 <dict>
3552 <key>RequestedLocales</key>
3553 <array>
3554 <string>de</string>
3555 <string>en-US</string>
3556 </array>
3557 </dict>
3558
3559 or
3560
3561 <dict>
3562 <key>RequestedLocales</key>
3563 <string>de,en-US</string>
3564 </dict>
3565
3566 ```
3567 #### policies.json
3568 ```
3569 {
3570 "policies": {
3571 "RequestedLocales": ["de", "en-US"]
3572 }
3573 }
3574
3575 or
3576
3577 {
3578 "policies": {
3579 "RequestedLocales": "de,en-US"
3580 }
3581 }
3582 ```
3583 <a name="SanitizeOnShutdown"></a>
3584
3585 ### SanitizeOnShutdown (Selective)
3586 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3587
3588 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3589
3590 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3591 **CCK2 Equivalent:** N/A\
3592 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3593 #### Windows (GPO)
3594 ```
3595 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3596 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3597 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3598 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3599 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3600 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3601 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3602 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3603 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3604 ```
3605 #### Windows (Intune)
3606 OMA-URI:
3607 ```
3608 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3609 ```
3610 Value (string):
3611 ```
3612 <enabled/> or <disabled/>
3613 ```
3614 #### macOS
3615 ```
3616 <dict>
3617 <key>SanitizeOnShutdown</key>
3618 <dict>
3619 <key>Cache</key>
3620 <true/> | <false/>
3621 <key>Cookies</key>
3622 <true/> | <false/>
3623 <key>Downloads</key>
3624 <true/> | <false/>
3625 <key>FormData</key>
3626 <true/> | <false/>
3627 <key>History</key>
3628 <true/> | <false/>
3629 <key>Sessions</key>
3630 <true/> | <false/>
3631 <key>SiteSettings</key>
3632 <true/> | <false/>
3633 <key>OfflineApps</key>
3634 <true/> | <false/>
3635 <key>Locked</key>
3636 <true/> | <false/>
3637 </dict>
3638 </dict>
3639 ```
3640 #### policies.json
3641 ```
3642 {
3643 "policies": {
3644 "SanitizeOnShutdown": {
3645 "Cache": true | false,
3646 "Cookies": true | false,
3647 "Downloads": true | false,
3648 "FormData": true | false,
3649 "History": true | false,
3650 "Sessions": true | false,
3651 "SiteSettings": true | false,
3652 "OfflineApps": true | false,
3653 "Locked": true | false
3654 }
3655 }
3656 }
3657 ```
3658 ### SanitizeOnShutdown (All)
3659 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3660
3661 **Compatibility:** Firefox 60, Firefox ESR 60\
3662 **CCK2 Equivalent:** N/A\
3663 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3664 #### Windows (GPO)
3665 ```
3666 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3667 ```
3668 #### Windows (Intune)
3669 OMA-URI:
3670 ```
3671 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3672 ```
3673 Value (string):
3674 ```
3675 <enabled/> or <disabled/>
3676 ```
3677 #### macOS
3678 ```
3679 <dict>
3680 <key>SanitizeOnShutdown</key>
3681 <true/> | <false/>
3682 </dict>
3683 ```
3684 #### policies.json
3685 ```
3686 {
3687 "policies": {
3688 "SanitizeOnShutdown": true | false
3689 }
3690 }
3691 ```
3692 ### SearchBar
3693 Set whether or not search bar is displayed.
3694
3695 **Compatibility:** Firefox 60, Firefox ESR 60\
3696 **CCK2 Equivalent:** `showSearchBar`\
3697 **Preferences Affected:** N/A
3698
3699 #### Windows (GPO)
3700 ```
3701 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3702 ```
3703
3704 #### Windows (Intune)
3705 OMA-URI:
3706 ```
3707 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3708 ```
3709 Value (string):
3710 ```
3711 <enabled/>
3712 <data id="Permissions" value="unified | separate"/>
3713 #### macOS
3714 ```
3715 <dict>
3716 <key>SearchBar</key>
3717 <string>unified | separate</string>
3718 </dict>
3719 ```
3720 #### policies.json
3721 ```
3722 {
3723 "policies": {
3724 "SearchBar": "unified" | "separate"
3725 }
3726 }
3727 ```
3728 <a name="SearchEngines"></a>
3729
3730 ### SearchEngines (This policy is only available on the ESR.)
3731
3732 ### SearchEngines | Default
3733
3734 Set the default search engine. This policy is only available on the ESR.
3735
3736 **Compatibility:** Firefox ESR 60\
3737 **CCK2 Equivalent:** `defaultSearchEngine`\
3738 **Preferences Affected:** N/A
3739
3740 #### Windows (GPO)
3741 ```
3742 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3743 ```
3744 #### Windows (Intune)
3745 OMA-URI:
3746 ```
3747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3748 ```
3749 Value (string):
3750 ```
3751 <enabled/>
3752 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3753 ```
3754 #### macOS
3755 ```
3756 <dict>
3757 <key>SearchEngines</key>
3758 <dict>
3759 <key>Default</key>
3760 <string>NAME_OF_SEARCH_ENGINE</string>
3761 </dict>
3762 </dict>
3763 ```
3764 #### policies.json
3765 ```
3766 {
3767 "policies": {
3768 "SearchEngines": {
3769 "Default": "NAME_OF_SEARCH_ENGINE"
3770 }
3771 }
3772 }
3773 ```
3774 ### SearchEngines | PreventInstalls
3775
3776 Prevent installing search engines from webpages.
3777
3778 **Compatibility:** Firefox ESR 60\
3779 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3780 **Preferences Affected:** N/A
3781
3782 #### Windows (GPO)
3783 ```
3784 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3785 ```
3786 #### Windows (Intune)
3787 OMA-URI:
3788 ```
3789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3790 ```
3791 Value (string):
3792 ```
3793 <enabled/> or <disabled/>
3794 ```
3795 #### macOS
3796 ```
3797 <dict>
3798 <key>SearchEngines</key>
3799 <dict>
3800 <key>PreventInstalls</key>
3801 <true/> | <false/>
3802 </dict>
3803 </dict>
3804 ```
3805 #### policies.json
3806 ```
3807 {
3808 "policies": {
3809 "SearchEngines": {
3810 "PreventInstalls": true | false
3811 }
3812 }
3813 }
3814 ```
3815 ### SearchEngines | Remove
3816
3817 Hide built-in search engines. This policy is only available on the ESR.
3818
3819 **Compatibility:** Firefox ESR 60.2\
3820 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3821 **Preferences Affected:** N/A
3822
3823 #### Windows (GPO)
3824 ```
3825 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3826 ```
3827 #### Windows (Intune)
3828 OMA-URI:
3829 ```
3830 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3831 ```
3832 Value (string):
3833 ```
3834 <enabled/>
3835 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3836 ```
3837 #### macOS
3838 ```
3839 <dict>
3840 <key>SearchEngines</key>
3841 <dict>
3842 <key>Remove</key>
3843 <array>
3844 <string>NAME_OF_SEARCH_ENGINE</string>
3845 </array>
3846 </dict>
3847 </dict>
3848 ```
3849 #### policies.json
3850 ```
3851 {
3852 "policies": {
3853 "SearchEngines": {
3854 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3855 }
3856 }
3857 }
3858 ```
3859 ### SearchEngines | Add
3860
3861 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3862
3863 `Name` is the name of the search engine.
3864
3865 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3866
3867 `Method` is either GET or POST
3868
3869 `IconURL` is a URL for the icon to use.
3870
3871 `Alias` is a keyword to use for the engine.
3872
3873 `Description` is a description of the search engine.
3874
3875 `PostData` is the POST data as name value pairs separated by &.
3876
3877 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3878
3879 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3880 **CCK2 Equivalent:** `searchplugins`\
3881 **Preferences Affected:** N/A
3882
3883 #### Windows (GPO)
3884 ```
3885 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3886 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3887 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3888 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3889 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3890 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3891 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3892 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3893 ```
3894 #### Windows (Intune)
3895 OMA-URI:
3896 ```
3897 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
3898 ```
3899 Value (string):
3900 ```
3901 <enabled/>
3902 <data id="SearchEngine_Name" value="Example1"/>
3903 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
3904 <data id="SearchEngine_Method" value="GET | POST"/>
3905 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
3906 <data id="SearchEngine_Alias" value="example"/>
3907 <data id="SearchEngine_Description" value="Example Description"/>
3908 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
3909 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
3910 ```
3911 #### macOS
3912 ```
3913 <dict>
3914 <key>SearchEngines</key>
3915 <dict>
3916 <key>Add</key>
3917 <array>
3918 <dict>
3919 <key>Name</key>
3920 <string>Example1</string>
3921 <key>URLTemplate</key>
3922 <string>https://www.example.org/q={searchTerms}</string>
3923 <key>Method</key>
3924 <string>GET | POST </string>
3925 <key>IconURL</key>
3926 <string>https://www.example.org/favicon.ico</string>
3927 <key>Alias</key>
3928 <string>example</string>
3929 <key>Description</key>
3930 <string>Example Description</string>
3931 <key>SuggestURLTemplate</key>
3932 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3933 <key>PostData</key>
3934 <string>name=value&q={searchTerms}</string>
3935 </dict>
3936 <array>
3937 </dict>
3938 </dict>
3939 ```
3940 #### policies.json
3941 ```
3942 {
3943 "policies": {
3944 "SearchEngines": {
3945 "Add": [
3946 {
3947 "Name": "Example1",
3948 "URLTemplate": "https://www.example.org/q={searchTerms}",
3949 "Method": "GET" | "POST",
3950 "IconURL": "https://www.example.org/favicon.ico",
3951 "Alias": "example",
3952 "Description": "Description",
3953 "PostData": "name=value&q={searchTerms}",
3954 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3955 }
3956 ]
3957 }
3958 }
3959 }
3960 ```
3961 ### SearchSuggestEnabled
3962
3963 Enable search suggestions.
3964
3965 **Compatibility:** Firefox 68, Firefox ESR 68\
3966 **CCK2 Equivalent:** N/A\
3967 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3968
3969 #### Windows (GPO)
3970 ```
3971 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3972 ```
3973 #### Windows (Intune)
3974 OMA-URI:
3975 ```
3976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
3977 ```
3978 Value (string):
3979 ```
3980 <enabled/> or <disabled/>
3981 ```
3982 #### macOS
3983 ```
3984 <dict>
3985 <key>SearchSuggestEnabled</key>
3986 <true/> | <false/>
3987 </dict>
3988 ```
3989 #### policies.json
3990 ```
3991 {
3992 "policies": {
3993 "SearchSuggestEnabled": true | false
3994 }
3995 }
3996 ```
3997 ### SecurityDevices
3998
3999 Install PKCS #11 modules.
4000
4001 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4002 **CCK2 Equivalent:** `certs.devices`\
4003 **Preferences Affected:** N/A
4004
4005 #### Windows (GPO)
4006 ```
4007 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4008 ```
4009 #### Windows (Intune)
4010 OMA-URI:
4011 ```
4012 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4013 ```
4014 Value (string):
4015 ```
4016 <enabled/>
4017 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4018 ```
4019 #### macOS
4020 ```
4021 <dict>
4022 <key>SecurityDevices</key>
4023 <dict>
4024 <key>NAME_OF_DEVICE</key>
4025 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4026 </dict>
4027 </dict>
4028 ```
4029
4030 #### policies.json
4031 ```
4032 {
4033 "policies": {
4034 "SecurityDevices": {
4035 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4036 }
4037 }
4038 }
4039 ```
4040 ### SSLVersionMax
4041
4042 Set and lock the maximum version of TLS.
4043
4044 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4045 **CCK2 Equivalent:** N/A\
4046 **Preferences Affected:** `security.tls.version.max`
4047
4048 #### Windows (GPO)
4049 ```
4050 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4051 ```
4052 #### Windows (Intune)
4053 OMA-URI:
4054 ```
4055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4056 ```
4057 Value (string):
4058 ```
4059 <enabled/>
4060 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4061 ```
4062 #### macOS
4063 ```
4064 <dict>
4065 <key>SSLVersionMax</key>
4066 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4067 </dict>
4068 ```
4069
4070 #### policies.json
4071 ```
4072 {
4073 "policies": {
4074 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4075 }
4076 }
4077 ```
4078 ### SSLVersionMin
4079
4080 Set and lock the minimum version of TLS.
4081
4082 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4083 **CCK2 Equivalent:** N/A\
4084 **Preferences Affected:** `security.tls.version.min`
4085
4086 #### Windows (GPO)
4087 ```
4088 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4089 ```
4090 #### Windows (Intune)
4091 OMA-URI:
4092 ```
4093 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4094 ```
4095 Value (string):
4096 ```
4097 <enabled/>
4098 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4099 ```
4100 #### macOS
4101 ```
4102 <dict>
4103 <key>SSLVersionMin</key>
4104 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4105 </dict>
4106 ```
4107
4108 #### policies.json
4109 ```
4110 {
4111 "policies": {
4112 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4113 }
4114 }
4115 ```
4116 ### SupportMenu
4117 Add a menuitem to the help menu for specifying support information.
4118
4119 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4120 **CCK2 Equivalent:** helpMenu\
4121 **Preferences Affected:** N/A
4122
4123 #### Windows (GPO)
4124 ```
4125 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4126 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4127 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4128 ```
4129 #### Windows (Intune)
4130 OMA-URI:
4131 ```
4132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4133 ```
4134 Value (string):
4135 ```
4136 <enabled/>
4137 <data id="SupportMenuTitle" value="Support Menu"/>
4138 <data id="SupportMenuURL" value="http://example.com/support"/>
4139 <data id="SupportMenuAccessKey" value="S">
4140 ```
4141 #### macOS
4142 ```
4143 <dict>
4144 <key>SupportMenu</key>
4145 <dict>
4146 <key>Title</key>
4147 <string>SupportMenu</string>
4148 <key>URL</key>
4149 <string>http://example.com/support</string>
4150 <key>AccessKey</key>
4151 <string>S</string>
4152 </dict>
4153 </dict>
4154 ```
4155 #### policies.json
4156 ```
4157 {
4158 "policies": {
4159 "SupportMenu": {
4160 "Title": "Support Menu",
4161 "URL": "http://example.com/support",
4162 "AccessKey": "S"
4163 }
4164 }
4165 }
4166 ```
4167 ### UserMessaging
4168
4169 Prevent installing search engines from webpages.
4170
4171 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4172
4173 `ExtensionRecommendations` Don't recommend extensions.
4174
4175 `FeatureRecommendations` Don't recommend browser features.
4176
4177 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4178
4179 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4180 **CCK2 Equivalent:** N/A\
4181 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4182
4183 #### Windows (GPO)
4184 ```
4185 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4186 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4187 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4188 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4189 ```
4190 #### Windows (Intune)
4191 OMA-URI:
4192 ```
4193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4195 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4197 ```
4198 Value (string):
4199 ```
4200 <enabled/> or <disabled/>
4201 ```
4202 #### macOS
4203 ```
4204 <dict>
4205 <key>UserMessaging</key>
4206 <dict>
4207 <key>WhatsNew</key>
4208 <true/> | <false/>
4209 <key>ExtensionRecommendations</key>
4210 <true/> | <false/>
4211 <key>FeatureRecommendations</key>
4212 <true/> | <false/>
4213 <key>UrlbarInterventions</key>
4214 <true/> | <false/>
4215 </dict>
4216 </dict>
4217 ```
4218 #### policies.json
4219 ```
4220 {
4221 "policies": {
4222 "UserMessaging": {
4223 "WhatsNew": true | false,
4224 "ExtensionRecommendations": true | false,
4225 "FeatureRecommendations": true | false,
4226 "UrlbarInterventions": true | false
4227 }
4228 }
4229 }
4230 ```
4231 ### WebsiteFilter
4232 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4233
4234 **Compatibility:** Firefox 60, Firefox ESR 60\
4235 **CCK2 Equivalent:** N/A\
4236 **Preferences Affected:** N/A
4237
4238 #### Windows (GPO)
4239 ```
4240 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4241 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4242 ```
4243 #### Windows (Intune)
4244 OMA-URI:
4245 ```
4246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4247 ```
4248 Value (string):
4249 ```
4250 <enabled/>
4251 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4252 ```
4253 OMA-URI:
4254 ```
4255 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4256 ```
4257 Value (string):
4258 ```
4259 <enabled/>
4260 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4261 ```
4262 #### macOS
4263 ```
4264 <dict>
4265 <key>WebsiteFilter</key>
4266 <dict>
4267 <key>Block</key>
4268 <array>
4269 <string><all_urls></string>
4270 </array>
4271 <key>Exceptions</key>
4272 <array>
4273 <string>http://example.org/*</string>
4274 </array>
4275 </dict>
4276
4277 </dict>
4278 ```
4279 #### policies.json
4280 ```
4281 {
4282 "policies": {
4283 "WebsiteFilter": {
4284 "Block": ["<all_urls>"],
4285 "Exceptions": ["http://example.org/*"]
4286 }
4287 }
4288 }
4289 ```

patrick-canterino.de