]> git.p6c8.net - policy-templates.git/blob - docs/index.md
d072e89271695d3fc85a01502ca6a2b9b31ec17b
[policy-templates.git] / docs / index.md
1 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
4
5 ```
6 {
7 "policies": {
8 "Authentication": {
9 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
10 }
11 "Authentication_Comment": "These domains are required for us"
12 }
13 }
14 ```
15
16 | Policy Name | Description
17 | --- | --- |
18 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
19 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
20 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
21 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
22 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
23 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
24 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
25 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
26 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
27 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
28 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
29 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
30 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
31 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
32 | **[`Certificates`](#certificates)** |
33 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
34 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
35 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
36 | **[`Cookies`](#cookies)** | Configure cookie preferences.
37 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
38 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
39 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
40 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
41 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
42 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
43 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
44 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
45 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
46 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
47 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
48 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
49 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
50 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
51 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
52 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
53 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
54 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
55 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
56 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
57 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
58 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
59 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
60 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
61 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
62 | **[`DisplayBookmarksToolbar (Deprecated)`](#displaybookmarkstoolbar-deprecated)** | Set the initial state of the bookmarks toolbar.
63 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
64 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
65 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
66 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
67 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
68 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
69 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
70 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
71 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
72 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
73 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
74 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
75 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
76 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
77 | **[`Handlers`](#handlers)** | Configure default application handlers.
78 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
79 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
80 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
81 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
82 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
83 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
84 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
85 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
86 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
87 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
88 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
89 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
90 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
91 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
92 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
93 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
94 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
95 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
96 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
97 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
98 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
99 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
100 | **[`Preferences`](#preferences)** | Set and lock preferences.
101 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
102 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
103 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
104 | **[`Proxy`](#proxy)** | Configure proxy settings.
105 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
106 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
107 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
108 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
109 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
110 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
111 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
112 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
113 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
114 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
115 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
116 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
117 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
118 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
119 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
120 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
121 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
122 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
123 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
124 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
125
126 ### 3rdparty
127
128 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
129
130 For GPO and Intune, the extension developer should provide an ADMX file.
131
132 **Compatibility:** Firefox 68\
133 **CCK2 Equivalent:** N/A\
134 **Preferences Affected:** N/A
135
136 #### macOS
137 ```
138 <dict>
139 <key>3rdparty</key>
140 <dict>
141 <key>Extensions</key>
142 <dict>
143 <key>uBlock0@raymondhill.net</key>
144 <dict>
145 <key>adminSettings</key>
146 <dict>
147 <key>selectedFilterLists</key>
148 <array>
149 <string>ublock-privacy</string>
150 <string>ublock-badware</string>
151 <string>ublock-filters</string>
152 <string>user-filters</string>
153 </array>
154 </dict>
155 </dict>
156 </dict>
157 </dict>
158 </dict>
159 ```
160 #### policies.json
161 ```
162 {
163 "policies": {
164 "3rdparty": {
165 "Extensions": {
166 "uBlock0@raymondhill.net": {
167 "adminSettings": {
168 "selectedFilterLists": [
169 "ublock-privacy",
170 "ublock-badware",
171 "ublock-filters",
172 "user-filters"
173 ]
174 }
175 }
176 }
177 }
178 }
179 }
180 ```
181
182 ### AllowedDomainsForApps
183
184 Define domains allowed to access Google Workspace.
185
186 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
187
188 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
189
190 **Compatibility:** Firefox 89, Firefox ESR 78.11\
191 **CCK2 Equivalent:** N/A\
192 **Preferences Affected:** N/A
193
194 #### Windows (GPO)
195 ```
196 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
197 ```
198 #### Windows (Intune)
199 OMA-URI:
200 ```
201 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
202 ```
203 Value (string):
204 ```
205 <enabled/>
206 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
207 ```
208 #### macOS
209 ```
210 <dict>
211 <key>AllowedDomainsForApps</key>
212 <string>managedfirefox.com,example.com</string>
213 </dict>
214 ```
215 #### policies.json
216 ```
217 {
218 "policies": {
219 "AllowedDomainsForApps": "managedfirefox.com,example.com"
220 }
221 }
222 ```
223 ### AppAutoUpdate
224
225 Enable or disable **automatic** application update.
226
227 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
228
229 If set to false, application updates are downloaded but the user can choose when to install the update.
230
231 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
232
233 **Compatibility:** Firefox 75, Firefox ESR 68.7\
234 **CCK2 Equivalent:** N/A\
235 **Preferences Affected:** `app.update.auto`
236
237 #### Windows (GPO)
238 ```
239 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
240 ```
241 #### Windows (Intune)
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 #### macOS
251 ```
252 <dict>
253 <key>AppAutoUpdate</key>
254 <true/> | <false/>
255 </dict>
256 ```
257 #### policies.json
258 ```
259 {
260 "policies": {
261 "AppAutoUpdate": true | false
262 }
263 }
264 ```
265 ### AppUpdatePin
266
267 Prevent Firefox from being updated beyond the specified version.
268
269 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
270
271 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
272
273 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
274
275 **Compatibility:** Firefox 102,\
276 **CCK2 Equivalent:** N/A\
277 **Preferences Affected:** N/A
278
279 #### Windows (GPO)
280 ```
281 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
282 ```
283 #### Windows (Intune)
284 OMA-URI:
285 ```
286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
287 ```
288 Value (string):
289 ```
290 <enabled/>
291 <data id="AppUpdatePin" value="106."/>
292 ```
293 #### macOS
294 ```
295 <dict>
296 <key>AppUpdatePin</key>
297 <string>106.</string>
298 </dict>
299 ```
300 #### policies.json
301 ```
302 {
303 "policies": {
304 "AppUpdatePin": "106."
305 }
306 }
307 ```
308 ### AppUpdateURL
309
310 Change the URL for application update if you are providing Firefox updates from a custom update server.
311
312 **Compatibility:** Firefox 62, Firefox ESR 60.2\
313 **CCK2 Equivalent:** N/A\
314 **Preferences Affected:** `app.update.url`
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
319 ```
320 #### Windows (Intune)
321 OMA-URI:
322 ```
323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
324 ```
325 Value (string):
326 ```
327 <enabled/>
328 <data id="AppUpdateURL" value="https://yoursite.com"/>
329 ```
330 #### macOS
331 ```
332 <dict>
333 <key>AppUpdateURL</key>
334 <string>https://yoursite.com</string>
335 </dict>
336 ```
337 #### policies.json
338 ```
339 {
340 "policies": {
341 "AppUpdateURL": "https://yoursite.com"
342 }
343 }
344 ```
345 ### Authentication
346
347 Configure sites that support integrated authentication.
348
349 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
350
351 `PrivateBrowsing` enables integrated authentication in private browsing.
352
353 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
354 **CCK2 Equivalent:** N/A\
355 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
356
357 #### Windows (GPO)
358 ```
359 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
360 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
361 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
362 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
363 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
364 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
365 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
366 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
367 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
368 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
369 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
370 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
371 ```
372 #### Windows (Intune)
373 OMA-URI:
374 ```
375 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
376 ```
377 Value (string):
378 ```
379 <enabled/>
380 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
381 ```
382 OMA-URI:
383 ```
384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
385 ```
386 Value (string):
387 ```
388 <enabled/>
389 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
390 ```
391 OMA-URI:
392 ```
393 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
394 ```
395 Value (string):
396 ```
397 <enabled/>
398 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
399 ```
400 OMA-URI:
401 ```
402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
403 ```
404 Value (string):
405 ```
406 <enabled/>
407 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
408 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
409 ```
410 OMA-URI:
411 ```
412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
413 ```
414 Value (string):
415 ```
416 <enabled/> or <disabled/>
417 ```
418 OMA-URI:
419 ```
420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
421 ```
422 Value (string):
423 ```
424 <enabled/> or <disabled/>
425 ```
426 #### macOS
427 ```
428 <dict>
429 <key>Authentication</key>
430 <dict>
431 <key>SPNEGO</key>
432 <array>
433 <string>mydomain.com</string>
434 <string>https://myotherdomain.com</string>
435 </array>
436 <key>Delegated</key>
437 <array>
438 <string>mydomain.com</string>
439 <string>https://myotherdomain.com</string>
440 </array>
441 <key>NTLM</key>
442 <array>
443 <string>mydomain.com</string>
444 <string>https://myotherdomain.com</string>
445 </array>
446 <key>AllowNonFQDN</key>
447 <dict>
448 <key>SPNEGO</key>
449 <true/> | <false/>
450 <key>NTLM</key>
451 <true/> | <false/>
452 </dict>
453 <key>AllowProxies</key>
454 <dict>
455 <key>SPNEGO</key>
456 <true/> | <false/>
457 <key>NTLM</key>
458 <true/> | <false/>
459 </dict>
460 <key>Locked</key>
461 <true/> | <false/>
462 <key>PrivateBrowsing</key>
463 <true/> | <false/>
464 </dict>
465 </dict>
466 ```
467 #### policies.json
468 ```
469 {
470 "policies": {
471 "Authentication": {
472 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
473 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
474 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
475 "AllowNonFQDN": {
476 "SPNEGO": true | false,
477 "NTLM": true | false
478 },
479 "AllowProxies": {
480 "SPNEGO": true | false,
481 "NTLM": true | false
482 },
483 "Locked": true | false,
484 "PrivateBrowsing": true | false
485 }
486 }
487 }
488 ```
489 ### AutoLaunchProtocolsFromOrigins
490 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
491
492 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
493
494 The schema is:
495 ```
496 {
497 "items": {
498 "properties": {
499 "allowed_origins": {
500 "items": {
501 "type": "string"
502 },
503 "type": "array"
504 },
505 "protocol": {
506 "type": "string"
507 }
508 },
509 "required": [
510 "protocol",
511 "allowed_origins"
512 ],
513 "type": "object"
514 },
515 "type": "array"
516 }
517 ```
518 **Compatibility:** Firefox 90, Firefox ESR 78.12\
519 **CCK2 Equivalent:** N/A\
520 **Preferences Affected:** N/A
521
522 #### Windows (GPO)
523 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
524 ```
525 [
526 {
527 "protocol": "zoommtg",
528 "allowed_origins": [
529 "https://somesite.zoom.us"
530 ]
531 }
532 ]
533 ```
534 #### Windows (Intune)
535 OMA-URI:
536 ```
537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
538 ```
539 Value (string):
540 ```
541 <enabled/>
542 <data id="JSON" value='
543 [
544 {
545 "protocol": "zoommtg",
546 "allowed_origins": [
547 "https://somesite.zoom.us"
548 ]
549 }
550 ]'/>
551 ```
552 #### macOS
553 ```
554 <dict>
555 <key>AutoLaunchProtocolsFromOrigins</key>
556 <array>
557 <dict>
558 <key>protocol</key>
559 <string>zoommtg</string>
560 <key>allowed_origins</key>
561 <array>
562 <string>https://somesite.zoom.us</string>
563 </array>
564 </dict>
565 </array>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "AutoLaunchProtocolsFromOrigins": [{
573 "protocol": "zoommtg",
574 "allowed_origins": [
575 "https://somesite.zoom.us"
576 ]
577 }]
578 }
579 }
580 ```
581 ### BackgroundAppUpdate
582
583 Enable or disable **automatic** application update **in the background**, when the application is not running.
584
585 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
586
587 If set to false, the application will not try to install updates when the application is not running.
588
589 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
590
591 **Compatibility:** Firefox 90 (Windows only)\
592 **CCK2 Equivalent:** N/A\
593 **Preferences Affected:** `app.update.background.enabled`
594
595 #### Windows (GPO)
596 ```
597 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
598 ```
599 #### Windows (Intune)
600 OMA-URI:
601 ```
602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
603 ```
604 Value (string):
605 ```
606 <enabled/> or <disabled/>
607 ```
608 #### macOS
609 ```
610 <dict>
611 <key>BackgroundAppUpdate</key>
612 <true/> | <false/>
613 </dict>
614 ```
615 #### policies.json
616 ```
617 {
618 "policies": {
619 "BackgroundAppUpdate": true | false
620 }
621 }
622 ```
623 ### BlockAboutAddons
624
625 Block access to the Add-ons Manager (about:addons).
626
627 **Compatibility:** Firefox 60, Firefox ESR 60\
628 **CCK2 Equivalent:** `disableAddonsManager`\
629 **Preferences Affected:** N/A
630
631 #### Windows (GPO)
632 ```
633 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
634 ```
635 #### Windows (Intune)
636 OMA-URI:
637 ```
638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
639 ```
640 Value (string):
641 ```
642 <enabled/> or <disabled/>
643 ```
644 #### macOS
645 ```
646 <dict>
647 <key>BlockAboutAddons</key>
648 <true/> | <false/>
649 </dict>
650 ```
651 #### policies.json
652 ```
653 {
654 "policies": {
655 "BlockAboutAddons": true | false
656 }
657 }
658 ```
659 ### BlockAboutConfig
660
661 Block access to about:config.
662
663 **Compatibility:** Firefox 60, Firefox ESR 60\
664 **CCK2 Equivalent:** `disableAboutConfig`\
665 **Preferences Affected:** N/A
666
667 #### Windows (GPO)
668 ```
669 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
670 ```
671 #### Windows (Intune)
672 OMA-URI:
673 ```
674 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
675 ```
676 Value (string):
677 ```
678 <enabled/> or <disabled/>
679 ```
680 #### macOS
681 ```
682 <dict>
683 <key>BlockAboutConfig</key>
684 <true/> | <false/>
685 </dict>
686 ```
687 #### policies.json
688 ```
689 {
690 "policies": {
691 "BlockAboutConfig": true | false
692 }
693 }
694 ```
695 ### BlockAboutProfiles
696
697 Block access to About Profiles (about:profiles).
698
699 **Compatibility:** Firefox 60, Firefox ESR 60\
700 **CCK2 Equivalent:** `disableAboutProfiles`\
701 **Preferences Affected:** N/A
702
703 #### Windows (GPO)
704 ```
705 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
706 ```
707 #### Windows (Intune)
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
711 ```
712 Value (string):
713 ```
714 <enabled/> or <disabled/>
715 ```
716 #### macOS
717 ```
718 <dict>
719 <key>BlockAboutProfiles</key>
720 <true/> | <false/>
721 </dict>
722 ```
723 #### policies.json
724 ```
725 {
726 "policies": {
727 "BlockAboutProfiles": true | false
728 }
729 }
730 ```
731 ### BlockAboutSupport
732
733 Block access to Troubleshooting Information (about:support).
734
735 **Compatibility:** Firefox 60, Firefox ESR 60\
736 **CCK2 Equivalent:** `disableAboutSupport`\
737 **Preferences Affected:** N/A
738
739 #### Windows (GPO)
740 ```
741 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
742 ```
743 #### Windows (Intune)
744 OMA-URI:
745 ```
746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
747 ```
748 Value (string):
749 ```
750 <enabled/> or <disabled/>
751 ```
752 #### macOS
753 ```
754 <dict>
755 <key>BlockAboutSupport</key>
756 <true/> | <false/>
757 </dict>
758 ```
759 #### policies.json
760 ```
761 {
762 "policies": {
763 "BlockAboutSupport": true | false
764 }
765 }
766 ```
767 ### Bookmarks
768
769 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
770
771 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
772
773 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
774
775 **Compatibility:** Firefox 60, Firefox ESR 60\
776 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
777 **Preferences Affected:** N/A
778
779 #### Windows (GPO)
780 ```
781 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
782 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
783 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
784 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
785 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
786
787 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
788 ```
789 []
790 ```
791
792 ```
793 #### Windows (Intune)
794 OMA-URI:
795 ```
796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
797 ```
798 Value (string):
799 ```
800 <enabled/>
801 <data id="BookmarkTitle" value="Example"/>
802 <data id="BookmarkURL" value="https://example.com"/>
803 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
804 <data id="BookmarkPlacement" value="toolbar | menu"/>
805 <data id="BookmarkFolder" value="FolderName"/>
806 ```
807 OMA-URI:
808 ```
809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
810 ```
811 Value (string):
812 ```
813 <enabled/>
814 <data id="JSON" value='[]'/>
815 ```
816 #### macOS
817 ```
818 <dict>
819 <key>Bookmarks</key>
820 <array>
821 <dict>
822 <key>Title</key>
823 <string>Example</string>
824 <key>URL</key>
825 <string>https://example.com</string>
826 <key>Favicon</key>
827 <string>https://example.com/favicon.ico</string>
828 <key>Placement</key>
829 <string>toolbar | menu</string>
830 <key>Folder</key>
831 <string>FolderName</string>
832 </dict>
833 </array>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "Bookmarks": [
841 {
842 "Title": "Example",
843 "URL": "https://example.com",
844 "Favicon": "https://example.com/favicon.ico",
845 "Placement": "toolbar" | "menu",
846 "Folder": "FolderName"
847 }
848 ]
849 }
850 }
851 ```
852 ### CaptivePortal
853 Enable or disable the detection of captive portals.
854
855 **Compatibility:** Firefox 67, Firefox ESR 60.7\
856 **CCK2 Equivalent:** N/A\
857 **Preferences Affected:** `network.captive-portal-service.enabled`
858
859 #### Windows (GPO)
860 ```
861 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
862 ```
863 #### Windows (Intune)
864 OMA-URI:
865 ```
866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
867 ```
868 Value (string):
869 ```
870 <enabled/> or <disabled/>
871 ```
872 #### macOS
873 ```
874 <dict>
875 <key>CaptivePortal</key>
876 <true/> | <false/>
877 </dict>
878 ```
879 #### policies.json
880 ```
881 {
882 "policies": {
883 "CaptivePortal": true | false
884 }
885 }
886 ```
887 ### Certificates
888
889 ### Certificates | ImportEnterpriseRoots
890
891 Trust certificates that have been added to the operating system certificate store by a user or administrator.
892
893 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
894
895 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
896
897 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
898 **CCK2 Equivalent:** N/A\
899 **Preferences Affected:** `security.enterprise_roots.enabled`
900
901 #### Windows (GPO)
902 ```
903 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
904 ```
905 #### Windows (Intune)
906 OMA-URI:
907 ```
908 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
909 ```
910 Value (string):
911 ```
912 <enabled/> or <disabled/>
913 ```
914 #### macOS
915 ```
916 <dict>
917 <key>Certificates</key>
918 <dict>
919 <key>ImportEnterpriseRoots</key>
920 <true/> | <false/>
921 </dict>
922 </dict>
923 ```
924 #### policies.json
925 ```
926 {
927 "policies": {
928 "Certificates": {
929 "ImportEnterpriseRoots": true | false
930 }
931 }
932 }
933 ```
934 ### Certificates | Install
935
936 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
937
938 - Windows
939 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
940 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
941 - macOS
942 - /Library/Application Support/Mozilla/Certificates
943 - ~/Library/Application Support/Mozilla/Certificates
944 - Linux
945 - /usr/lib/mozilla/certificates
946 - /usr/lib64/mozilla/certificates
947 - ~/.mozilla/certificates
948
949 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
950
951 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
952
953 Certificates are installed using the trust string `CT,CT,`.
954
955 Binary (DER) and ASCII (PEM) certificates are both supported.
956
957 **Compatibility:** Firefox 64, Firefox ESR 64\
958 **CCK2 Equivalent:** `certs.ca`\
959 **Preferences Affected:** N/A
960
961 #### Windows (GPO)
962 ```
963 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
964 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
965 ```
966 #### Windows (Intune)
967 OMA-URI:
968 ```
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
970 ```
971 Value (string):
972 ```
973 <enabled/>
974 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
975 ```
976 #### macOS
977 ```
978 <dict>
979 <key>Certificates</key>
980 <dict>
981 <key>Install</key>
982 <array>
983 <string>cert1.der</string>
984 <string>/Users/username/cert2.pem</string>
985 </array>
986 </dict>
987 </dict>
988 ```
989 #### policies.json
990 ```
991 {
992 "policies": {
993 "Certificates": {
994 "Install": ["cert1.der", "/home/username/cert2.pem"]
995 }
996 }
997 }
998 ```
999 ### Containers
1000 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1001
1002 Currently you can set the initial set of containers.
1003
1004 For each container, you can specify the name, icon, and color.
1005
1006 | Name | Description |
1007 | --- | --- |
1008 | `name`| Name of container
1009 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1010 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1011
1012 **Compatibility:** Firefox 113\
1013 **CCK2 Equivalent:** N/A\
1014 **Preferences Affected:** N/A
1015
1016 #### Windows (GPO)
1017 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1018 ```
1019 {
1020 "Default": [
1021 {
1022 "name": "My container",
1023 "icon": "pet",
1024 "color": "turquoise"
1025 }
1026 ]
1027 }
1028 ```
1029 #### Windows (Intune)
1030 OMA-URI:
1031 ```
1032 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1033 ```
1034 Value (string):
1035 ```
1036 <enabled/>
1037 <data id="JSON" value='
1038 {
1039 "Default": [
1040 {
1041 "name": "My container",
1042 "icon": "pet",
1043 "color": "turquoise"
1044 }
1045 ]
1046 }
1047 '/>
1048 ```
1049 #### macOS
1050 ```
1051 <dict>
1052 <key>Default</key>
1053 <dict>
1054 <key>Containers</key>
1055 <array>
1056 <dict>
1057 <key>name</key>
1058 <string>My container</string>
1059 <key>icon</key>
1060 <string>pet</string>
1061 <key>color</key>
1062 <string>turquoise</string>
1063 </dict>
1064 </array>
1065 </dict>
1066 </dict>
1067 ```
1068 #### policies.json
1069 ```
1070 {
1071 "policies": {
1072 "Containers": {
1073 "Default": [
1074 {
1075 "name": "My container",
1076 "icon": "pet",
1077 "color": "turquoise"
1078 }
1079 ]
1080 }
1081 }
1082 }
1083 ```
1084 ### Cookies
1085 Configure cookie preferences.
1086
1087 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1088
1089 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1090
1091 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1092
1093 `Behavior` sets the default behavior for cookies based on the values below.
1094
1095 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1096
1097 | Value | Description
1098 | --- | --- |
1099 | accept | Accept all cookies
1100 | reject-foreign | Reject third party cookies
1101 | reject | Reject all cookies
1102 | limit-foreign | Reject third party cookies for sites you haven't visited
1103 | reject-tracker | Reject cookies for known trackers (default)
1104 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1105
1106 `Default` (Deprecated) determines whether cookies are accepted at all.
1107
1108 `AcceptThirdParty` (Deprecated) determines how third-party cookies are handled.
1109
1110 `ExpireAtSessionEnd` determines when cookies expire.
1111
1112 `RejectTracker` (Deprecated) only rejects cookies for trackers.
1113
1114 `Locked` prevents the user from changing cookie preferences.
1115
1116 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1117 **CCK2 Equivalent:** N/A\
1118 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1119
1120 #### Windows (GPO)
1121 ```
1122 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1123 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1124 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1125 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
1126 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
1127 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
1128 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
1129 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1130 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1131 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1132 ```
1133 #### Windows (Intune)
1134 OMA-URI:
1135 ```
1136 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1137 ```
1138 Value (string):
1139 ```
1140 <enabled/>
1141 <data id="Permissions" value="1&#xF000;https://example.com"/>
1142 ```
1143 OMA-URI:
1144 ```
1145 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1146 ```
1147 Value (string):
1148 ```
1149 <enabled/>
1150 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1151 ```
1152 OMA-URI:
1153 ```
1154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1155 ```
1156 Value (string):
1157 ```
1158 <enabled/>
1159 <data id="Permissions" value="1&#xF000;https://example.org"/>
1160 ```
1161 OMA-URI:
1162 ```
1163 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1164 ```
1165 Value (string):
1166 ```
1167 <enabled/> or <disabled/>
1168 ```
1169 OMA-URI:
1170 ```
1171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1172 ```
1173 Value (string):
1174 ```
1175 <enabled/>
1176 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1177 ```
1178 OMA-URI:
1179 ```
1180 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1181 ```
1182 Value (string):
1183 ```
1184 <enabled/> or <disabled/>
1185 ```
1186 OMA-URI:
1187 ```
1188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1189 ```
1190 Value (string):
1191 ```
1192 <enabled/> or <disabled/>
1193 ```
1194 OMA-URI:
1195 ```
1196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1197 ```
1198 Value (string):
1199 ```
1200 <enabled/> or <disabled/>
1201 ```
1202 OMA-URI:
1203 ```
1204 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1205 ```
1206 Value (string):
1207 ```
1208 <enabled/>
1209 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1210 ```
1211 OMA-URI:
1212 ```
1213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1214 ```
1215 Value (string):
1216 ```
1217 <enabled/>
1218 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1219 ```
1220 #### macOS
1221 ```
1222 <dict>
1223 <key>Cookies</key>
1224 <dict>
1225 <key>Allow</key>
1226 <array>
1227 <string>http://example.com</string>
1228 </array>
1229 <key>AllowSession</key>
1230 <array>
1231 <string>http://example.edu</string>
1232 </array>
1233 <key>Block</key>
1234 <array>
1235 <string>http://example.org</string>
1236 </array>
1237 <key>Default</key>
1238 <true/> | <false/>
1239 <key>AcceptThirdParty</key>
1240 <string>always | never | from-visited</string>
1241 <key>ExpireAtSessionEnd</key>
1242 <true/> | <false/>
1243 <key>RejectTracker</key>
1244 <true/> | <false/>
1245 <key>Locked</key>
1246 <true/> | <false/>
1247 <key>Behavior</key>
1248 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1249 <key>BehaviorPrivateBrowsing</key>
1250 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1251 </dict>
1252 </dict>
1253 ```
1254 #### policies.json
1255 ```
1256 {
1257 "policies": {
1258 "Cookies": {
1259 "Allow": ["http://example.org/"],
1260 "AllowSession": ["http://example.edu/"],
1261 "Block": ["http://example.edu/"],
1262 "Default": true | false,
1263 "AcceptThirdParty": "always" | "never" | "from-visited",
1264 "ExpireAtSessionEnd": true | false,
1265 "RejectTracker": true | false,
1266 "Locked": true | false,
1267 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1268 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1269 }
1270 }
1271 }
1272 ```
1273 ### DefaultDownloadDirectory
1274 Set the default download directory.
1275
1276 You can use ${home} for the native home directory.
1277
1278 **Compatibility:** Firefox 68, Firefox ESR 68\
1279 **CCK2 Equivalent:** N/A\
1280 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1281
1282 #### Windows (GPO)
1283 ```
1284 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1285 ```
1286 #### Windows (Intune)
1287 OMA-URI:
1288 ```
1289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1290 ```
1291 Value (string):
1292 ```
1293 <enabled/>
1294 <data id="Preferences_String" value="${home}\Downloads"/>
1295 ```
1296 #### macOS
1297 ```
1298 <dict>
1299 <key>DefaultDownloadDirectory</key>
1300 <string>${home}/Downloads</string>
1301 </dict>
1302 ```
1303 #### policies.json (macOS and Linux)
1304 ```
1305 {
1306 "policies": {
1307 "DefaultDownloadDirectory": "${home}/Downloads"
1308 }
1309 }
1310 ```
1311 #### policies.json (Windows)
1312 ```
1313 {
1314 "policies": {
1315 "DefaultDownloadDirectory": "${home}\\Downloads"
1316 }
1317 }
1318 ```
1319 ### DisableAppUpdate
1320 Turn off application updates within Firefox.
1321
1322 **Compatibility:** Firefox 60, Firefox ESR 60\
1323 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1324 **Preferences Affected:** N/A
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisableAppUpdate</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisableAppUpdate": true | false
1351 }
1352 }
1353 ```
1354 ### DisableBuiltinPDFViewer
1355 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePDFjs`\
1359 **Preferences Affected:** `pdfjs.disabled`
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisableBuiltinPDFViewer</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisableBuiltinPDFViewer": true | false
1386 }
1387 }
1388 ```
1389 ### DisabledCiphers
1390 Disable specific cryptographic ciphers, listed below.
1391
1392 ```
1393 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1394 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1395 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1396 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1397 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1398 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1399 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1400 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1401 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1402 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1403 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1404 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1405 TLS_RSA_WITH_AES_128_GCM_SHA256
1406 TLS_RSA_WITH_AES_256_GCM_SHA384
1407 TLS_RSA_WITH_AES_128_CBC_SHA
1408 TLS_RSA_WITH_AES_256_CBC_SHA
1409 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1410 ```
1411
1412 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1413
1414 ---
1415 **Note:**
1416
1417 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1418
1419 ---
1420 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1421 **CCK2 Equivalent:** N/A\
1422 **Preferences Affected:** N/A
1423
1424 #### Windows (GPO)
1425 ```
1426 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1427 ```
1428 #### Windows (Intune)
1429 OMA-URI:
1430 ```
1431 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1432
1433 ```
1434 Value (string):
1435 ```
1436 <enabled/> or <disabled/>
1437 ```
1438 #### macOS
1439 ```
1440 <dict>
1441 <key>DisabledCiphers</key>
1442 <dict>
1443 <key>CIPHER_NAME</key>
1444 <true/> | <false/>
1445 </dict>
1446 </dict>
1447 ```
1448 #### policies.json
1449 ```
1450 {
1451 "policies": {
1452 "DisabledCiphers": {
1453 "CIPHER_NAME": true | false,
1454 }
1455 }
1456 }
1457 ```
1458 ### DisableDefaultBrowserAgent
1459 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1460
1461 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1462
1463 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1464 **CCK2 Equivalent:** N/A\
1465 **Preferences Affected:** N/A
1466
1467 #### Windows (GPO)
1468 ```
1469 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1470 ```
1471 #### Windows (Intune)
1472 OMA-URI:
1473 ```
1474 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1475 ```
1476 Value (string):
1477 ```
1478 <enabled/> or <disabled/>
1479 ```
1480 #### policies.json
1481 ```
1482 {
1483 "policies": {
1484 "DisableDefaultBrowserAgent": true | false
1485 }
1486 }
1487 ```
1488 ### DisableDeveloperTools
1489 Remove access to all developer tools.
1490
1491 **Compatibility:** Firefox 60, Firefox ESR 60\
1492 **CCK2 Equivalent:** `removeDeveloperTools`\
1493 **Preferences Affected:** `devtools.policy.disabled`
1494
1495 #### Windows (GPO)
1496 ```
1497 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1498 ```
1499 #### Windows (Intune)
1500 OMA-URI:
1501 ```
1502 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1503 ```
1504 Value (string):
1505 ```
1506 <enabled/> or <disabled/>
1507 ```
1508 #### macOS
1509 ```
1510 <dict>
1511 <key>DisableDeveloperTools</key>
1512 <true/> | <false/>
1513 </dict>
1514 ```
1515 #### policies.json
1516 ```
1517 {
1518 "policies": {
1519 "DisableDeveloperTools": true | false
1520 }
1521 }
1522 ```
1523 ### DisableFeedbackCommands
1524 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1525
1526 **Compatibility:** Firefox 60, Firefox ESR 60\
1527 **CCK2 Equivalent:** N/A\
1528 **Preferences Affected:** N/A
1529
1530 #### Windows (GPO)
1531 ```
1532 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1533 ```
1534 #### Windows (Intune)
1535 OMA-URI:
1536 ```
1537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1538 ```
1539 Value (string):
1540 ```
1541 <enabled/> or <disabled/>
1542 ```
1543 #### macOS
1544 ```
1545 <dict>
1546 <key>DisableFeedbackCommands</key>
1547 <true/> | <false/>
1548 </dict>
1549 ```
1550 #### policies.json
1551 ```
1552 {
1553 "policies": {
1554 "DisableFeedbackCommands": true | false
1555 }
1556 }
1557 ```
1558 ### DisableFirefoxAccounts
1559 Disable Firefox Accounts integration (Sync).
1560
1561 **Compatibility:** Firefox 60, Firefox ESR 60\
1562 **CCK2 Equivalent:** `disableSync`\
1563 **Preferences Affected:** `identity.fxaccounts.enabled`
1564
1565 #### Windows (GPO)
1566 ```
1567 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1568 ```
1569 #### Windows (Intune)
1570 OMA-URI:
1571 ```
1572 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1573 ```
1574 Value (string):
1575 ```
1576 <enabled/> or <disabled/>
1577 ```
1578 #### macOS
1579 ```
1580 <dict>
1581 <key>DisableFirefoxAccounts</key>
1582 <true/> | <false/>
1583 </dict>
1584 ```
1585 #### policies.json
1586 ```
1587 {
1588 "policies": {
1589 "DisableFirefoxAccounts": true | false
1590 }
1591 }
1592 ```
1593 ### DisableFirefoxScreenshots
1594 Remove access to Firefox Screenshots.
1595
1596 **Compatibility:** Firefox 60, Firefox ESR 60\
1597 **CCK2 Equivalent:** N/A\
1598 **Preferences Affected:** `extensions.screenshots.disabled`
1599
1600 #### Windows (GPO)
1601 ```
1602 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1603 ```
1604 #### Windows (Intune)
1605 OMA-URI:
1606 ```
1607 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1608 ```
1609 Value (string):
1610 ```
1611 <enabled/> or <disabled/>
1612 ```
1613 #### macOS
1614 ```
1615 <dict>
1616 <key>DisableFirefoxScreenshots</key>
1617 <true/> | <false/>
1618 </dict>
1619 ```
1620 #### policies.json
1621 ```
1622 {
1623 "policies": {
1624 "DisableFirefoxScreenshots": true | false
1625 }
1626 }
1627 ```
1628 ### DisableFirefoxStudies
1629 Disable Firefox studies (Shield).
1630
1631 **Compatibility:** Firefox 60, Firefox ESR 60\
1632 **CCK2 Equivalent:** N/A\
1633 **Preferences Affected:** N/A
1634
1635 #### Windows (GPO)
1636 ```
1637 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1638 ```
1639 #### Windows (Intune)
1640 OMA-URI:
1641 ```
1642 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1643 ```
1644 Value (string):
1645 ```
1646 <enabled/> or <disabled/>
1647 ```
1648 #### macOS
1649 ```
1650 <dict>
1651 <key>DisableFirefoxStudies</key>
1652 <true/> | <false/>
1653 </dict>
1654 ```
1655 #### policies.json
1656 ```
1657 {
1658 "policies": {
1659 "DisableFirefoxStudies": true | false
1660 }
1661 }
1662 ```
1663 ### DisableForgetButton
1664 Disable the "Forget" button.
1665
1666 **Compatibility:** Firefox 60, Firefox ESR 60\
1667 **CCK2 Equivalent:** `disableForget`\
1668 **Preferences Affected:** N/A
1669
1670 #### Windows (GPO)
1671 ```
1672 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1673 ```
1674 #### Windows (Intune)
1675 OMA-URI:
1676 ```
1677 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1678 ```
1679 Value (string):
1680 ```
1681 <enabled/> or <disabled/>
1682 ```
1683 #### macOS
1684 ```
1685 <dict>
1686 <key>DisableForgetButton</key>
1687 <true/> | <false/>
1688 </dict>
1689 ```
1690 #### policies.json
1691 ```
1692 {
1693 "policies": {
1694 "DisableForgetButton": true | false
1695 }
1696 }
1697 ```
1698 ### DisableFormHistory
1699 Turn off saving information on web forms and the search bar.
1700
1701 **Compatibility:** Firefox 60, Firefox ESR 60\
1702 **CCK2 Equivalent:** `disableFormFill`\
1703 **Preferences Affected:** `browser.formfill.enable`
1704
1705 #### Windows (GPO)
1706 ```
1707 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1708 ```
1709 #### Windows (Intune)
1710 OMA-URI:
1711 ```
1712 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1713 ```
1714 Value (string):
1715 ```
1716 <enabled/> or <disabled/>
1717 ```
1718 #### macOS
1719 ```
1720 <dict>
1721 <key>DisableFormHistory</key>
1722 <true/> | <false/>
1723 </dict>
1724 ```
1725 #### policies.json
1726 ```
1727 {
1728 "policies": {
1729 "DisableFormHistory": true | false
1730 }
1731 }
1732 ```
1733 ### DisableMasterPasswordCreation
1734 Remove the master password functionality.
1735
1736 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1737
1738 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1739
1740 **Compatibility:** Firefox 60, Firefox ESR 60\
1741 **CCK2 Equivalent:** `noMasterPassword`\
1742 **Preferences Affected:** N/A
1743
1744 #### Windows (GPO)
1745 ```
1746 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1747 ```
1748 #### Windows (Intune)
1749 OMA-URI:
1750 ```
1751 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1752 ```
1753 Value (string):
1754 ```
1755 <enabled/> or <disabled/>
1756 ```
1757 #### macOS
1758 ```
1759 <dict>
1760 <key>DisableMasterPasswordCreation</key>
1761 <true/> | <false/>
1762 </dict>
1763 ```
1764 #### policies.json
1765 ```
1766 {
1767 "policies": {
1768 "DisableMasterPasswordCreation": true | false
1769 }
1770 }
1771 ```
1772 ### DisablePasswordReveal
1773 Do not allow passwords to be shown in saved logins
1774
1775 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1776 **CCK2 Equivalent:** N/A
1777 **Preferences Affected:** N/A
1778
1779 #### Windows (GPO)
1780 ```
1781 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1782 ```
1783 #### Windows (Intune)
1784 OMA-URI:
1785 ```
1786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1787 ```
1788 Value (string):
1789 ```
1790 <enabled/> or <disabled/>
1791 ```
1792 #### macOS
1793 ```
1794 <dict>
1795 <key>DisablePasswordReveal</key>
1796 <true/> | <false/>
1797 </dict>
1798 ```
1799 #### policies.json
1800 ```
1801 {
1802 "policies": {
1803 "DisablePasswordReveal": true | false
1804 }
1805 }
1806 ```
1807 ### DisablePocket
1808 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1809
1810 **Compatibility:** Firefox 60, Firefox ESR 60\
1811 **CCK2 Equivalent:** `disablePocket`\
1812 **Preferences Affected:** `extensions.pocket.enabled`
1813
1814 #### Windows (GPO)
1815 ```
1816 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1817 ```
1818 #### Windows (Intune)
1819 OMA-URI:
1820 ```
1821 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1822 ```
1823 Value (string):
1824 ```
1825 <enabled/> or <disabled/>
1826 ```
1827 #### macOS
1828 ```
1829 <dict>
1830 <key>DisablePocket</key>
1831 <true/> | <false/>
1832 </dict>
1833 ```
1834 #### policies.json
1835 ```
1836 {
1837 "policies": {
1838 "DisablePocket": true | false
1839 }
1840 }
1841 ```
1842 ### DisablePrivateBrowsing
1843 Remove access to private browsing.
1844
1845 **Compatibility:** Firefox 60, Firefox ESR 60\
1846 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1847 **Preferences Affected:** N/A
1848
1849 #### Windows (GPO)
1850 ```
1851 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1852 ```
1853 #### Windows (Intune)
1854 OMA-URI:
1855 ```
1856 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1857 ```
1858 Value (string):
1859 ```
1860 <enabled/> or <disabled/>
1861 ```
1862 #### macOS
1863 ```
1864 <dict>
1865 <key>DisablePrivateBrowsing</key>
1866 <true/> | <false/>
1867 </dict>
1868 ```
1869 #### policies.json
1870 ```
1871 {
1872 "policies": {
1873 "DisablePrivateBrowsing": true | false
1874 }
1875 }
1876 ```
1877 ### DisableProfileImport
1878 Disables the "Import data from another browser" option in the bookmarks window.
1879
1880 **Compatibility:** Firefox 60, Firefox ESR 60\
1881 **CCK2 Equivalent:** N/A\
1882 **Preferences Affected:** N/A
1883
1884 #### Windows (GPO)
1885 ```
1886 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1887 ```
1888 #### Windows (Intune)
1889 OMA-URI:
1890 ```
1891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1892 ```
1893 Value (string):
1894 ```
1895 <enabled/> or <disabled/>
1896 ```
1897 #### macOS
1898 ```
1899 <dict>
1900 <key>DisableProfileImport</key>
1901 <true/> | <false/>
1902 </dict>
1903 ```
1904 #### policies.json
1905 ```
1906 {
1907 "policies": {
1908 "DisableProfileImport": true | false
1909 }
1910 }
1911 ```
1912 ### DisableProfileRefresh
1913 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1914
1915 **Compatibility:** Firefox 60, Firefox ESR 60\
1916 **CCK2 Equivalent:** `disableResetFirefox`\
1917 **Preferences Affected:** `browser.disableResetPrompt`
1918
1919 #### Windows (GPO)
1920 ```
1921 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1922 ```
1923 #### Windows (Intune)
1924 OMA-URI:
1925 ```
1926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1927 ```
1928 Value (string):
1929 ```
1930 <enabled/> or <disabled/>
1931 ```
1932 #### macOS
1933 ```
1934 <dict>
1935 <key>DisableProfileRefresh</key>
1936 <true/> | <false/>
1937 </dict>
1938 ```
1939 #### policies.json
1940 ```
1941 {
1942 "policies": {
1943 "DisableProfileRefresh": true | false
1944 }
1945 }
1946 ```
1947 ### DisableSafeMode
1948 Disable safe mode within the browser.
1949
1950 On Windows, this disables safe mode via the command line as well.
1951
1952 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1953 **CCK2 Equivalent:** `disableSafeMode`\
1954 **Preferences Affected:** N/A
1955
1956 #### Windows (GPO)
1957 ```
1958 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1959 ```
1960 #### Windows (Intune)
1961 OMA-URI:
1962 ```
1963 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1964 ```
1965 Value (string):
1966 ```
1967 <enabled/> or <disabled/>
1968 ```
1969 #### macOS
1970 ```
1971 <dict>
1972 <key>DisableSafeMode</key>
1973 <true/> | <false/>
1974 </dict>
1975 ```
1976 #### policies.json
1977 ```
1978 {
1979 "policies": {
1980 "DisableSafeMode": true | false
1981 }
1982 }
1983 ```
1984 ### DisableSecurityBypass
1985 Prevent the user from bypassing security in certain cases.
1986
1987 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1988
1989 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1990
1991 **Compatibility:** Firefox 60, Firefox ESR 60\
1992 **CCK2 Equivalent:** N/A\
1993 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
1994
1995 #### Windows (GPO)
1996 ```
1997 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1999 ```
2000 #### Windows (Intune)
2001 OMA-URI:
2002 ```
2003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2004 ```
2005 Value (string):
2006 ```
2007 <enabled/> or <disabled/>
2008 ```
2009 OMA-URI:
2010 ```
2011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2012 ```
2013 Value (string):
2014 ```
2015 <enabled/> or <disabled/>
2016 ```
2017
2018 #### macOS
2019 ```
2020 <dict>
2021 <key>DisableSecurityBypass</key>
2022 <dict>
2023 <key>InvalidCertificate</key>
2024 <true/> | <false/>
2025 <key>SafeBrowsing</key>
2026 <true/> | <false/>
2027 </dict>
2028 </dict>
2029 ```
2030 #### policies.json
2031 ```
2032 {
2033 "policies": {
2034 "DisableSecurityBypass": {
2035 "InvalidCertificate": true | false,
2036 "SafeBrowsing": true | false
2037 }
2038 }
2039 }
2040 ```
2041 ### DisableSetDesktopBackground
2042 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2043
2044 **Compatibility:** Firefox 60, Firefox ESR 60\
2045 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2046 **Preferences Affected:** N/A
2047
2048 #### Windows (GPO)
2049 ```
2050 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2051 ```
2052 #### Windows (Intune)
2053 OMA-URI:
2054 ```
2055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2056 ```
2057 Value (string):
2058 ```
2059 <enabled/> or <disabled/>
2060 ```
2061 #### macOS
2062 ```
2063 <dict>
2064 <key>DisableSetDesktopBackground</key>
2065 <true/> | <false/>
2066 </dict>
2067 ```
2068 #### policies.json
2069 ```
2070 {
2071 "policies": {
2072 "DisableSetDesktopBackground": true | false
2073 }
2074 }
2075 ```
2076 ### DisableSystemAddonUpdate
2077 Prevent system add-ons from being installed or updated.
2078
2079 **Compatibility:** Firefox 60, Firefox ESR 60\
2080 **CCK2 Equivalent:** N/A\
2081 **Preferences Affected:** N/A
2082
2083 #### Windows (GPO)
2084 ```
2085 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2086 ```
2087 #### Windows (Intune)
2088 OMA-URI:
2089 ```
2090 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2091 ```
2092 Value (string):
2093 ```
2094 <enabled/> or <disabled/>
2095 ```
2096 #### macOS
2097 ```
2098 <dict>
2099 <key>DisableSystemAddonUpdate</key>
2100 <true/> | <false/>
2101 </dict>
2102 ```
2103 #### policies.json
2104 ```
2105 {
2106 "policies": {
2107 "DisableSystemAddonUpdate": true | false
2108 }
2109 }
2110 ```
2111 ### DisableTelemetry
2112 Prevent the upload of telemetry data.
2113
2114 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2115
2116 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2117
2118 **Compatibility:** Firefox 60, Firefox ESR 60\
2119 **CCK2 Equivalent:** `disableTelemetry`\
2120 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2121
2122 #### Windows (GPO)
2123 ```
2124 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2125 ```
2126 #### Windows (Intune)
2127 OMA-URI:
2128 ```
2129 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2130 ```
2131 Value (string):
2132 ```
2133 <enabled/> or <disabled/>
2134 ```
2135 #### macOS
2136 ```
2137 <dict>
2138 <key>DisableTelemetry</key>
2139 <true/> | <false/>
2140 </dict>
2141 ```
2142 #### policies.json
2143 ```
2144 {
2145 "policies": {
2146 "DisableTelemetry": true | false
2147 }
2148 }
2149 ```
2150 ### DisableThirdPartyModuleBlocking
2151 Do not allow blocking third-party modules from the `about:third-party` page.
2152
2153 This policy only works on Windows through GPO (not policies.json).
2154
2155 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2156 **CCK2 Equivalent:** N/A\
2157 **Preferences Affected:** N/A
2158
2159 #### Windows (GPO)
2160 ```
2161 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2162 ```
2163 #### Windows (Intune)
2164 OMA-URI:
2165 ```
2166 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2167 ```
2168 Value (string):
2169 ```
2170 <enabled/> or <disabled/>
2171 ```
2172 ### DisplayBookmarksToolbar
2173 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2174
2175 `always` means the bookmarks toolbar is always shown.
2176
2177 `never` means the bookmarks toolbar is not shown.
2178
2179 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2180
2181 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2182 **CCK2 Equivalent:** N/A\
2183 **Preferences Affected:** N/A
2184
2185 #### Windows (GPO)
2186 ```
2187 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2188 ```
2189 #### Windows (Intune)
2190 OMA-URI:
2191 ```
2192 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2193 ```
2194 Value (string):
2195 ```
2196 <enabled/>
2197 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2198 ```
2199 #### macOS
2200 ```
2201 <dict>
2202 <key>DisplayBookmarksToolbar</key>
2203 <string>always | never | newtab</string>
2204 </dict>
2205 ```
2206 #### policies.json
2207 ```
2208 {
2209 "policies": {
2210 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2211 }
2212 }
2213 ```
2214 ### DisplayBookmarksToolbar (Deprecated)
2215 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
2216
2217 **Compatibility:** Firefox 60, Firefox ESR 60\
2218 **CCK2 Equivalent:** `displayBookmarksToolbar`\
2219 **Preferences Affected:** N/A
2220
2221 #### Windows (GPO)
2222 ```
2223 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
2224 ```
2225 #### Windows (Intune)
2226 OMA-URI:
2227 ```
2228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
2229 ```
2230 Value (string):
2231 ```
2232 <enabled/> or <disabled/>
2233 ```
2234 #### macOS
2235 ```
2236 <dict>
2237 <key>DisplayBookmarksToolbar</key>
2238 <true/> | <false/>
2239 </dict>
2240 ```
2241 #### policies.json
2242 ```
2243 {
2244 "policies": {
2245 "DisplayBookmarksToolbar": true | false
2246 }
2247 }
2248 ```
2249 ### DisplayMenuBar
2250 Set the state of the menubar.
2251
2252 `always` means the menubar is shown and cannot be hidden.
2253
2254 `never` means the menubar is hidden and cannot be shown.
2255
2256 `default-on` means the menubar is on by default but can be hidden.
2257
2258 `default-off` means the menubar is off by default but can be shown.
2259
2260 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2261 **CCK2 Equivalent:** `displayMenuBar`\
2262 **Preferences Affected:** N/A
2263
2264 #### Windows (GPO)
2265 ```
2266 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2267 ```
2268 #### Windows (Intune)
2269 OMA-URI:
2270 ```
2271 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2272 ```
2273 Value (string):
2274 ```
2275 <enabled/>
2276 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2277 ```
2278 #### macOS
2279 ```
2280 <dict>
2281 <key>DisplayMenuBar</key>
2282 <string>always | never | default-on | default-off</string>
2283 </dict>
2284 ```
2285 #### policies.json
2286 ```
2287 {
2288 "policies": {
2289 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2290 }
2291 }
2292 ```
2293 ### DisplayMenuBar (Deprecated)
2294 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2295
2296 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2297 **CCK2 Equivalent:** `displayMenuBar`\
2298 **Preferences Affected:** N/A
2299
2300 #### Windows (GPO)
2301 ```
2302 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2303 ```
2304 #### macOS
2305 ```
2306 <dict>
2307 <key>DisplayMenuBar</key>
2308 <true/> | <false/>
2309 </dict>
2310 ```
2311 #### policies.json
2312 ```
2313 {
2314 "policies": {
2315 "DisplayMenuBar": true | false
2316 }
2317 }
2318 ```
2319 ### DNSOverHTTPS
2320 Configure DNS over HTTPS.
2321
2322 `Enabled` determines whether DNS over HTTPS is enabled
2323
2324 `ProviderURL` is a URL to another provider.
2325
2326 `Locked` prevents the user from changing DNS over HTTPS preferences.
2327
2328 `ExcludedDomains` excludes domains from DNS over HTTPS.
2329
2330 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2331 **CCK2 Equivalent:** N/A\
2332 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2333
2334 #### Windows (GPO)
2335 ```
2336 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2337 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2338 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2339 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2340 ```
2341 #### Windows (Intune)
2342 OMA-URI:
2343 ```
2344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2345 ```
2346 Value (string):
2347 ```
2348 <enabled/> or <disabled/>
2349 ```
2350 OMA-URI:
2351 ```
2352 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2353 ```
2354 Value (string):
2355 ```
2356 <enabled/>
2357 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2358 ```
2359 OMA-URI:
2360 ```
2361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2362 ```
2363 Value (string):
2364 ```
2365 <enabled/> or <disabled/>
2366 ```
2367 OMA-URI:
2368 ```
2369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2370 ```
2371 Value (string):
2372 ```
2373 <enabled/>
2374 <data id="List" value="1&#xF000;example.com"/>
2375 ```
2376 #### macOS
2377 ```
2378 <dict>
2379 <key>DNSOverHTTPS</key>
2380 <dict>
2381 <key>Enabled</key>
2382 <true/> | <false/>
2383 <key>ProviderURL</key>
2384 <string>URL_TO_ALTERNATE_PROVIDER</string>
2385 <key>Locked</key>
2386 <true/> | <false/>
2387 <key>ExcludedDomains</key>
2388 <array>
2389 <string>example.com</string>
2390 </array>
2391 </dict>
2392 </dict>
2393 ```
2394 #### policies.json
2395 ```
2396 {
2397 "policies": {
2398 "DNSOverHTTPS": {
2399 "Enabled": true | false,
2400 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2401 "Locked": true | false,
2402 "ExcludedDomains": ["example.com"]
2403 }
2404 }
2405 }
2406 ```
2407 ### DontCheckDefaultBrowser
2408 Don't check if Firefox is the default browser at startup.
2409
2410 **Compatibility:** Firefox 60, Firefox ESR 60\
2411 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2412 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2413
2414 #### Windows (GPO)
2415 ```
2416 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2417 ```
2418 #### Windows (Intune)
2419 OMA-URI:
2420 ```
2421 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2422 ```
2423 Value (string):
2424 ```
2425 <enabled/> or <disabled/>
2426 ```
2427 #### macOS
2428 ```
2429 <dict>
2430 <key>DontCheckDefaultBrowser</key>
2431 <true/> | <false/>
2432 </dict>
2433 ```
2434 #### policies.json
2435 ```
2436 {
2437 "policies": {
2438 "DontCheckDefaultBrowser": true | false
2439 }
2440 }
2441 ```
2442 ### DownloadDirectory
2443 Set and lock the download directory.
2444
2445 You can use ${home} for the native home directory.
2446
2447 **Compatibility:** Firefox 68, Firefox ESR 68\
2448 **CCK2 Equivalent:** N/A\
2449 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2450
2451 #### Windows (GPO)
2452 ```
2453 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2454 ```
2455 #### Windows (Intune)
2456 OMA-URI:
2457 ```
2458 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2459 ```
2460 Value (string):
2461 ```
2462 <enabled/>
2463 <data id="Preferences_String" value="${home}\Downloads"/>
2464 ```
2465 #### macOS
2466 ```
2467 <dict>
2468 <key>DownloadDirectory</key>
2469 <string>${home}/Downloads</string>
2470 </dict>
2471 ```
2472 #### policies.json (macOS and Linux)
2473 ```
2474 {
2475 "policies": {
2476 "DownloadDirectory": "${home}/Downloads"
2477 }
2478 ```
2479 #### policies.json (Windows)
2480 ```
2481 {
2482 "policies": {
2483 "DownloadDirectory": "${home}\\Downloads"
2484 }
2485 ```
2486 ### EnableTrackingProtection
2487 Configure tracking protection.
2488
2489 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2490
2491 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2492
2493 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2494
2495 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2496
2497 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2498
2499 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2500
2501 `Exceptions` are origins for which tracking protection is not enabled.
2502
2503 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2504 **CCK2 Equivalent:** N/A\
2505 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2506
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2510 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2511 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2512 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2513 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2514 ```
2515 #### Windows (Intune)
2516 OMA-URI:
2517 ```
2518 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2519 ```
2520 Value (string):
2521 ```
2522 <enabled/> or <disabled/>
2523 ```
2524 OMA-URI:
2525 ```
2526 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2527 ```
2528 Value (string):
2529 ```
2530 <enabled/> or <disabled/>
2531 ```
2532 OMA-URI:
2533 ```
2534 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2535 ```
2536 Value (string):
2537 ```
2538 <enabled/> or <disabled/>
2539 ```
2540 OMA-URI:
2541 ```
2542 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2543 ```
2544 Value (string):
2545 ```
2546 <enabled/>
2547 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2548 ```
2549 OMA-URI:
2550 ```
2551 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2552 ```
2553 Value (string):
2554 ```
2555 <enabled/> or <disabled/>
2556 ```
2557 #### macOS
2558 ```
2559 <dict>
2560 <key>EnableTrackingProtection</key>
2561 <dict>
2562 <key>Value</key>
2563 <true/> | <false/>
2564 <key>Locked</key>
2565 <true/> | <false/>
2566 <key>Cryptomining</key>
2567 <true/> | <false/>
2568 <key>Fingerprinting</key>
2569 <true/> | <false/>
2570 <key>Exceptions</key>
2571 <array>
2572 <string>https://example.com</string>
2573 </array>
2574 </dict>
2575 </dict>
2576 ```
2577 #### policies.json
2578 ```
2579 {
2580 "policies": {
2581 "EnableTrackingProtection": {
2582 "Value": true | false,
2583 "Locked": true | false,
2584 "Cryptomining": true | false,
2585 "Fingerprinting": true | false,
2586 "Exceptions": ["https://example.com"]
2587 }
2588 }
2589 }
2590 ```
2591 ### EncryptedMediaExtensions
2592 Enable or disable Encrypted Media Extensions and optionally lock it.
2593
2594 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2595
2596 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2597
2598 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2599 **CCK2 Equivalent:** N/A\
2600 **Preferences Affected:** `media.eme.enabled`
2601
2602 #### Windows (GPO)
2603 ```
2604 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2605 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2606 ```
2607 #### Windows (Intune)
2608 OMA-URI:
2609 ```
2610 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2611 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2612 ```
2613 Value (string):
2614 ```
2615 <enabled/>or <disabled/>
2616 ```
2617 #### macOS
2618 ```
2619 <dict>
2620 <key>EncryptedMediaExtensions</key>
2621 <dict>
2622 <key>Enabled</key>
2623 <true/> | <false/>
2624 <key>Locked</key>
2625 <true/> | <false/>
2626 </dict>
2627 </dict>
2628 ```
2629 #### policies.json
2630 ```
2631 {
2632 "policies": {
2633 "EncryptedMediaExtensions": {
2634 "Enabled": true | false,
2635 "Locked": true | false
2636 }
2637 }
2638 }
2639 ```
2640 ### EnterprisePoliciesEnabled
2641 Enable policy support on macOS.
2642
2643 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2644 **CCK2 Equivalent:** N/A\
2645 **Preferences Affected:** N/A
2646
2647 #### macOS
2648 ```
2649 <dict>
2650 <key>EnterprisePoliciesEnabled</key>
2651 <true/>
2652 </dict>
2653 ```
2654 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2655
2656 Disable warnings based on file extension for specific file types on domains.
2657
2658 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2659
2660 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2661
2662 **Compatibility:** Firefox 102\
2663 **CCK2 Equivalent:** N/A\
2664 **Preferences Affected:** N/A
2665
2666 #### Windows (GPO)
2667 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2668 ```
2669 [
2670 {
2671 "file_extension": "jnlp",
2672 "domains": ["example.com"]
2673 }
2674 ]
2675 ```
2676 #### Windows (Intune)
2677 OMA-URI:
2678 ```
2679 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2680 ```
2681 Value (string):
2682 ```
2683 <enabled/>
2684 <data id="JSON" value='
2685 [
2686 {
2687 "file_extension": "jnlp",
2688 "domains": ["example.com"]
2689 }
2690 ]
2691 '/>
2692 ```
2693 #### macOS
2694 ```
2695 <dict>
2696 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2697 <array>
2698 <dict>
2699 <key>file_extension</key>
2700 <string>jnlp</string>
2701 <key>domains</key>
2702 <array>
2703 <string>example.com</string>
2704 </array>
2705 </dict>
2706 </array>
2707 </dict>
2708 ```
2709 #### policies.json
2710 ```
2711 {
2712 "policies": {
2713 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2714 "file_extension": "jnlp",
2715 "domains": ["example.com"]
2716 }]
2717 }
2718 }
2719 ```
2720 ### Extensions
2721 Control the installation, uninstallation and locking of extensions.
2722
2723 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2724
2725 `Install` is a list of URLs or native paths for extensions to be installed.
2726
2727 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2728
2729 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2730
2731 **Compatibility:** Firefox 60, Firefox ESR 60\
2732 **CCK2 Equivalent:** `addons`\
2733 **Preferences Affected:** N/A
2734
2735 #### Windows (GPO)
2736 ```
2737 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2738 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2739 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2740 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2741 ```
2742 #### Windows (Intune)
2743 OMA-URI:
2744 ```
2745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2746 ```
2747 Value (string):
2748 ```
2749 <enabled/>
2750 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2751 ```
2752 OMA-URI:
2753 ```
2754 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2755 ```
2756 Value (string):
2757 ```
2758 <enabled/>
2759 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2760 ```
2761 OMA-URI:
2762 ```
2763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2764 ```
2765 Value (string):
2766 ```
2767 <enabled/>
2768 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2769 ```
2770 #### macOS
2771 ```
2772 <dict>
2773 <key>Extensions</key>
2774 <dict>
2775 <key>Install</key>
2776 <array>
2777 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2778 <string>//path/to/xpi</string>
2779 </array>
2780 <key>Uninstall</key>
2781 <array>
2782 <string>bad_addon_id@mozilla.org</string>
2783 </array>
2784 <key>Locked</key>
2785 <array>
2786 <string>addon_id@mozilla.org</string>
2787 </array>
2788 </dict>
2789 </dict>
2790 ```
2791 #### policies.json
2792 ```
2793 {
2794 "policies": {
2795 "Extensions": {
2796 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2797 "Uninstall": ["bad_addon_id@mozilla.org"],
2798 "Locked": ["addon_id@mozilla.org"]
2799 }
2800 }
2801 }
2802 ```
2803 ### ExtensionSettings
2804 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2805
2806 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2807
2808 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2809
2810 The configuration for each extension is another dictionary that can contain the fields documented below.
2811
2812 | Name | Description |
2813 | --- | --- |
2814 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2815 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2816 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2817 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2818 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2819 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2820 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2821 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2822 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2823 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2824 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2825
2826 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2827 **CCK2 Equivalent:** N/A\
2828 **Preferences Affected:** N/A
2829
2830 #### Windows (GPO)
2831 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2832 ```
2833 {
2834 "*": {
2835 "blocked_install_message": "Custom error message.",
2836 "install_sources": ["https://yourwebsite.com/*"],
2837 "installation_mode": "blocked",
2838 "allowed_types": ["extension"]
2839 },
2840 "uBlock0@raymondhill.net": {
2841 "installation_mode": "force_installed",
2842 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2843 },
2844 "https-everywhere@eff.org": {
2845 "installation_mode": "allowed"
2846 }
2847 }
2848 ```
2849 #### Windows (Intune)
2850 OMA-URI:
2851 ```
2852 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2853 ```
2854 Value (string):
2855 ```
2856 <enabled/>
2857 <data id="ExtensionSettings" value='
2858 {
2859 "*": {
2860 "blocked_install_message": "Custom error message.",
2861 "install_sources": ["https://yourwebsite.com/*"],
2862 "installation_mode": "blocked",
2863 "allowed_types": ["extension"]
2864 },
2865 "uBlock0@raymondhill.net": {
2866 "installation_mode": "force_installed",
2867 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2868 },
2869 "https-everywhere@eff.org": {
2870 "installation_mode": "allowed"
2871 }
2872 }'/>
2873 ```
2874 #### macOS
2875 ```
2876 <dict>
2877 <key>ExtensionSettings</key>
2878 <dict>
2879 <key>*</key>
2880 <dict>
2881 <key>blocked_install_message</key>
2882 <string>Custom error message.</string>
2883 <key>install_sources</key>
2884 <array>
2885 <string>"https://yourwebsite.com/*"</string>
2886 </array>
2887 <key>installation_mode</key>
2888 <string>blocked</string>
2889 <key>allowed_types</key>
2890 <array>
2891 <string>extension</string>
2892 </array>
2893 </dict>
2894 <key>uBlock0@raymondhill.net</key>
2895 <dict>
2896 <key>installation_mode</key>
2897 <string>force_installed</string>
2898 <key>install_url</key>
2899 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2900 </dict>
2901 <key>https-everywhere@eff.org</key>
2902 <dict>
2903 <key>installation_mode</key>
2904 <string>allowed</string>
2905 </dict>
2906 </dict>
2907 </dict>
2908 ```
2909 #### policies.json
2910 ```
2911 {
2912 "policies": {
2913 "ExtensionSettings": {
2914 "*": {
2915 "blocked_install_message": "Custom error message.",
2916 "install_sources": ["https://yourwebsite.com/*"],
2917 "installation_mode": "blocked",
2918 "allowed_types": ["extension"]
2919 },
2920 "uBlock0@raymondhill.net": {
2921 "installation_mode": "force_installed",
2922 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2923 },
2924 "https-everywhere@eff.org": {
2925 "installation_mode": "allowed"
2926 }
2927 }
2928 }
2929 }
2930 ```
2931 ### ExtensionUpdate
2932 Control extension updates.
2933
2934 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2935 **CCK2 Equivalent:** N/A\
2936 **Preferences Affected:** `extensions.update.enabled`
2937
2938 #### Windows (GPO)
2939 ```
2940 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2941 ```
2942 #### Windows (Intune)
2943 OMA-URI:
2944 ```
2945 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2946 ```
2947 Value (string):
2948 ```
2949 <enabled/> or <disabled/>
2950 ```
2951 #### macOS
2952 ```
2953 <dict>
2954 <key>ExtensionUpdate</key>
2955 <true/> | <false/>
2956 </dict>
2957 ```
2958 #### policies.json
2959 ```
2960 {
2961 "policies": {
2962 "ExtensionUpdate": true | false
2963 }
2964 }
2965 ```
2966 ### FirefoxHome
2967 Customize the Firefox Home page.
2968
2969 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2970 **CCK2 Equivalent:** N/A\
2971 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2972
2973 #### Windows (GPO)
2974 ```
2975 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2976 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2977 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2978 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2979 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2980 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2981 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2982 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2983 ```
2984 #### Windows (Intune)
2985 OMA-URI:
2986 ```
2987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2988 ```
2989 Value (string):
2990 ```
2991 <enabled/>
2992 <data id="FirefoxHome_Search" value="true | false"/>
2993 <data id="FirefoxHome_TopSites" value="true | false"/>
2994 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
2995 <data id="FirefoxHome_Highlights" value="true | false"/>
2996 <data id="FirefoxHome_Pocket" value="true | false"/>
2997 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
2998 <data id="FirefoxHome_Snippets" value="true | false"/>
2999 <data id="FirefoxHome_Locked" value="true | false"/>
3000 ```
3001 #### macOS
3002 ```
3003 <dict>
3004 <key>FirefoxHome</key>
3005 <dict>
3006 <key>Search</key>
3007 <true/> | <false/>
3008 <key>TopSites</key>
3009 <true/> | <false/>
3010 <key>SponsoredTopSites</key>
3011 <true/> | <false/>
3012 <key>Highlights</key>
3013 <true/> | <false/>
3014 <key>Pocket</key>
3015 <true/> | <false/>
3016 <key>SponsoredPocket</key>
3017 <true/> | <false/>
3018 <key>Snippets</key>
3019 <true/> | <false/>
3020 <key>Locked</key>
3021 <true/> | <false/>
3022 </dict>
3023 </dict>
3024 ```
3025 #### policies.json
3026 ```
3027 {
3028 "policies": {
3029 "FirefoxHome": {
3030 "Search": true | false,
3031 "TopSites": true | false,
3032 "SponsoredTopSites": true | false,
3033 "Highlights": true | false,
3034 "Pocket": true | false,
3035 "SponsoredPocket": true | false,
3036 "Snippets": true | false,
3037 "Locked": true | false
3038 }
3039 }
3040 }
3041 ```
3042 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3043 Whether to always go through the DNS server before sending a single word search string to a search engine.
3044
3045 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3046
3047 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3048
3049 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3050
3051 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3052
3053 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3054
3055 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3056 **CCK2 Equivalent:** `N/A`\
3057 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3058
3059 #### Windows (GPO)
3060 ```
3061 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3062 ```
3063 #### Windows (Intune)
3064 OMA-URI:
3065 ```
3066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3067 ```
3068 Value (string):
3069 ```
3070 <enabled/> or <disabled/>
3071 ```
3072 #### macOS
3073 ```
3074 <dict>
3075 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3076 <true/> | <false/>
3077 </dict>
3078 ```
3079 #### policies.json
3080 ```
3081 {
3082 "policies": {
3083 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3084 }
3085 }
3086 ```
3087 ### Handlers
3088 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3089
3090 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3091
3092 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3093
3094 | Name | Description |
3095 | --- | --- |
3096 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3097 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3098 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3099 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3100 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3101 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3102
3103 **Compatibility:** Firefox 78, Firefox ESR 78\
3104 **CCK2 Equivalent:** N/A\
3105 **Preferences Affected:** N/A
3106
3107 #### Windows (GPO)
3108 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3109 ```
3110 {
3111 "mimeTypes": {
3112 "application/msword": {
3113 "action": "useSystemDefault",
3114 "ask": true | false
3115 }
3116 },
3117 "schemes": {
3118 "mailto": {
3119 "action": "useHelperApp",
3120 "ask": true | false,
3121 "handlers": [{
3122 "name": "Gmail",
3123 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3124 }]
3125 }
3126 },
3127 "extensions": {
3128 "pdf": {
3129 "action": "useHelperApp",
3130 "ask": true | false,
3131 "handlers": [{
3132 "name": "Adobe Acrobat",
3133 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3134 }]
3135 }
3136 }
3137 }
3138 ```
3139 #### Windows (Intune)
3140 OMA-URI:
3141 ```
3142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3143 ```
3144 Value (string):
3145 ```
3146 <enabled/>
3147 <data id="Handlers" value='
3148 {
3149 "mimeTypes": {
3150 "application/msword": {
3151 "action": "useSystemDefault",
3152 "ask": true | false
3153 }
3154 },
3155 "schemes": {
3156 "mailto": {
3157 "action": "useHelperApp",
3158 "ask": true | false,
3159 "handlers": [{
3160 "name": "Gmail",
3161 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3162 }]
3163 }
3164 },
3165 "extensions": {
3166 "pdf": {
3167 "action": "useHelperApp",
3168 "ask": true | false,
3169 "handlers": [{
3170 "name": "Adobe Acrobat",
3171 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3172 }]
3173 }
3174 }
3175 }
3176 '/>
3177 ```
3178 #### macOS
3179 ```
3180 <dict>
3181 <key>Handlers</key>
3182 <dict>
3183 <key>mimeTypes</key>
3184 <dict>
3185 <key>application/msword</key>
3186 <dict>
3187 <key>action</key>
3188 <string>useSystemDefault</string>
3189 <key>ask</key>
3190 <true/> | <false/>
3191 </dict>
3192 </dict>
3193 <key>schemes</key>
3194 <dict>
3195 <key>mailto</key>
3196 <dict>
3197 <key>action</key>
3198 <string>useHelperApp</string>
3199 <key>ask</key>
3200 <true/> | <false/>
3201 <key>handlers</key>
3202 <array>
3203 <dict>
3204 <key>name</key>
3205 <string>Gmail</string>
3206 <key>uriTemplate</key>
3207 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3208 </dict>
3209 </array>
3210 </dict>
3211 </dict>
3212 <key>extensions</key>
3213 <dict>
3214 <key>pdf</key>
3215 <dict>
3216 <key>action</key>
3217 <string>useHelperApp</string>
3218 <key>ask</key>
3219 <true/> | <false/>
3220 <key>handlers</key>
3221 <array>
3222 <dict>
3223 <key>name</key>
3224 <string>Adobe Acrobat</string>
3225 <key>path</key>
3226 <string>/System/Applications/Preview.app</string>
3227 </dict>
3228 </array>
3229 </dict>
3230 </dict>
3231 </dict>
3232 </dict>
3233 ```
3234 #### policies.json
3235 ```
3236 {
3237 "policies": {
3238 "Handlers": {
3239 "mimeTypes": {
3240 "application/msword": {
3241 "action": "useSystemDefault",
3242 "ask": false
3243 }
3244 },
3245 "schemes": {
3246 "mailto": {
3247 "action": "useHelperApp",
3248 "ask": true | false,
3249 "handlers": [{
3250 "name": "Gmail",
3251 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3252 }]
3253 }
3254 },
3255 "extensions": {
3256 "pdf": {
3257 "action": "useHelperApp",
3258 "ask": true | false,
3259 "handlers": [{
3260 "name": "Adobe Acrobat",
3261 "path": "/usr/bin/acroread"
3262 }]
3263 }
3264 }
3265 }
3266 }
3267 }
3268 ```
3269 ### HardwareAcceleration
3270 Control hardware acceleration.
3271
3272 **Compatibility:** Firefox 60, Firefox ESR 60\
3273 **CCK2 Equivalent:** N/A\
3274 **Preferences Affected:** `layers.acceleration.disabled`
3275
3276 #### Windows (GPO)
3277 ```
3278 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3279 ```
3280 #### Windows (Intune)
3281 OMA-URI:
3282 ```
3283 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3284 ```
3285 Value (string):
3286 ```
3287 <enabled/> or <disabled/>
3288 ```
3289 #### macOS
3290 ```
3291 <dict>
3292 <key>HardwareAcceleration</key>
3293 <true/> | <false/>
3294 </dict>
3295 ```
3296 #### policies.json
3297 ```
3298 {
3299 "policies": {
3300 "HardwareAcceleration": true | false
3301 }
3302 }
3303 ```
3304 ### Homepage
3305 Configure the default homepage and how Firefox starts.
3306
3307 `URL` is the default homepage.
3308
3309 `Locked` prevents the user from changing homepage preferences.
3310
3311 `Additional` allows for more than one homepage.
3312
3313 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3314
3315 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3316
3317 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3318 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3319 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3320
3321 #### Windows (GPO)
3322 ```
3323 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3324 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3325 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3326 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3327 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3328 ```
3329 #### Windows (Intune)
3330 OMA-URI:
3331 ```
3332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3333 ```
3334 Value (string):
3335 ```
3336 <enabled/>
3337
3338 <data id="HomepageURL" value="https://example.com"/>
3339 <data id="HomepageLocked" value="true | false"/>
3340 ```
3341 OMA-URI:
3342 ```
3343 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3344 ```
3345 Value (string):
3346 ```
3347 <enabled/>
3348
3349 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3350 ```
3351 OMA-URI:
3352 ```
3353 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3354 ```
3355 Value (string):
3356 ```
3357 <enabled/>
3358
3359 <data id="StartPage" value="none | homepage | previous-session"/>
3360 ```
3361 #### macOS
3362 ```
3363 <dict>
3364 <key>Homepage</key>
3365 <dict>
3366 <key>URL</key>
3367 <string>http://example.com</string>
3368 <key>Locked</key>
3369 <true/> | <false/>
3370 <key>Additional</key>
3371 <array>
3372 <string>http://example.org</string>
3373 <string>http://example.edu</string>
3374 </array>
3375 <key>StartPage</key>
3376 <string>none | homepage | previous-session | homepage-locked</string>
3377 </dict>
3378 </dict>
3379 ```
3380 #### policies.json
3381 ```
3382 {
3383 "policies": {
3384 "Homepage": {
3385 "URL": "http://example.com/",
3386 "Locked": true | false,
3387 "Additional": ["http://example.org/",
3388 "http://example.edu/"],
3389 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3390 }
3391 }
3392 }
3393 ```
3394 ### InstallAddonsPermission
3395 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3396
3397 `Allow` is a list of origins where extension installs are allowed.
3398
3399 `Default` determines whether or not extension installs are allowed by default.
3400
3401 **Compatibility:** Firefox 60, Firefox ESR 60\
3402 **CCK2 Equivalent:** `permissions.install`\
3403 **Preferences Affected:** `xpinstall.enabled`
3404
3405 #### Windows (GPO)
3406 ```
3407 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3408 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3409 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3410 ```
3411 #### Windows (Intune)
3412 OMA-URI:
3413 ```
3414 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3415 ```
3416 Value (string):
3417 ```
3418 <enabled/>
3419 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3420 ```
3421 OMA-URI:
3422 ```
3423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3424 ```
3425 Value (string):
3426 ```
3427 <enabled/>
3428 ```
3429 #### macOS
3430 ```
3431 <dict>
3432 <key>InstallAddonsPermission</key>
3433 <dict>
3434 <key>Allow</key>
3435 <array>
3436 <string>http://example.org</string>
3437 <string>http://example.edu</string>
3438 </array>
3439 <key>Default</key>
3440 <true/> | <false/>
3441 </dict>
3442 </dict>
3443 ```
3444 #### policies.json
3445 ```
3446 {
3447 "policies": {
3448 "InstallAddonsPermission": {
3449 "Allow": ["http://example.org/",
3450 "http://example.edu/"],
3451 "Default": true | false
3452 }
3453 }
3454 }
3455 ```
3456 ### LegacyProfiles
3457 Disable the feature enforcing a separate profile for each installation.
3458
3459 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3460
3461 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3462
3463 This policy only work on Windows via GPO (not policies.json).
3464
3465 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3466 **CCK2 Equivalent:** N/A\
3467 **Preferences Affected:** N/A
3468
3469 #### Windows (GPO)
3470 ```
3471 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3472 ```
3473 #### Windows (Intune)
3474 OMA-URI:
3475 ```
3476 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3477 ```
3478 Value (string):
3479 ```
3480 <enabled/> or <disabled/>
3481 ```
3482 ### LegacySameSiteCookieBehaviorEnabled
3483 Enable default legacy SameSite cookie behavior setting.
3484
3485 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3486
3487 **Compatibility:** Firefox 96\
3488 **CCK2 Equivalent:** N/A\
3489 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3490
3491 #### Windows (GPO)
3492 ```
3493 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3494 ```
3495 #### Windows (Intune)
3496 OMA-URI:
3497 ```
3498 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3499 ```
3500 Value (string):
3501 ```
3502 <enabled/> or <disabled/>
3503 ```
3504 #### macOS
3505 ```
3506 <dict>
3507 <key>LegacySameSiteCookieBehaviorEnabled</key>
3508 <true/> | <false/>
3509 </dict>
3510 ```
3511 #### policies.json
3512 ```
3513 {
3514 "policies": {
3515 "LegacySameSiteCookieBehaviorEnabled": true | false
3516 }
3517 ```
3518 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3519 Revert to legacy SameSite behavior for cookies on specified sites.
3520
3521 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3522
3523 **Compatibility:** Firefox 96\
3524 **CCK2 Equivalent:** N/A\
3525 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3526
3527 #### Windows (GPO)
3528 ```
3529 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3530 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3531 ```
3532 #### Windows (Intune)
3533 OMA-URI:
3534 ```
3535 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3536 ```
3537 Value (string):
3538 ```
3539 <enabled/>
3540 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3541 ```
3542 #### macOS
3543 ```
3544 <dict>
3545 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3546 <array>
3547 <string>example.org</string>
3548 <string>example.edu</string>
3549 </array>
3550 </dict>
3551 ```
3552 #### policies.json
3553 ```
3554 {
3555 "policies": {
3556 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3557 "example.edu"]
3558 }
3559 }
3560 ```
3561 ### LocalFileLinks
3562 Enable linking to local files by origin.
3563
3564 **Compatibility:** Firefox 68, Firefox ESR 68\
3565 **CCK2 Equivalent:** N/A\
3566 **Preferences Affected:** `capability.policy.localfilelinks.*`
3567
3568 #### Windows (GPO)
3569 ```
3570 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3571 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3572 ```
3573 #### Windows (Intune)
3574 OMA-URI:
3575 ```
3576 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3577 ```
3578 Value (string):
3579 ```
3580 <enabled/>
3581 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3582 ```
3583 #### macOS
3584 ```
3585 <dict>
3586 <key>LocalFileLinks</key>
3587 <array>
3588 <string>http://example.org</string>
3589 <string>http://example.edu</string>
3590 </array>
3591 </dict>
3592 ```
3593 #### policies.json
3594 ```
3595 {
3596 "policies": {
3597 "LocalFileLinks": ["http://example.org/",
3598 "http://example.edu/"]
3599 }
3600 }
3601 ```
3602 ### ManagedBookmarks
3603 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3604
3605 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3606
3607 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3608 ```
3609 {
3610 "items": {
3611 "id": "BookmarkType",
3612 "properties": {
3613 "children": {
3614 "items": {
3615 "$ref": "BookmarkType"
3616 },
3617 "type": "array"
3618 },
3619 "name": {
3620 "type": "string"
3621 },
3622 "toplevel_name": {
3623 "type": "string"
3624 },
3625 "url": {
3626 "type": "string"
3627 }
3628 },
3629 "type": "object"
3630 },
3631 "type": "array"
3632 }
3633 ```
3634 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3635 **CCK2 Equivalent:** N/A\
3636 **Preferences Affected:** N/A
3637
3638 #### Windows (GPO)
3639 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3640 ```
3641 [
3642 {
3643 "toplevel_name": "My managed bookmarks folder"
3644 },
3645 {
3646 "url": "example.com",
3647 "name": "Example"
3648 },
3649 {
3650 "name": "Mozilla links",
3651 "children": [
3652 {
3653 "url": "https://mozilla.org",
3654 "name": "Mozilla.org"
3655 },
3656 {
3657 "url": "https://support.mozilla.org/",
3658 "name": "SUMO"
3659 }
3660 ]
3661 }
3662 ]
3663 ```
3664 #### Windows (Intune)
3665 OMA-URI:
3666 ```
3667 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3668 ```
3669 Value (string):
3670 ```
3671 <enabled/>
3672 <data id="JSON" value='
3673 [
3674 {
3675 "toplevel_name": "My managed bookmarks folder"
3676 },
3677 {
3678 "url": "example.com",
3679 "name": "Example"
3680 },
3681 {
3682 "name": "Mozilla links",
3683 "children": [
3684 {
3685 "url": "https://mozilla.org",
3686 "name": "Mozilla.org"
3687 },
3688 {
3689 "url": "https://support.mozilla.org/",
3690 "name": "SUMO"
3691 }
3692 ]
3693 }
3694 ]'/>
3695 ```
3696 #### macOS
3697 ```
3698 <dict>
3699 <key>ManagedBookmarks</key>
3700 <array>
3701 <dict>
3702 <key>toplevel_name</key>
3703 <string>My managed bookmarks folder</string>
3704 <dict>
3705 <key>url</key>
3706 <string>example.com</string>
3707 <key>name</key>
3708 <string>Example</string>
3709 </dict>
3710 <dict>
3711 <key>name</key>
3712 <string>Mozilla links</string>
3713 <key>children</key>
3714 <array>
3715 <dict>
3716 <key>url</key>
3717 <string>https://mozilla.org</string>
3718 <key>name</key>
3719 <string>Mozilla</string>
3720 </dict>
3721 <dict>
3722 <key>url</key>
3723 <string>https://support.mozilla.org/</string>
3724 <key>name</key>
3725 <string>SUMO</string>
3726 </dict>
3727 </array>
3728 </dict>
3729 </array>
3730 </dict>
3731 ```
3732 #### policies.json
3733 ```
3734 {
3735 "policies": {
3736 "ManagedBookmarks": [
3737 {
3738 "toplevel_name": "My managed bookmarks folder"
3739 },
3740 {
3741 "url": "example.com",
3742 "name": "Example"
3743 },
3744 {
3745 "name": "Mozilla links",
3746 "children": [
3747 {
3748 "url": "https://mozilla.org",
3749 "name": "Mozilla.org"
3750 },
3751 {
3752 "url": "https://support.mozilla.org/",
3753 "name": "SUMO"
3754 }
3755 ]
3756 }
3757 ]
3758 }
3759 }
3760 ```
3761 ### ManualAppUpdateOnly
3762
3763 Switch to manual updates only.
3764
3765 If this policy is enabled:
3766 1. The user will never be prompted to install updates
3767 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3768 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3769
3770 This policy is primarily intended for advanced end users, not for enterprises.
3771
3772 **Compatibility:** Firefox 87\
3773 **CCK2 Equivalent:** N/A\
3774 **Preferences Affected:** N/A
3775
3776 #### policies.json
3777 ```
3778 {
3779 "policies": {
3780 "ManualAppUpdateOnly": true | false
3781 }
3782 }
3783 ```
3784 ### NetworkPrediction
3785 Enable or disable network prediction (DNS prefetching).
3786
3787 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3788 **CCK2 Equivalent:** N/A\
3789 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3790
3791 #### Windows (GPO)
3792 ```
3793 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3794 ```
3795 #### Windows (Intune)
3796 OMA-URI:
3797 ```
3798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3799 ```
3800 Value (string):
3801 ```
3802 <enabled/> or <disabled/>
3803 ```
3804 #### macOS
3805 ```
3806 <dict>
3807 <key>NetworkPrediction</key>
3808 <true/> | <false/>
3809 </dict>
3810 ```
3811 #### policies.json
3812 ```
3813 {
3814 "policies": {
3815 "NetworkPrediction": true | false
3816 }
3817 ```
3818 ### NewTabPage
3819 Enable or disable the New Tab page.
3820
3821 **Compatibility:** Firefox 68, Firefox ESR 68\
3822 **CCK2 Equivalent:** N/A\
3823 **Preferences Affected:** `browser.newtabpage.enabled`
3824
3825 #### Windows (GPO)
3826 ```
3827 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3828 ```
3829 #### Windows (Intune)
3830 OMA-URI:
3831 ```
3832 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3833 ```
3834 Value (string):
3835 ```
3836 <enabled/> or <disabled/>
3837 ```
3838 #### macOS
3839 ```
3840 <dict>
3841 <key>NewTabPage</key>
3842 <true/> | <false/>
3843 </dict>
3844 ```
3845 #### policies.json
3846 ```
3847 {
3848 "policies": {
3849 "NewTabPage": true | false
3850 }
3851 ```
3852 ### NoDefaultBookmarks
3853 Disable the creation of default bookmarks.
3854
3855 This policy is only effective if the user profile has not been created yet.
3856
3857 **Compatibility:** Firefox 60, Firefox ESR 60\
3858 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3859 **Preferences Affected:** N/A
3860
3861 #### Windows (GPO)
3862 ```
3863 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3864 ```
3865 #### Windows (Intune)
3866 OMA-URI:
3867 ```
3868 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3869 ```
3870 Value (string):
3871 ```
3872 <enabled/> or <disabled/>
3873 ```
3874 #### macOS
3875 ```
3876 <dict>
3877 <key>NoDefaultBookmarks</key>
3878 <true/> | <false/>
3879 </dict>
3880 ```
3881 #### policies.json
3882 ```
3883 {
3884 "policies": {
3885 "NoDefaultBookmarks": true | false
3886 }
3887 }
3888 ```
3889 ### OfferToSaveLogins
3890 Control whether or not Firefox offers to save passwords.
3891
3892 **Compatibility:** Firefox 60, Firefox ESR 60\
3893 **CCK2 Equivalent:** `dontRememberPasswords`\
3894 **Preferences Affected:** `signon.rememberSignons`
3895
3896 #### Windows (GPO)
3897 ```
3898 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3899 ```
3900 #### Windows (Intune)
3901 OMA-URI:
3902 ```
3903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3904 ```
3905 Value (string):
3906 ```
3907 <enabled/> or <disabled/>
3908 ```
3909 #### macOS
3910 ```
3911 <dict>
3912 <key>OfferToSaveLogins</key>
3913 <true/> | <false/>
3914 </dict>
3915 ```
3916 #### policies.json
3917 ```
3918 {
3919 "policies": {
3920 "OfferToSaveLogins": true | false
3921 }
3922 }
3923 ```
3924 ### OfferToSaveLoginsDefault
3925 Sets the default value of signon.rememberSignons without locking it.
3926
3927 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3928 **CCK2 Equivalent:** `dontRememberPasswords`\
3929 **Preferences Affected:** `signon.rememberSignons`
3930
3931 #### Windows (GPO)
3932 ```
3933 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3934 ```
3935 #### Windows (Intune)
3936 OMA-URI:
3937 ```
3938 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3939 ```
3940 Value (string):
3941 ```
3942 <enabled/> or <disabled/>
3943 ```
3944 #### macOS
3945 ```
3946 <dict>
3947 <key>OfferToSaveLoginsDefault</key>
3948 <true/> | <false/>
3949 </dict>
3950 ```
3951 #### policies.json
3952 ```
3953 {
3954 "policies": {
3955 "OfferToSaveLoginsDefault": true | false
3956 }
3957 }
3958 ```
3959 ### OverrideFirstRunPage
3960 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3961
3962 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3963
3964 **Compatibility:** Firefox 60, Firefox ESR 60\
3965 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3966 **Preferences Affected:** `startup.homepage_welcome_url`
3967
3968 #### Windows (GPO)
3969 ```
3970 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3971 ```
3972 #### Windows (Intune)
3973 OMA-URI:
3974 ```
3975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3976 ```
3977 Value (string):
3978 ```
3979 <enabled/>
3980 <data id="OverridePage" value="https://example.com"/>
3981 ```
3982 #### macOS
3983 ```
3984 <dict>
3985 <key>OverrideFirstRunPage</key>
3986 <string>http://example.org</string>
3987 </dict>
3988 ```
3989 #### policies.json
3990 ```
3991 {
3992 "policies": {
3993 "OverrideFirstRunPage": "http://example.org"
3994 }
3995 }
3996 ```
3997 ### OverridePostUpdatePage
3998 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3999
4000 **Compatibility:** Firefox 60, Firefox ESR 60\
4001 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4002 **Preferences Affected:** `startup.homepage_override_url`
4003
4004 #### Windows (GPO)
4005 ```
4006 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4007 ```
4008 #### Windows (Intune)
4009 OMA-URI:
4010 ```
4011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4012 ```
4013 Value (string):
4014 ```
4015 <enabled/>
4016 <data id="OverridePage" value="https://example.com"/>
4017 ```
4018 #### macOS
4019 ```
4020 <dict>
4021 <key>OverridePostUpdatePage</key>
4022 <string>http://example.org</string>
4023 </dict>
4024 ```
4025 #### policies.json
4026 ```
4027 {
4028 "policies": {
4029 "OverridePostUpdatePage": "http://example.org"
4030 }
4031 }
4032 ```
4033 ### PasswordManagerEnabled
4034 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4035
4036 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4037 **CCK2 Equivalent:** N/A\
4038 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4039
4040 #### Windows (GPO)
4041 ```
4042 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4043 ```
4044 #### Windows (Intune)
4045 OMA-URI:
4046 ```
4047 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4048 ```
4049 Value (string):
4050 ```
4051 <enabled/> or <disabled/>
4052 ```
4053 #### macOS
4054 ```
4055 <dict>
4056 <key>PasswordManagerEnabled</key>
4057 <true/> | <false/>
4058 </dict>
4059 ```
4060 #### policies.json
4061 ```
4062 {
4063 "policies": {
4064 "PasswordManagerEnabled": true | false
4065 }
4066 }
4067 ```
4068 ### PasswordManagerExceptions
4069 Prevent Firefox from saving passwords for specific sites.
4070
4071 The sites are specified as a list of origins.
4072
4073 **Compatibility:** Firefox 101\
4074 **CCK2 Equivalent:** N/A\
4075 **Preferences Affected:** N/A
4076
4077 #### Windows (GPO)
4078 ```
4079 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4080 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4081 ```
4082 #### Windows (Intune)
4083 OMA-URI:
4084 ```
4085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4086 ```
4087 Value (string):
4088 ```
4089 <enabled/>
4090 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4091 ```
4092 #### macOS
4093 ```
4094 <dict>
4095 <key>PasswordManagerExceptions</key>
4096 <array>
4097 <string>https://example.org</string>
4098 <string>https://example.edu</string>
4099 </array>
4100 </dict>
4101 ```
4102 #### policies.json
4103 ```
4104 {
4105 "policies": {
4106 "PasswordManagerExceptions": ["https://example.org",
4107 "https://example.edu"]
4108 }
4109 }
4110 ```
4111
4112 ### PDFjs
4113 Disable or configure PDF.js, the built-in PDF viewer.
4114
4115 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4116
4117 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4118
4119 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4120
4121 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4122 **CCK2 Equivalent:** N/A\
4123 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
4124
4125 #### Windows (GPO)
4126 ```
4127 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4128 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4129 ```
4130 #### Windows (Intune)
4131 OMA-URI:
4132 ```
4133 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4135 ```
4136 Value (string):
4137 ```
4138 <enabled/>or <disabled/>
4139 ```
4140 #### macOS
4141 ```
4142 <dict>
4143 <key>PDFjs</key>
4144 <dict>
4145 <key>Enabled</key>
4146 <true/> | <false/>
4147 <key>EnablePermissions</key>
4148 <true/> | <false/>
4149 </dict>
4150 </dict>
4151 ```
4152 #### policies.json
4153 ```
4154 {
4155 "policies": {
4156 "PDFjs": {
4157 "Enabled": true | false,
4158 "EnablePermissions": true | false
4159 }
4160 }
4161 }
4162 ```
4163 ### Permissions
4164 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4165
4166 `Allow` is a list of origins where the feature is allowed.
4167
4168 `Block` is a list of origins where the feature is not allowed.
4169
4170 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4171
4172 `Locked` prevents the user from changing preferences for the feature.
4173
4174 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4175
4176 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4177 **CCK2 Equivalent:** N/A\
4178 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4179
4180 #### Windows (GPO)
4181 ```
4182 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4183 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4184 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4185 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4186 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4187 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4188 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4189 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4190 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4191 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4192 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4193 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4194 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4195 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4196 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4197 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4198 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4199 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4200 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4201 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4202 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4203 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4204 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4205 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4206 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4207 ```
4208 #### Windows (Intune)
4209 OMA-URI:
4210 ```
4211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4212 ```
4213 Value (string):
4214 ```
4215 <enabled/> or <disabled/>
4216 ```
4217 OMA-URI:
4218 ```
4219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4220 ```
4221 Value (string):
4222 ```
4223 <enabled/> or <disabled/>
4224 ```
4225 OMA-URI:
4226 ```
4227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4228 ```
4229 Value (string):
4230 ```
4231 <enabled/>
4232 <data id="Permissions" value="1&#xF000;https://example.org"/>
4233 ```
4234 OMA-URI:
4235 ```
4236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4237 ```
4238 Value (string):
4239 ```
4240 <enabled/> or <disabled/>
4241 ```
4242 OMA-URI:
4243 ```
4244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4245 ```
4246 Value (string):
4247 ```
4248 <enabled/> or <disabled/>
4249 ```
4250 OMA-URI:
4251 ```
4252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4253 ```
4254 Value (string):
4255 ```
4256 <enabled/>
4257 <data id="Permissions" value="1&#xF000;https://example.org"/>
4258 ```
4259 OMA-URI:
4260 ```
4261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4262 ```
4263 Value (string):
4264 ```
4265 <enabled/>
4266 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4267 ```
4268 OMA-URI:
4269 ```
4270 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4271 ```
4272 Value (string):
4273 ```
4274 <enabled/>
4275 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4276 ```
4277 OMA-URI:
4278 ```
4279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4280 ```
4281 Value (string):
4282 ```
4283 <enabled/> or <disabled/>
4284 ```
4285 OMA-URI:
4286 ```
4287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4288 ```
4289 Value (string):
4290 ```
4291 <enabled/>
4292 <data id="Permissions" value="1&#xF000;https://example.org"/>
4293 ```
4294 OMA-URI:
4295 ```
4296 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4297 ```
4298 Value (string):
4299 ```
4300 <enabled/>
4301 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4302 ```
4303 OMA-URI:
4304 ```
4305 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4306 ```
4307 Value (string):
4308 ```
4309 <enabled/> or <disabled/>
4310 ```
4311 OMA-URI:
4312 ```
4313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4314 ```
4315 Value (string):
4316 ```
4317 <enabled/> or <disabled/>
4318 ```
4319 #### macOS
4320 ```
4321 <dict>
4322 <key>Permissions</key>
4323 <dict>
4324 <key>Camera</key>
4325 <dict>
4326 <key>Allow</key>
4327 <array>
4328 <string>https://example.org</string>
4329 <string>https://example.org:1234</string>
4330 </array>
4331 <key>Block</key>
4332 <array>
4333 <string>https://example.edu</string>
4334 </array>
4335 <key>BlockNewRequests</key>
4336 <true/> | <false/>
4337 <key>Locked</key>
4338 <true/> | <false/>
4339 </dict>
4340 <key>Microphone</key>
4341 <dict>
4342 <key>Allow</key>
4343 <array>
4344 <string>https://example.org</string>
4345 </array>
4346 <key>Block</key>
4347 <array>
4348 <string>https://example.edu</string>
4349 </array>
4350 <key>BlockNewRequests</key>
4351 <true/> | <false/>
4352 <key>Locked</key>
4353 <true/> | <false/>
4354 </dict>
4355 <key>Location</key>
4356 <dict>
4357 <key>Allow</key>
4358 <array>
4359 <string>https://example.org</string>
4360 </array>
4361 <key>Block</key>
4362 <array>
4363 <string>https://example.edu</string>
4364 </array>
4365 <key>BlockNewRequests</key>
4366 <true/> | <false/>
4367 <key>Locked</key>
4368 <true/> | <false/>
4369 </dict>
4370 <key>Notifications</key>
4371 <dict>
4372 <key>Allow</key>
4373 <array>
4374 <string>https://example.org</string>
4375 </array>
4376 <key>Block</key>
4377 <array>
4378 <string>https://example.edu</string>
4379 </array>
4380 <key>BlockNewRequests</key>
4381 <true/>
4382 <key>Locked</key>
4383 <true/>
4384 </dict>
4385 <key>Autoplay</key>
4386 <dict>
4387 <key>Allow</key>
4388 <array>
4389 <string>https://example.org</string>
4390 </array>
4391 <key>Block</key>
4392 <array>
4393 <string>https://example.edu</string>
4394 </array>
4395 <key>Default</key>
4396 <string>allow-audio-video | block-audio | block-audio-video</string>
4397 <key>Locked</key>
4398 <true/> | <false/>
4399 </dict>
4400 </dict>
4401 </dict>
4402 ```
4403 #### policies.json
4404 ```
4405 {
4406 "policies": {
4407 "Permissions": {
4408 "Camera": {
4409 "Allow": ["https://example.org","https://example.org:1234"],
4410 "Block": ["https://example.edu"],
4411 "BlockNewRequests": true | false,
4412 "Locked": true | false
4413 },
4414 "Microphone": {
4415 "Allow": ["https://example.org"],
4416 "Block": ["https://example.edu"],
4417 "BlockNewRequests": true | false,
4418 "Locked": true | false
4419 },
4420 "Location": {
4421 "Allow": ["https://example.org"],
4422 "Block": ["https://example.edu"],
4423 "BlockNewRequests": true | false,
4424 "Locked": true | false
4425 },
4426 "Notifications": {
4427 "Allow": ["https://example.org"],
4428 "Block": ["https://example.edu"],
4429 "BlockNewRequests": true | false,
4430 "Locked": true | false
4431 },
4432 "Autoplay": {
4433 "Allow": ["https://example.org"],
4434 "Block": ["https://example.edu"],
4435 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4436 "Locked": true | false
4437 }
4438 }
4439 }
4440 }
4441 ```
4442 ### PictureInPicture
4443
4444 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4445
4446 **Compatibility:** Firefox 78, Firefox ESR 78\
4447 **CCK2 Equivalent:** N/A\
4448 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4449
4450 #### Windows (GPO)
4451 ```
4452 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4453 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4454
4455 ```
4456 #### Windows (Intune)
4457 OMA-URI:
4458 ```
4459 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4460 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4461 ```
4462 Value (string):
4463 ```
4464 <enabled/> or <disabled/>
4465 ```
4466 #### macOS
4467 ```
4468 <dict>
4469 <key>PictureInPicture</key>
4470 <dict>
4471 <key>Enabled</key>
4472 <true/> | <false/>
4473 <key>Locked</key>
4474 <true/> | <false/>
4475 </dict>
4476 </dict>
4477 ```
4478 #### policies.json
4479 ```
4480 {
4481 "policies": {
4482 "PictureInPicture": {
4483 "Enabled": true | false,
4484 "Locked": true | false
4485 }
4486 }
4487 }
4488 ```
4489 ### PopupBlocking
4490 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4491
4492 `Allow` is a list of origins where popup-windows are allowed.
4493
4494 `Default` determines whether or not pop-up windows are allowed by default.
4495
4496 `Locked` prevents the user from changing pop-up preferences.
4497
4498 **Compatibility:** Firefox 60, Firefox ESR 60\
4499 **CCK2 Equivalent:** `permissions.popup`\
4500 **Preferences Affected:** `dom.disable_open_during_load`
4501
4502 #### Windows (GPO)
4503 ```
4504 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4505 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4506 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4507 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4508 ```
4509 #### Windows (Intune)
4510 OMA-URI:
4511 ```
4512 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4513 ```
4514 Value (string):
4515 ```
4516 <enabled/>
4517 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4518 ```
4519 OMA-URI:
4520 ```
4521 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4522 ```
4523 Value (string):
4524 ```
4525 <enabled/> or <disabled/>
4526 ```
4527 OMA-URI:
4528 ```
4529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4530 ```
4531 Value (string):
4532 ```
4533 <enabled/> or <disabled/>
4534 ```
4535 #### macOS
4536 ```
4537 <dict>
4538 <key>PopupBlocking</key>
4539 <dict>
4540 <key>Allow</key>
4541 <array>
4542 <string>http://example.org</string>
4543 <string>http://example.edu</string>
4544 </array>
4545 <key>Default</key>
4546 <true/> | <false/>
4547 <key>Locked</key>
4548 <true/> | <false/>
4549 </dict>
4550 </dict>
4551 ```
4552 #### policies.json
4553 ```
4554 {
4555 "policies": {
4556 "PopupBlocking": {
4557 "Allow": ["http://example.org/",
4558 "http://example.edu/"],
4559 "Default": true | false,
4560 "Locked": true | false
4561 }
4562 }
4563 }
4564 ```
4565 ### Preferences
4566 Set and lock preferences.
4567
4568 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4569
4570 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4571
4572 Preferences that start with the following prefixes are supported:
4573 ```
4574 accessibility.
4575 app.update.* (Firefox 86, Firefox 78.8)
4576 browser.
4577 datareporting.policy.
4578 dom.
4579 extensions.
4580 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4581 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4582 geo.
4583 gfx.
4584 intl.
4585 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4586 layers.
4587 layout.
4588 media.
4589 network.
4590 pdfjs. (Firefox 84, Firefox ESR 78.6)
4591 places.
4592 print.
4593 signon. (Firefox 83, Firefox ESR 78.5)
4594 spellchecker. (Firefox 84, Firefox ESR 78.6)
4595 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4596 ui.
4597 widget.
4598 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4599 ```
4600 as well as the following security preferences:
4601
4602 | Preference | Type | Default
4603 | --- | --- | --- |
4604 | security.default_personal_cert | string | Ask Every Time
4605 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4606 | security.insecure_connection_text.enabled | bool | false
4607 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4608 | security.insecure_connection_text.pbmode.enabled | bool | false
4609 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4610 | security.mixed_content.block_active_content | boolean | true
4611 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4612 | security.osclientcerts.autoload | boolean | false
4613 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4614 | security.OCSP.enabled | integer | 1
4615 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates
4616 | security.OCSP.require | boolean | false
4617 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4618 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4619 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS (Firefox 114, Firefox ESR 102.12).
4620 | security.ssl.enable_ocsp_stapling | boolean | true
4621 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4622 | security.ssl.errorReporting.enabled | boolean | true
4623 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4624 | security.tls.enable_0rtt_data | boolean | true
4625 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4626 | security.tls.hello_downgrade_check | boolean | true
4627 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4628 | security.tls.version.enable-deprecated | boolean | false
4629 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4630 | security.warn_submit_secure_to_insecure | boolean | true
4631 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4632
4633 Using the preference as the key, set the `Value` to the corresponding preference value.
4634
4635 `Status` can be "default", "locked", "user" or "clear"
4636
4637 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4638 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4639 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4640 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4641
4642 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4643
4644 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4645
4646 See the examples below for more detail.
4647
4648 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4649
4650 Status
4651 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4652 **CCK2 Equivalent:** `preferences`\
4653 **Preferences Affected:** Many
4654
4655 #### Windows (GPO)
4656 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4657 ```
4658 {
4659 "accessibility.force_disabled": {
4660 "Value": 1,
4661 "Status": "default"
4662 },
4663 "browser.cache.disk.parent_directory": {
4664 "Value": "SOME_NATIVE_PATH",
4665 "Status": "user"
4666 },
4667 "browser.tabs.warnOnClose": {
4668 "Value": false,
4669 "Status": "locked"
4670 }
4671 }
4672 ```
4673 #### Windows (Intune)
4674 OMA-URI:
4675 ```
4676 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4677 ```
4678 Value (string):
4679 ```
4680 <enabled/>
4681 <data id="JSON" value='
4682 {
4683 "accessibility.force_disabled": {
4684 "Value": 1,
4685 "Status": "default"
4686 },
4687 "browser.cache.disk.parent_directory": {
4688 "Value": "SOME_NATIVE_PATH",
4689 "Status": "user"
4690 },
4691 "browser.tabs.warnOnClose": {
4692 "Value": false,
4693 "Status": "locked"
4694 }
4695 }'/>
4696 ```
4697 #### macOS
4698 ```
4699 <dict>
4700 <key>Preferences</key>
4701 <dict>
4702 <key>accessibility.force_disabled</key>
4703 <dict>
4704 <key>Value</key>
4705 <integer>1</integer>
4706 <key>Status</key>
4707 <string>default</string>
4708 </dict>
4709 <key>browser.cache.disk.parent_directory</key>
4710 <dict>
4711 <key>Value</key>
4712 <string>SOME_NATIVE_PATH</string>
4713 <key>Status</key>
4714 <string>user</string>
4715 </dict>
4716 <key>browser.tabs.warnOnClose</key>
4717 <dict>
4718 <key>Value</key>
4719 <false/>
4720 <key>Status</key>
4721 <string>locked</string>
4722 </dict>
4723 </dict>
4724 </dict>
4725 ```
4726 #### policies.json
4727 ```
4728 {
4729 "policies": {
4730 "Preferences": {
4731 "accessibility.force_disabled": {
4732 "Value": 1,
4733 "Status": "default"
4734 },
4735 "browser.cache.disk.parent_directory": {
4736 "Value": "SOME_NATIVE_PATH",
4737 "Status": "user"
4738 },
4739 "browser.tabs.warnOnClose": {
4740 "Value": false,
4741 "Status": "locked"
4742 }
4743 }
4744 }
4745 }
4746 ```
4747 ### Preferences (Deprecated)
4748 Set and lock certain preferences.
4749
4750 **Compatibility:** See below\
4751 **CCK2 Equivalent:** `preferences`\
4752 **Preferences Affected:** See below
4753
4754 | Preference | Type | Compatibility | Default
4755 | --- | --- | --- | --- |
4756 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4757 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4758 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4759 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4760 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4761 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4762 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4763 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4764 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4765 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4766 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4767 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4768 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4769 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4770 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4771 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4772 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4773 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4774 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4775 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4776 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4777 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4778 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4779 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4780 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4781 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4782 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true. | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4783 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4784 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4785 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4786 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4787 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4788 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4789 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4790 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4791 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4792 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4793 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4794 disabled
4795 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4796 disabled
4797 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4798 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4799 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4800 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4801 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4802 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4803 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4804 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4805 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4806 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4807 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4808
4809 #### Windows (GPO)
4810 ```
4811 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4812 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4813 ```
4814 #### Windows (Intune)
4815 OMA-URI: (periods are replaced by underscores)
4816 ```
4817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4818 ```
4819 Value (string):
4820 ```
4821 <enabled/> or <disabled/>
4822 ```
4823 OMA-URI: (periods are replaced by underscores)
4824 ```
4825 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4826 ```
4827 Value (string):
4828 ```
4829 <enabled/>
4830 <data id="Preferences_String" value="string_value"/>
4831 ```
4832 #### macOS
4833 ```
4834 <dict>
4835 <key>Preferences</key>
4836 <dict>
4837 <key>boolean_preference_name</key>
4838 <true/> | <false/>
4839 <key>string_preference_name</key>
4840 <string>string_value</string>
4841 </dict>
4842 </dict>
4843 ```
4844 #### policies.json
4845 ```
4846 {
4847 "policies": {
4848 "Preferences": {
4849 "boolean_preference_name": true | false,
4850 "string_preference_name": "string_value"
4851 }
4852 }
4853 }
4854 ```
4855 ### PrimaryPassword
4856 Require or prevent using a primary (formerly master) password.
4857
4858 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4859
4860 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4861
4862 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4863 **CCK2 Equivalent:** `noMasterPassword`\
4864 **Preferences Affected:** N/A
4865
4866 #### Windows (GPO)
4867 ```
4868 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4869 ```
4870 #### Windows (Intune)
4871 OMA-URI:
4872 ```
4873 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4874 ```
4875 Value (string):
4876 ```
4877 <enabled/> or <disabled/>
4878 ```
4879 #### macOS
4880 ```
4881 <dict>
4882 <key>PrimaryPassword</key>
4883 <true/> | <false/>
4884 </dict>
4885 ```
4886 #### policies.json
4887 ```
4888 {
4889 "policies": {
4890 "PrimaryPassword": true | false
4891 }
4892 }
4893 ```
4894 ### PromptForDownloadLocation
4895 Ask where to save each file before downloading.
4896
4897 **Compatibility:** Firefox 68, Firefox ESR 68\
4898 **CCK2 Equivalent:** N/A\
4899 **Preferences Affected:** `browser.download.useDownloadDir`
4900
4901 #### Windows (GPO)
4902 ```
4903 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4904 ```
4905 #### Windows (Intune)
4906 OMA-URI:
4907 ```
4908 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4909 ```
4910 Value (string):
4911 ```
4912 <enabled/> or <disabled/>
4913 ```
4914 #### macOS
4915 ```
4916 <dict>
4917 <key>PromptForDownloadLocation</key>
4918 <true/> | <false/>
4919 </dict>
4920 ```
4921 #### policies.json
4922 ```
4923 {
4924 "policies": {
4925 "PromptForDownloadLocation": true | false
4926 }
4927 }
4928 ```
4929 ### Proxy
4930 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4931 To specify ports, append them to the hostnames with a colon (:).
4932
4933 Unless you lock this policy, changes the user already has in place will take effect.
4934
4935 `Mode` is the proxy method being used.
4936
4937 `Locked` is whether or not proxy settings can be changed.
4938
4939 `HTTPProxy` is the HTTP proxy server.
4940
4941 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4942
4943 `SSLProxy` is the SSL proxy server.
4944
4945 `FTPProxy` is the FTP proxy server.
4946
4947 `SOCKSProxy` is the SOCKS proxy server
4948
4949 `SOCKSVersion` is the SOCKS version (4 or 5)
4950
4951 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4952
4953 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4954
4955 `AutoLogin` means do not prompt for authentication if password is saved.
4956
4957 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4958
4959 **Compatibility:** Firefox 60, Firefox ESR 60\
4960 **CCK2 Equivalent:** `networkProxy*`\
4961 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
4962
4963 #### Windows (GPO)
4964 ```
4965 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4966 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4967 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4968 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4969 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4970 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4971 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4972 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4973 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4974 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4975 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4976 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4977 ```
4978 #### Windows (Intune)
4979 **Note**
4980 These setttings were moved to a category to make them easier to configure via Intune.
4981
4982 OMA-URI:
4983 ```
4984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
4985 ```
4986 Value (string):
4987 ```
4988 <enabled/> or <disabled/>
4989 ```
4990 OMA-URI:
4991 ```
4992 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
4993 ```
4994 Value (string):
4995 ```
4996 <enabled/>
4997 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4998 ```
4999 OMA-URI:
5000 ```
5001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5002 ```
5003 Value (string):
5004 ```
5005 <enabled/>
5006 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5007 ```
5008 OMA-URI:
5009 ```
5010 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5011 ```
5012 Value (string):
5013 ```
5014 <enabled/> or <disabled/>
5015 ```
5016 OMA-URI:
5017 ```
5018 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5019 ```
5020 Value (string):
5021 ```
5022 <enabled/>
5023 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5024 ```
5025 OMA-URI:
5026 ```
5027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5028 ```
5029 Value (string):
5030 ```
5031 <enabled/>
5032 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5033 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5034 ```
5035 OMA-URI:
5036 ```
5037 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5038 ```
5039 Value (string):
5040 ```
5041 <enabled/>
5042 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5043 ```
5044 OMA-URI:
5045 ```
5046 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5047 ```
5048 Value (string):
5049 ```
5050 <enabled/>
5051 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5052 ```
5053 OMA-URI:
5054 ```
5055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5056 ```
5057 Value (string):
5058 ```
5059 <enabled/> or <disabled/>
5060 ```
5061 OMA-URI:
5062 ```
5063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5064 ```
5065 Value (string):
5066 ```
5067 <enabled/> or <disabled/>
5068 ```
5069 OMA-URI (Old way):
5070 ```
5071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5072 ```
5073 Value (string):
5074 ```
5075 <enabled/>
5076 <data id="ProxyLocked" value="true | false"/>
5077 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5078 <data id="HTTPProxy" value="httpproxy.example.com"/>
5079 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5080 <data id="SSLProxy" value="sslproxy.example.com"/>
5081 <data id="FTPProxy" value="ftpproxy.example.com"/>
5082 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5083 <data id="SOCKSVersion" value="4 | 5"/>
5084 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5085 <data id="Passthrough" value="<local>"/>
5086 <data id="AutoLogin" value="true | false"/>
5087 <data id="UseProxyForDNS" value="true | false"/>
5088 ```
5089 #### macOS
5090 ```
5091 <dict>
5092 <key>Proxy</key>
5093 <dict>
5094 <key>Mode</key>
5095 <string>none | system | manual | autoDetect | autoConfig</string>
5096 <key>Locked</key>
5097 <true> | </false>
5098 <key>HTTPProxy</key>
5099 <string>https://httpproxy.example.com</string>
5100 <key>UseHTTPProxyForAllProtocols</key>
5101 <true> | </false>
5102 <key>SSLProxy</key>
5103 <string>https://sslproxy.example.com</string>
5104 <key>FTPProxy</key>
5105 <string>https://ftpproxy.example.com</string>
5106 <key>SOCKSProxy</key>
5107 <string>https://socksproxy.example.com</string>
5108 <key>SOCKSVersion</key>
5109 <string>4 | 5</string>
5110 <key>Passthrough</key>
5111 <string>&lt;local>&gt;</string>
5112 <key>AutoConfigURL</key>
5113 <string>URL_TO_AUTOCONFIG</string>
5114 <key>AutoLogin</key>
5115 <true> | </false>
5116 <key>UseProxyForDNS</key>
5117 <true> | </false>
5118 </dict>
5119 </dict>
5120 ```
5121 #### policies.json
5122 ```
5123 {
5124 "policies": {
5125 "Proxy": {
5126 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5127 "Locked": true | false,
5128 "HTTPProxy": "hostname",
5129 "UseHTTPProxyForAllProtocols": true | false,
5130 "SSLProxy": "hostname",
5131 "FTPProxy": "hostname",
5132 "SOCKSProxy": "hostname",
5133 "SOCKSVersion": 4 | 5,
5134 "Passthrough": "<local>",
5135 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5136 "AutoLogin": true | false,
5137 "UseProxyForDNS": true | false
5138 }
5139 }
5140 }
5141 ```
5142 ### RequestedLocales
5143 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5144
5145 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5146
5147 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5148 **CCK2 Equivalent:** N/A\
5149 **Preferences Affected:** N/A
5150 #### Windows (GPO)
5151 ```
5152 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5153 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5154
5155 or
5156
5157 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5158 ```
5159 #### Windows (Intune)
5160 OMA-URI:
5161 ```
5162 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5163 ```
5164 Value (string):
5165 ```
5166 <enabled/>
5167 <data id="Preferences_String" value="de,en-US"/>
5168 ```
5169 #### macOS
5170 ```
5171 <dict>
5172 <key>RequestedLocales</key>
5173 <array>
5174 <string>de</string>
5175 <string>en-US</string>
5176 </array>
5177 </dict>
5178
5179 or
5180
5181 <dict>
5182 <key>RequestedLocales</key>
5183 <string>de,en-US</string>
5184 </dict>
5185
5186 ```
5187 #### policies.json
5188 ```
5189 {
5190 "policies": {
5191 "RequestedLocales": ["de", "en-US"]
5192 }
5193 }
5194
5195 or
5196
5197 {
5198 "policies": {
5199 "RequestedLocales": "de,en-US"
5200 }
5201 }
5202 ```
5203 <a name="SanitizeOnShutdown"></a>
5204
5205 ### SanitizeOnShutdown (Selective)
5206 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5207
5208 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5209
5210 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5211 **CCK2 Equivalent:** N/A\
5212 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5213 #### Windows (GPO)
5214 ```
5215 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5216 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5217 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5218 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5219 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5220 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5221 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5222 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5223 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5224 ```
5225 #### Windows (Intune)
5226 OMA-URI:
5227 ```
5228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5229 ```
5230 Value (string):
5231 ```
5232 <enabled/> or <disabled/>
5233 ```
5234 OMA-URI:
5235 ```
5236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5237 ```
5238 Value (string):
5239 ```
5240 <enabled/> or <disabled/>
5241 ```
5242 OMA-URI:
5243 ```
5244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5245 ```
5246 Value (string):
5247 ```
5248 <enabled/> or <disabled/>
5249 ```
5250 OMA-URI:
5251 ```
5252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5253 ```
5254 Value (string):
5255 ```
5256 <enabled/> or <disabled/>
5257 ```
5258 OMA-URI:
5259 ```
5260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5261 ```
5262 Value (string):
5263 ```
5264 <enabled/> or <disabled/>
5265 ```
5266 OMA-URI:
5267 ```
5268 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5269 ```
5270 Value (string):
5271 ```
5272 <enabled/> or <disabled/>
5273 ```
5274 OMA-URI:
5275 ```
5276 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5277 ```
5278 Value (string):
5279 ```
5280 <enabled/> or <disabled/>
5281 ```
5282 OMA-URI:
5283 ```
5284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5285 ```
5286 Value (string):
5287 ```
5288 <enabled/> or <disabled/>
5289 ```
5290 OMA-URI:
5291 ```
5292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5293 ```
5294 Value (string):
5295 ```
5296 <enabled/> or <disabled/>
5297 ```
5298 #### macOS
5299 ```
5300 <dict>
5301 <key>SanitizeOnShutdown</key>
5302 <dict>
5303 <key>Cache</key>
5304 <true/> | <false/>
5305 <key>Cookies</key>
5306 <true/> | <false/>
5307 <key>Downloads</key>
5308 <true/> | <false/>
5309 <key>FormData</key>
5310 <true/> | <false/>
5311 <key>History</key>
5312 <true/> | <false/>
5313 <key>Sessions</key>
5314 <true/> | <false/>
5315 <key>SiteSettings</key>
5316 <true/> | <false/>
5317 <key>OfflineApps</key>
5318 <true/> | <false/>
5319 <key>Locked</key>
5320 <true/> | <false/>
5321 </dict>
5322 </dict>
5323 ```
5324 #### policies.json
5325 ```
5326 {
5327 "policies": {
5328 "SanitizeOnShutdown": {
5329 "Cache": true | false,
5330 "Cookies": true | false,
5331 "Downloads": true | false,
5332 "FormData": true | false,
5333 "History": true | false,
5334 "Sessions": true | false,
5335 "SiteSettings": true | false,
5336 "OfflineApps": true | false,
5337 "Locked": true | false
5338 }
5339 }
5340 }
5341 ```
5342 ### SanitizeOnShutdown (All)
5343 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5344
5345 **Compatibility:** Firefox 60, Firefox ESR 60\
5346 **CCK2 Equivalent:** N/A\
5347 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5348 #### Windows (GPO)
5349 ```
5350 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5351 ```
5352 #### Windows (Intune)
5353 OMA-URI:
5354 ```
5355 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5356 ```
5357 Value (string):
5358 ```
5359 <enabled/> or <disabled/>
5360 ```
5361 #### macOS
5362 ```
5363 <dict>
5364 <key>SanitizeOnShutdown</key>
5365 <true/> | <false/>
5366 </dict>
5367 ```
5368 #### policies.json
5369 ```
5370 {
5371 "policies": {
5372 "SanitizeOnShutdown": true | false
5373 }
5374 }
5375 ```
5376 ### SearchBar
5377 Set whether or not search bar is displayed.
5378
5379 **Compatibility:** Firefox 60, Firefox ESR 60\
5380 **CCK2 Equivalent:** `showSearchBar`\
5381 **Preferences Affected:** N/A
5382
5383 #### Windows (GPO)
5384 ```
5385 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5386 ```
5387
5388 #### Windows (Intune)
5389 OMA-URI:
5390 ```
5391 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5392 ```
5393 Value (string):
5394 ```
5395 <enabled/>
5396 <data id="SearchBar" value="unified | separate"/>
5397 ```
5398 #### macOS
5399 ```
5400 <dict>
5401 <key>SearchBar</key>
5402 <string>unified | separate</string>
5403 </dict>
5404 ```
5405 #### policies.json
5406 ```
5407 {
5408 "policies": {
5409 "SearchBar": "unified" | "separate"
5410 }
5411 }
5412 ```
5413 <a name="SearchEngines"></a>
5414
5415 ### SearchEngines (This policy is only available on the ESR.)
5416
5417 ### SearchEngines | Add
5418
5419 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5420
5421 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5422
5423 `Name` is the name of the search engine.
5424
5425 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5426
5427 `Method` is either GET or POST
5428
5429 `IconURL` is a URL for the icon to use.
5430
5431 `Alias` is a keyword to use for the engine.
5432
5433 `Description` is a description of the search engine.
5434
5435 `PostData` is the POST data as name value pairs separated by &.
5436
5437 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5438
5439 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5440
5441 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5442 **CCK2 Equivalent:** `searchplugins`\
5443 **Preferences Affected:** N/A
5444
5445 #### Windows (GPO)
5446 ```
5447 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5448 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5449 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5450 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5451 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5452 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5453 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5454 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5455 ```
5456 #### Windows (Intune)
5457 OMA-URI:
5458 ```
5459 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5460 ```
5461 Value (string):
5462 ```
5463 <enabled/>
5464 <data id="SearchEngine_Name" value="Example1"/>
5465 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5466 <data id="SearchEngine_Method" value="GET | POST"/>
5467 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5468 <data id="SearchEngine_Alias" value="example"/>
5469 <data id="SearchEngine_Description" value="Example Description"/>
5470 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5471 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5472 ```
5473 #### macOS
5474 ```
5475 <dict>
5476 <key>SearchEngines</key>
5477 <dict>
5478 <key>Add</key>
5479 <array>
5480 <dict>
5481 <key>Name</key>
5482 <string>Example1</string>
5483 <key>URLTemplate</key>
5484 <string>https://www.example.org/q={searchTerms}</string>
5485 <key>Method</key>
5486 <string>GET | POST </string>
5487 <key>IconURL</key>
5488 <string>https://www.example.org/favicon.ico</string>
5489 <key>Alias</key>
5490 <string>example</string>
5491 <key>Description</key>
5492 <string>Example Description</string>
5493 <key>SuggestURLTemplate</key>
5494 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5495 <key>PostData</key>
5496 <string>name=value&q={searchTerms}</string>
5497 </dict>
5498 <array>
5499 </dict>
5500 </dict>
5501 ```
5502 #### policies.json
5503 ```
5504 {
5505 "policies": {
5506 "SearchEngines": {
5507 "Add": [
5508 {
5509 "Name": "Example1",
5510 "URLTemplate": "https://www.example.org/q={searchTerms}",
5511 "Method": "GET" | "POST",
5512 "IconURL": "https://www.example.org/favicon.ico",
5513 "Alias": "example",
5514 "Description": "Description",
5515 "PostData": "name=value&q={searchTerms}",
5516 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5517 }
5518 ]
5519 }
5520 }
5521 }
5522 ```
5523 ### SearchEngines | Default
5524
5525 Set the default search engine. This policy is only available on the ESR.
5526
5527 **Compatibility:** Firefox ESR 60\
5528 **CCK2 Equivalent:** `defaultSearchEngine`\
5529 **Preferences Affected:** N/A
5530
5531 #### Windows (GPO)
5532 ```
5533 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5534 ```
5535 #### Windows (Intune)
5536 OMA-URI:
5537 ```
5538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5539 ```
5540 Value (string):
5541 ```
5542 <enabled/>
5543 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5544 ```
5545 #### macOS
5546 ```
5547 <dict>
5548 <key>SearchEngines</key>
5549 <dict>
5550 <key>Default</key>
5551 <string>NAME_OF_SEARCH_ENGINE</string>
5552 </dict>
5553 </dict>
5554 ```
5555 #### policies.json
5556 ```
5557 {
5558 "policies": {
5559 "SearchEngines": {
5560 "Default": "NAME_OF_SEARCH_ENGINE"
5561 }
5562 }
5563 }
5564 ```
5565 ### SearchEngines | PreventInstalls
5566
5567 Prevent installing search engines from webpages.
5568
5569 **Compatibility:** Firefox ESR 60\
5570 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5571 **Preferences Affected:** N/A
5572
5573 #### Windows (GPO)
5574 ```
5575 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5576 ```
5577 #### Windows (Intune)
5578 OMA-URI:
5579 ```
5580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5581 ```
5582 Value (string):
5583 ```
5584 <enabled/> or <disabled/>
5585 ```
5586 #### macOS
5587 ```
5588 <dict>
5589 <key>SearchEngines</key>
5590 <dict>
5591 <key>PreventInstalls</key>
5592 <true/> | <false/>
5593 </dict>
5594 </dict>
5595 ```
5596 #### policies.json
5597 ```
5598 {
5599 "policies": {
5600 "SearchEngines": {
5601 "PreventInstalls": true | false
5602 }
5603 }
5604 }
5605 ```
5606 ### SearchEngines | Remove
5607
5608 Hide built-in search engines. This policy is only available on the ESR.
5609
5610 **Compatibility:** Firefox ESR 60.2\
5611 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5612 **Preferences Affected:** N/A
5613
5614 #### Windows (GPO)
5615 ```
5616 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5617 ```
5618 #### Windows (Intune)
5619 OMA-URI:
5620 ```
5621 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5622 ```
5623 Value (string):
5624 ```
5625 <enabled/>
5626 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5627 ```
5628 #### macOS
5629 ```
5630 <dict>
5631 <key>SearchEngines</key>
5632 <dict>
5633 <key>Remove</key>
5634 <array>
5635 <string>NAME_OF_SEARCH_ENGINE</string>
5636 </array>
5637 </dict>
5638 </dict>
5639 ```
5640 #### policies.json
5641 ```
5642 {
5643 "policies": {
5644 "SearchEngines": {
5645 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5646 }
5647 }
5648 }
5649 ```
5650 ### SearchSuggestEnabled
5651
5652 Enable search suggestions.
5653
5654 **Compatibility:** Firefox 68, Firefox ESR 68\
5655 **CCK2 Equivalent:** N/A\
5656 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5657
5658 #### Windows (GPO)
5659 ```
5660 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5661 ```
5662 #### Windows (Intune)
5663 OMA-URI:
5664 ```
5665 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5666 ```
5667 Value (string):
5668 ```
5669 <enabled/> or <disabled/>
5670 ```
5671 #### macOS
5672 ```
5673 <dict>
5674 <key>SearchSuggestEnabled</key>
5675 <true/> | <false/>
5676 </dict>
5677 ```
5678 #### policies.json
5679 ```
5680 {
5681 "policies": {
5682 "SearchSuggestEnabled": true | false
5683 }
5684 }
5685 ```
5686 ### SecurityDevices
5687
5688 Add or delete PKCS #11 modules.
5689
5690 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5691 **CCK2 Equivalent:** N/A\
5692 **Preferences Affected:** N/A
5693
5694 #### Windows (GPO)
5695 ```
5696 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5697 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5698 ```
5699 #### Windows (Intune)
5700 OMA-URI:
5701 ```
5702 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5703 ```
5704 Value (string):
5705 ```
5706 <enabled/>
5707 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5708 ```
5709 OMA-URI:
5710 ```
5711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5712 ```
5713 Value (string):
5714 ```
5715 <enabled/>
5716 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5717 ```
5718 #### macOS
5719 ```
5720 <dict>
5721 <key>SecurityDevices</key>
5722 <dict>
5723 <key>Add<key>
5724 <dict>
5725 <key>NAME_OF_DEVICE_TO_ADD</key>
5726 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5727 </dict>
5728 <key>Delete</add>
5729 <array>
5730 <string>NAME_OF_DEVICE_TO_DELETE</string>
5731 </array>
5732 </dict>
5733 </dict>
5734 ```
5735 #### policies.json
5736 ```
5737 {
5738 "policies": {
5739 "SecurityDevices": {
5740 "Add": {
5741 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5742 },
5743 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5744 }
5745 }
5746 }
5747 ```
5748 ### SecurityDevices (Deprecated)
5749
5750 Install PKCS #11 modules.
5751
5752 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5753 **CCK2 Equivalent:** `certs.devices`\
5754 **Preferences Affected:** N/A
5755
5756 #### Windows (GPO)
5757 ```
5758 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5759 ```
5760 #### Windows (Intune)
5761 OMA-URI:
5762 ```
5763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5764 ```
5765 Value (string):
5766 ```
5767 <enabled/>
5768 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5769 ```
5770 #### macOS
5771 ```
5772 <dict>
5773 <key>SecurityDevices</key>
5774 <dict>
5775 <key>NAME_OF_DEVICE</key>
5776 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5777 </dict>
5778 </dict>
5779 ```
5780 #### policies.json
5781 ```
5782 {
5783 "policies": {
5784 "SecurityDevices": {
5785 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5786 }
5787 }
5788 }
5789 ```
5790 ### ShowHomeButton
5791 Show the home button on the toolbar.
5792
5793 Future versions of Firefox will not show the home button by default.
5794
5795 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5796 **CCK2 Equivalent:** N/A\
5797 **Preferences Affected:** N/A
5798
5799 #### Windows (GPO)
5800 ```
5801 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5802 ```
5803 #### Windows (Intune)
5804 OMA-URI:
5805 ```
5806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5807 ```
5808 Value (string):
5809 ```
5810 <enabled/> or <disabled/>
5811 ```
5812 #### macOS
5813 ```
5814 <dict>
5815 <key>ShowHomeButton</key>
5816 <true/> | <false/>
5817 </dict>
5818 ```
5819 #### policies.json
5820 ```
5821 {
5822 "policies": {
5823 "ShowHomeButton": true | false
5824 }
5825 }
5826 ```
5827 ### SSLVersionMax
5828
5829 Set and lock the maximum version of TLS.
5830
5831 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5832 **CCK2 Equivalent:** N/A\
5833 **Preferences Affected:** `security.tls.version.max`
5834
5835 #### Windows (GPO)
5836 ```
5837 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5838 ```
5839 #### Windows (Intune)
5840 OMA-URI:
5841 ```
5842 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5843 ```
5844 Value (string):
5845 ```
5846 <enabled/>
5847 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5848 ```
5849 #### macOS
5850 ```
5851 <dict>
5852 <key>SSLVersionMax</key>
5853 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5854 </dict>
5855 ```
5856
5857 #### policies.json
5858 ```
5859 {
5860 "policies": {
5861 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5862 }
5863 }
5864 ```
5865 ### SSLVersionMin
5866
5867 Set and lock the minimum version of TLS.
5868
5869 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5870 **CCK2 Equivalent:** N/A\
5871 **Preferences Affected:** `security.tls.version.min`
5872
5873 #### Windows (GPO)
5874 ```
5875 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5876 ```
5877 #### Windows (Intune)
5878 OMA-URI:
5879 ```
5880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5881 ```
5882 Value (string):
5883 ```
5884 <enabled/>
5885 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5886 ```
5887 #### macOS
5888 ```
5889 <dict>
5890 <key>SSLVersionMin</key>
5891 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5892 </dict>
5893 ```
5894
5895 #### policies.json
5896 ```
5897 {
5898 "policies": {
5899 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5900 }
5901 }
5902 ```
5903 ### SupportMenu
5904 Add a menuitem to the help menu for specifying support information.
5905
5906 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5907 **CCK2 Equivalent:** helpMenu\
5908 **Preferences Affected:** N/A
5909
5910 #### Windows (GPO)
5911 ```
5912 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5913 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5914 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5915 ```
5916 #### Windows (Intune)
5917 OMA-URI:
5918 ```
5919 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5920 ```
5921 Value (string):
5922 ```
5923 <enabled/>
5924 <data id="SupportMenuTitle" value="Support Menu"/>
5925 <data id="SupportMenuURL" value="http://example.com/support"/>
5926 <data id="SupportMenuAccessKey" value="S"/>
5927 ```
5928 #### macOS
5929 ```
5930 <dict>
5931 <key>SupportMenu</key>
5932 <dict>
5933 <key>Title</key>
5934 <string>SupportMenu</string>
5935 <key>URL</key>
5936 <string>http://example.com/support</string>
5937 <key>AccessKey</key>
5938 <string>S</string>
5939 </dict>
5940 </dict>
5941 ```
5942 #### policies.json
5943 ```
5944 {
5945 "policies": {
5946 "SupportMenu": {
5947 "Title": "Support Menu",
5948 "URL": "http://example.com/support",
5949 "AccessKey": "S"
5950 }
5951 }
5952 }
5953 ```
5954 ### StartDownloadsInTempDirectory
5955 Force downloads to start off in a local, temporary location rather than the default download directory.
5956
5957 **Compatibility:** Firefox 102\
5958 **CCK2 Equivalent:** N/A\
5959 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
5960
5961 #### Windows (GPO)
5962 ```
5963 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
5964 ```
5965 #### Windows (Intune)
5966 OMA-URI:
5967 ```
5968 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
5969 ```
5970 Value (string):
5971 ```
5972 <enabled/> or <disabled/>
5973 ```
5974 #### macOS
5975 ```
5976 <dict>
5977 <key>StartDownloadsInTempDirectory</key>
5978 <true/> | <false/>
5979 </dict>
5980 ```
5981 #### policies.json
5982 ```
5983 {
5984 "policies": {
5985 "StartDownloadsInTempDirectory": true | false
5986 }
5987 ```
5988 ### UserMessaging
5989
5990 Prevent Firefox from messaging the user in certain situations.
5991
5992 `WhatsNew` Remove the "What's New" icon and menuitem.
5993
5994 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5995
5996 `FeatureRecommendations` If false, don't recommend browser features.
5997
5998 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5999
6000 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6001
6002 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6003
6004 `Locked` prevents the user from changing user messaging preferences.
6005
6006 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6007 **CCK2 Equivalent:** N/A\
6008 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6009
6010 #### Windows (GPO)
6011 ```
6012 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
6013 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6014 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6015 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6016 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6017 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6018 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6019 ```
6020 #### Windows (Intune)
6021 OMA-URI:
6022 ```
6023 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
6024 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6026 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6028 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6030 ```
6031 Value (string):
6032 ```
6033 <enabled/> or <disabled/>
6034 ```
6035 #### macOS
6036 ```
6037 <dict>
6038 <key>UserMessaging</key>
6039 <dict>
6040 <key>WhatsNew</key>
6041 <true/> | <false/>
6042 <key>ExtensionRecommendations</key>
6043 <true/> | <false/>
6044 <key>FeatureRecommendations</key>
6045 <true/> | <false/>
6046 <key>UrlbarInterventions</key>
6047 <true/> | <false/>
6048 <key>SkipOnboarding</key>
6049 <true/> | <false/>
6050 <key>MoreFromMozilla</key>
6051 <true/> | <false/>
6052 <key>Locked</key>
6053 <true/> | <false/>
6054 </dict>
6055 </dict>
6056 ```
6057 #### policies.json
6058 ```
6059 {
6060 "policies": {
6061 "UserMessaging": {
6062 "WhatsNew": true | false,
6063 "ExtensionRecommendations": true | false,
6064 "FeatureRecommendations": true | false,
6065 "UrlbarInterventions": true | false,
6066 "SkipOnboarding": true | false,
6067 "MoreFromMozilla": true | false,
6068 "Locked": true | false
6069 }
6070 }
6071 }
6072 ```
6073 ### UseSystemPrintDialog
6074 Use the system print dialog instead of the print preview window.
6075
6076 **Compatibility:** Firefox 102\
6077 **CCK2 Equivalent:** N/A\
6078 **Preferences Affected:** `print.prefer_system_dialog`
6079
6080 #### Windows (GPO)
6081 ```
6082 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6083 ```
6084 #### Windows (Intune)
6085 OMA-URI:
6086 ```
6087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6088 ```
6089 Value (string):
6090 ```
6091 <enabled/> or <disabled/>
6092 ```
6093 #### macOS
6094 ```
6095 <dict>
6096 <key>UseSystemPrintDialog</key>
6097 <true/> | <false/>
6098 </dict>
6099 ```
6100 #### policies.json
6101 ```
6102 {
6103 "policies": {
6104 "UseSystemPrintDialog": true | false
6105 }
6106 }
6107 ```
6108 ### WebsiteFilter
6109 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6110 The arrays are limited to 1000 entries each.
6111
6112 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6113
6114 For specific protocols, use `https://*/*` or `http://*/*`.
6115
6116 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6117
6118 **Compatibility:** Firefox 60, Firefox ESR 60\
6119 **CCK2 Equivalent:** N/A\
6120 **Preferences Affected:** N/A
6121
6122 #### Windows (GPO)
6123 ```
6124 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6125 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6126 ```
6127 #### Windows (Intune)
6128 OMA-URI:
6129 ```
6130 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6131 ```
6132 Value (string):
6133 ```
6134 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6135 ```
6136 OMA-URI:
6137 ```
6138 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6139 ```
6140 Value (string):
6141 ```
6142 <enabled/>
6143 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6144 ```
6145 #### macOS
6146 ```
6147 <dict>
6148 <key>WebsiteFilter</key>
6149 <dict>
6150 <key>Block</key>
6151 <array>
6152 <string><all_urls></string>
6153 </array>
6154 <key>Exceptions</key>
6155 <array>
6156 <string>http://example.org/*</string>
6157 </array>
6158 </dict>
6159
6160 </dict>
6161 ```
6162 #### policies.json
6163 ```
6164 {
6165 "policies": {
6166 "WebsiteFilter": {
6167 "Block": ["<all_urls>"],
6168 "Exceptions": ["http://example.org/*"]
6169 }
6170 }
6171 }
6172 ```
6173 ### WindowsSSO
6174 Allow Windows single sign-on for Microsoft, work, and school accounts.
6175
6176 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6177
6178 **Compatibility:** Firefox 91\
6179 **CCK2 Equivalent:** N/A\
6180 **Preferences Affected:** `network.http.windows-sso.enabled`
6181
6182 #### Windows (GPO)
6183 ```
6184 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6185 ```
6186 #### Windows (Intune)
6187 OMA-URI:
6188 ```
6189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6190 ```
6191 Value (string):
6192 ```
6193 <enabled/> or <disabled/>
6194 ```
6195 #### policies.json
6196 ```
6197 {
6198 "policies": {
6199 "WindowsSSO": true | false
6200 }
6201 }
6202 ```

patrick-canterino.de