]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #406 from MS-PC/patch-2
[policy-templates.git] / README.md
1 **IMPORTANT**: This file is in active development along with the policies in Firefox. Make sure to check the compatibility section to see if a policy is available in a specific version of Firefox. To get the policy information that corresponds to a specific release, go to https://github.com/mozilla/policy-templates/releases.
2
3 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
4
5 | Policy Name | Description
6 | --- | --- |
7 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
8 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
9 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
10 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
11 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
12 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
13 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
14 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
15 | **[`Certificates`](#certificates)** |
16 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
17 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
18 | **[`Cookies`](#cookies)** | Configure cookie preferences.
19 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
20 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
21 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
22 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
23 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
24 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
25 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
26 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
27 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
28 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
29 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
30 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
31 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
32 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
33 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
34 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
35 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
36 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
37 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
38 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
39 | **[`DisplayMenuBar`](#displaymenubar)** | Set the initial state of the menubar.
40 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
41 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
42 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
43 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
44 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
45 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
46 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
47 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
48 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
49 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
50 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
51 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
52 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
53 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
54 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
55 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
56 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
57 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
58 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
59 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
60 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
61 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
62 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
63 | **[`Preferences`](#preferences)** | Set and lock some preferences.
64 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
65 | **[`Proxy`](#proxy)** | Configure proxy settings.
66 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
67 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
68 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
69 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
70 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
71 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
72 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
73 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
74 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
75 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
76 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
77 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
78 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
79 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
80
81
82 ### AppUpdateURL
83
84 Change the URL for application update.
85
86 **Compatibility:** Firefox 62, Firefox ESR 60.2\
87 **CCK2 Equivalent:** N/A\
88 **Preferences Affected:** `app.update.url`
89
90 #### Windows
91 ```
92 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
93 ```
94 #### macOS
95 ```
96 <dict>
97 <key>AppUpdateURL</key>
98 <string>https://yoursite.com</string>
99 </dict>
100 ```
101 ### JSON
102 ```
103 {
104 "policies": {
105 "AppUpdateURL": "https://yoursite.com"
106 }
107 }
108 ```
109 ### Authentication
110
111 Configure sites that support integrated authentication.
112
113 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
114
115 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2)\
116 **CCK2 Equivalent:** N/A\
117 **Preferences Affected:** `network.negotiate-auth.trusted-uris`, `network.negotiate-auth.delegation-uris`, `network.automatic-ntlm-auth.trusted-uris`, `network.automatic-ntlm-auth.allow-non-fqdn`, `network.negotiate-auth.allow-non-fqdn`
118
119 #### Windows
120 ```
121 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
122 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
123 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
124 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
125 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
126 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
127 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
128 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
129 ```
130 #### macOS
131 ```
132 <dict>
133 <key>Authentication</key>
134 <dict>
135 <key>SPNEGO</key>
136 <array>
137 <string>mydomain.com</string>
138 <string>https://myotherdomain.com</string>
139 </array>
140 <key>Delegated</key>
141 <array>
142 <string>mydomain.com</string>
143 <string>https://myotherdomain.com</string>
144 </array>
145 <key>NTLM</key>
146 <array>
147 <string>mydomain.com</string>
148 <string>https://myotherdomain.com</string>
149 </array>
150 <key>AllowNonFQDN</key>
151 <dict>
152 <key>SPNEGO</key>
153 <true/> | <false/>
154 <key>NTLM</key>
155 <true/> | <false/>
156 </dict>
157 </dict>
158 </dict>
159 ```
160 ### JSON
161 ```
162 {
163 "policies": {
164 "Authentication": {
165 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
166 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
167 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
168 "AllowNonFQDN": {
169 "SPNEGO": true | false,
170 "NTLM": true | false
171 }
172 }
173 }
174 }
175 ```
176 ### BlockAboutAddons
177
178 Block access to the Add-ons Manager (about:addons).
179
180 **Compatibility:** Firefox 60, Firefox ESR 60\
181 **CCK2 Equivalent:** `disableAddonsManager`\
182 **Preferences Affected:** N/A
183
184 #### Windows
185 ```
186 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
187 ```
188 #### macOS
189 ```
190 <dict>
191 <key>BlockAboutAddons</key>
192 <true/> | <false/>
193 </dict>
194 ```
195 #### JSON
196 ```
197 {
198 "policies": {
199 "BlockAboutAddons": true | false
200 }
201 }
202 ```
203 ### BlockAboutConfig
204
205 Block access to about:config.
206
207 **Compatibility:** Firefox 60, Firefox ESR 60\
208 **CCK2 Equivalent:** `disableAboutConfig`\
209 **Preferences Affected:** N/A
210
211 #### Windows
212 ```
213 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
214 ```
215 #### macOS
216 ```
217 <dict>
218 <key>BlockAboutConfig</key>
219 <true/> | <false/>
220 </dict>
221 ```
222 #### JSON
223 ```
224 {
225 "policies": {
226 "BlockAboutConfig": true | false
227 }
228 }
229 ```
230 ### BlockAboutProfiles
231
232 Block access to About Profiles (about:profiles).
233
234 **Compatibility:** Firefox 60, Firefox ESR 60\
235 **CCK2 Equivalent:** `disableAboutProfiles`\
236 **Preferences Affected:** N/A
237
238 #### Windows
239 ```
240 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
241 ```
242 #### macOS
243 ```
244 <dict>
245 <key>BlockAboutProfiles</key>
246 <true/> | <false/>
247 </dict>
248 ```
249 #### JSON
250 ```
251 {
252 "policies": {
253 "BlockAboutProfiles": true | false
254 }
255 }
256 ```
257 ### BlockAboutSupport
258
259 Block access to Troubleshooting Information (about:support).
260
261 **Compatibility:** Firefox 60, Firefox ESR 60\
262 **CCK2 Equivalent:** `disableAboutSupport`\
263 **Preferences Affected:** N/A
264
265 #### Windows
266 ```
267 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
268 ```
269 #### macOS
270 ```
271 <dict>
272 <key>BlockAboutSupport</key>
273 <true/> | <false/>
274 </dict>
275 ```
276 #### JSON
277 ```
278 {
279 "policies": {
280 "BlockAboutSupport": true | false
281 }
282 }
283 ```
284 ### Bookmarks
285
286 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
287
288 **Compatibility:** Firefox 60, Firefox ESR 60\
289 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
290 **Preferences Affected:** N/A
291
292 #### Windows
293 ```
294 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
295 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
296 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
297 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
298 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
299 ```
300 #### macOS
301 ```
302 <dict>
303 <key>Bookmarks</key>
304 <array>
305 <dict>
306 <key>Title</key>
307 <string>Example</string>
308 <key>URL</key>
309 <string>https://example.com</string>
310 <key>Favicon</key>
311 <string>https://example.com/favicon.ico</string>
312 <key>Placement</key>
313 <string>toolbar | menu</string>
314 <key>Folder</key>
315 <string>FolderName</string>
316 </dict>
317 </array>
318 </dict>
319 ```
320 ### JSON
321 ```
322 {
323 "policies": {
324 "Bookmarks": [
325 {
326 "Title": "Example",
327 "URL": "https://example.com",
328 "Favicon": "https://example.com/favicon.ico",
329 "Placement": "toolbar" | "menu",
330 "Folder": "FolderName"
331 }
332 ]
333 }
334 }
335 ```
336 ### CaptivePortal
337 Enable or disable the detection of captive portals.
338
339 **Compatibility:** Firefox 67, Firefox ESR 60.7\
340 **CCK2 Equivalent:** N/A\
341 **Preferences Affected:** `network.captive-portal-service.enabled`
342
343 #### Windows
344 ```
345 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
346 ```
347 #### macOS
348 ```
349 <dict>
350 <key>CaptivePortal</key>
351 <true/> | <false/>
352 </dict>
353 ```
354 #### JSON
355 ```
356 {
357 "policies": {
358 "CaptivePortal": true | false
359 }
360 }
361 ```
362 ### Certificates
363
364 ### Certificates | ImportEnterpriseRoots
365
366 Trust certificates that have been added to the operating system certificate store by a user or administrator.
367
368 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
369
370 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
371 **CCK2 Equivalent:** N/A\
372 **Preferences Affected:** `security.enterprise_roots.enabled`
373
374 #### Windows
375 ```
376 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>Certificates</key>
382 <dict>
383 <key>ImportEnterpriseRoots</key>
384 <true/> | <false/>
385 </dict>
386 </dict>
387 ```
388 #### JSON
389 ```
390 {
391 "policies": {
392 "Certificates": {
393 "ImportEnterpriseRoots": true | false
394 }
395 }
396 }
397 ```
398 ### Certificates | Install
399
400 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
401
402 - Windows
403 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
404 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
405 - macOS
406 - /Library/Application Support/Mozilla/Certificates
407 - ~/Library/Application Support/Mozilla/Certificates
408 - Linux
409 - /usr/lib/mozilla/certificates
410 - /usr/lib64/mozilla/certificates
411 - ~/.mozilla/certificates
412
413 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
414
415 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
416
417 Certificates are installed using the trust string `CT,CT,`.
418
419 Binary (DER) and ASCII (PEM) certificates are both supported.
420
421 **Compatibility:** Firefox 64, Firefox ESR 64\
422 **CCK2 Equivalent:** `certs.ca`\
423 **Preferences Affected:** N/A
424
425 #### Windows
426 ```
427 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
428 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
429 ```
430 #### macOS
431 ```
432 <dict>
433 <key>Certificates</key>
434 <dict>
435 <key>Install</key>
436 <array>
437 <string>cert1.der</string>
438 <string>/Users/username/cert2.pem</string>
439 </array>
440 </dict>
441 </dict>
442 ```
443 #### JSON
444 ```
445 {
446 "policies": {
447 "Certificates": {
448 "Install": ["cert1.der", "/home/username/cert2.pem"]
449 }
450 }
451 }
452 ```
453 ### Cookies
454 Configure cookie preferences.
455
456 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
457
458 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
459
460 `Default` determines whether cookies are accepted at all.
461
462 `AcceptThirdParty` determines how third-party cookies are handled.
463
464 `ExpireAtSessionEnd` determines when cookies expire.
465
466 `RejectTracker` only rejects cookies for trackers.
467
468 `Locked` prevents the user from changing cookie preferences.
469
470 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
471 **CCK2 Equivalent:** N/A\
472 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
473
474 #### Windows
475 ```
476 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
478 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
479 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
480 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
481 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
482 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
483 ```
484 #### macOS
485 ```
486 <dict>
487 <key>Cookies</key>
488 <dict>
489 <key>Allow</key>
490 <array>
491 <string>http://example.com</string>
492 </array>
493 <key>Block</key>
494 <array>
495 <string>http://example.org</string>
496 </array>
497 <key>Default</key>
498 <true/> | <false/>
499 <key>AcceptThirdParty</key>
500 <string>always | never | from-visited</string>
501 <key>ExpireAtSessionEnd</key>
502 <true/> | <false/>
503 <key>RejectTracker</key>
504 <true/> | <false/>
505 <key>Locked</key>
506 <true/> | <false/>
507 </dict>
508 </dict>
509 ```
510 #### JSON
511 ```
512 {
513 "policies": {
514 "Cookies": {
515 "Allow": ["http://example.org/"],
516 "Block": ["http://example.edu/"],
517 "Default": true | false,
518 "AcceptThirdParty": "always" | "never" | "from-visited"],
519 "ExpireAtSessionEnd": true | false,
520 "RejectTracker": true | false,
521 "Locked": true | false
522 }
523 }
524 }
525 ```
526 ### DisableSetDesktopBackground
527 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
528
529 **Compatibility:** Firefox 60, Firefox ESR 60\
530 **CCK2 Equivalent:** `removeSetDesktopBackground`\
531 **Preferences Affected:** N/A
532
533 #### Windows
534 ```
535 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
536 ```
537
538 #### macOS
539 ```
540 <dict>
541 <key>DisableSetDesktopBackground</key>
542 <true/> | <false/>
543 </dict>
544 ```
545 #### JSON
546 ```
547 {
548 "policies": {
549 "DisableSetDesktopBackground": true | false
550 }
551 }
552 ```
553 ### DisableMasterPasswordCreation
554 Remove the master password functionality.
555
556 **Compatibility:** Firefox 60, Firefox ESR 60\
557 **CCK2 Equivalent:** `noMasterPassword`\
558 **Preferences Affected:** N/A
559
560 #### Windows
561 ```
562 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
563 ```
564
565 #### macOS
566 ```
567 <dict>
568 <key>DisableMasterPasswordCreation</key>
569 <true/> | <false/>
570 </dict>
571 ```
572 #### JSON
573 ```
574 {
575 "policies": {
576 "DisableMasterPasswordCreation": true | false
577 }
578 }
579 ```
580 ### DisableAppUpdate
581 Turn off application updates.
582
583 **Compatibility:** Firefox 60, Firefox ESR 60\
584 **CCK2 Equivalent:** `disableFirefoxUpdates`\
585 **Preferences Affected:** N/A
586
587 #### Windows
588 ```
589 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
590 ```
591 #### macOS
592 ```
593 <dict>
594 <key>DisableAppUpdate</key>
595 <true/> | <false/>
596 </dict>
597 ```
598 #### JSON
599 ```
600 {
601 "policies": {
602 "DisableAppUpdate": true | false
603 }
604 }
605 ```
606 ### DisableBuiltinPDFViewer
607 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
608
609 **Compatibility:** Firefox 60, Firefox ESR 60\
610 **CCK2 Equivalent:** `disablePDFjs`\
611 **Preferences Affected:** `pdfjs.disabled`
612
613 #### Windows
614 ```
615 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
616 ```
617
618 #### macOS
619 ```
620 <dict>
621 <key>DisableBuiltinPDFViewer</key>
622 <true/> | <false/>
623 </dict>
624 ```
625 #### JSON
626 ```
627 {
628 "policies": {
629 "DisableBuiltinPDFViewer": true | false
630 }
631 }
632 ```
633 ### DisableDeveloperTools
634 Remove access to all developer tools.
635
636 **Compatibility:** Firefox 60, Firefox ESR 60\
637 **CCK2 Equivalent:** `removeDeveloperTools`\
638 **Preferences Affected:** `devtools.policy.disabled`
639
640 #### Windows
641 ```
642 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
643 ```
644
645 #### macOS
646 ```
647 <dict>
648 <key>DisableDeveloperTools</key>
649 <true/> | <false/>
650 </dict>
651 ```
652 #### JSON
653 ```
654 {
655 "policies": {
656 "DisableDeveloperTools": true | false
657 }
658 }
659 ```
660 ### DisableFeedbackCommands
661 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
662
663 **Compatibility:** Firefox 60, Firefox ESR 60\
664 **CCK2 Equivalent:** N/A\
665 **Preferences Affected:** N/A
666
667 #### Windows
668 ```
669 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
670 ```
671 #### macOS
672 ```
673 <dict>
674 <key>DisableFeedbackCommands</key>
675 <true/> | <false/>
676 </dict>
677 ```
678 #### JSON
679 ```
680 {
681 "policies": {
682 "DisableFeedbackCommands": true | false
683 }
684 }
685 ```
686 ### DisableFirefoxScreenshots
687 Remove access to Firefox Screenshots.
688
689 **Compatibility:** Firefox 60, Firefox ESR 60\
690 **CCK2 Equivalent:** N/A\
691 **Preferences Affected:** `extensions.screenshots.disabled`
692
693 #### Windows
694 ```
695 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
696 ```
697 #### macOS
698 ```
699 <dict>
700 <key>DisableFirefoxScreenshots</key>
701 <true/> | <false/>
702 </dict>
703 ```
704 #### JSON
705 ```
706 {
707 "policies": {
708 "DisableFirefoxScreenshots": true | false
709 }
710 }
711 ```
712 ### DisableFirefoxAccounts
713 Disable Firefox Accounts integration (Sync).
714
715 **Compatibility:** Firefox 60, Firefox ESR 60\
716 **CCK2 Equivalent:** `disableSync`\
717 **Preferences Affected:** `identity.fxaccounts.enabled`
718
719 #### Windows
720 ```
721 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
722 ```
723 #### macOS
724 ```
725 <dict>
726 <key>DisableFirefoxAccounts</key>
727 <true/> | <false/>
728 </dict>
729 ```
730 #### JSON
731 ```
732 {
733 "policies": {
734 "DisableFirefoxAccounts": true | false
735 }
736 }
737 ```
738 ### DisableFirefoxStudies
739 Disable Firefox studies (Shield).
740
741 **Compatibility:** Firefox 60, Firefox ESR 60\
742 **CCK2 Equivalent:** `disableForget`\
743 **Preferences Affected:** N/A
744
745 #### Windows
746 ```
747 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
748 ```
749 #### macOS
750 ```
751 <dict>
752 <key>DisableFirefoxStudies</key>
753 <true/> | <false/>
754 </dict>
755 ```
756 #### JSON
757 ```
758 {
759 "policies": {
760 "DisableFirefoxStudies": true | false
761 }
762 }
763 ```
764 ### DisableForgetButton
765 Disable the "Forget" button.
766
767 **Compatibility:** Firefox 60, Firefox ESR 60\
768 **CCK2 Equivalent:** `disableForget`\
769 **Preferences Affected:** N/A
770
771 #### Windows
772 ```
773 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
774 ```
775 #### macOS
776 ```
777 <dict>
778 <key>DisableForgetButton</key>
779 <true/> | <false/>
780 </dict>
781 ```
782 #### JSON
783 ```
784 {
785 "policies": {
786 "DisableForgetButton": true | false
787 }
788 }
789 ```
790 ### DisableFormHistory
791 Turn off saving information on web forms and the search bar.
792
793 **Compatibility:** Firefox 60, Firefox ESR 60\
794 **CCK2 Equivalent:** `disableFormFill`\
795 **Preferences Affected:** ` browser.formfill.enable`
796
797 #### Windows
798 ```
799 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
800 ```
801 #### macOS
802 ```
803 <dict>
804 <key>DisableFormHistory</key>
805 <true/> | <false/>
806 </dict>
807 ```
808 #### JSON
809 ```
810 {
811 "policies": {
812 "DisableFormHistory": true | false
813 }
814 }
815 ```
816 ### DisablePocket
817 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
818
819 **Compatibility:** Firefox 60, Firefox ESR 60\
820 **CCK2 Equivalent:** `disablePocket`\
821 **Preferences Affected:** `extensions.pocket.enabled`
822
823 #### Windows
824 ```
825 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
826 ```
827 #### macOS
828 ```
829 <dict>
830 <key>DisablePocket</key>
831 <true/> | <false/>
832 </dict>
833 ```
834 #### JSON
835 ```
836 {
837 "policies": {
838 "DisablePocket": true | false
839 }
840 }
841 ```
842 ### DisablePrivateBrowsing
843 Remove access to private browsing.
844
845 **Compatibility:** Firefox 60, Firefox ESR 60\
846 **CCK2 Equivalent:** `disablePrivateBrowsing`\
847 **Preferences Affected:** N/A
848
849 #### Windows
850 ```
851 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
852 ```
853 #### macOS
854 ```
855 <dict>
856 <key>DisablePrivateBrowsing</key>
857 <true/> | <false/>
858 </dict>
859 ```
860 #### JSON
861 ```
862 {
863 "policies": {
864 "DisablePrivateBrowsing": true | false
865 }
866 }
867 ```
868 ### DisableProfileImport
869 Disables the "Import data from another browser" option in the bookmarks window.
870
871 **Compatibility:** Firefox 60, Firefox ESR 60\
872 **CCK2 Equivalent:** N/A\
873 **Preferences Affected:** N/A
874
875 #### Windows
876 ```
877 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
878 ```
879 #### macOS
880 ```
881 <dict>
882 <key>DisableProfileImport</key>
883 <true/> | <false/>
884 </dict>
885 ```
886 #### JSON
887 ```
888 {
889 "policies": {
890 "DisableProfileImport": true | false
891 }
892 }
893 ```
894 ### DisableProfileRefresh
895 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
896
897 **Compatibility:** Firefox 60, Firefox ESR 60\
898 **CCK2 Equivalent:** `disableResetFirefox`\
899 **Preferences Affected:** `browser.disableResetPrompt`
900
901 #### Windows
902 ```
903 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
904 ```
905 #### macOS
906 ```
907 <dict>
908 <key>DisableProfileRefresh</key>
909 <true/> | <false/>
910 </dict>
911 ```
912 #### JSON
913 ```
914 {
915 "policies": {
916 "DisableProfileRefresh": true | false
917 }
918 }
919 ```
920 ### DisableSafeMode
921 Disable safe mode within the browser.
922
923 On Windows, this disables safe mode via the command line as well.
924
925 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
926 **CCK2 Equivalent:** `disableSafeMode`\
927 **Preferences Affected:** N/A
928
929 #### Windows
930 ```
931 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>DisableSafeMode</key>
937 <true/> | <false/>
938 </dict>
939 ```
940 #### JSON
941 ```
942 {
943 "policies": {
944 "DisableSafeMode": true | false
945 }
946 }
947 ```
948 ### DisableSecurityBypass
949 Prevent the user from bypassing security in certain cases.
950
951 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
952
953 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
954
955 **Compatibility:** Firefox 60, Firefox ESR 60\
956 **CCK2 Equivalent:** N/A\
957 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
958
959 #### Windows
960 ```
961 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
962 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
963 ```
964 #### macOS
965 ```
966 <dict>
967 <key>DisableSecurityBypass</key>
968 <dict>
969 <key>InvalidCertificate</key>
970 <true/> | <false/>
971 <key><SafeBrowsing/key>
972 <true/> | <false/>
973 </dict>
974 </dict>
975 ```
976 #### JSON
977 ```
978 {
979 "policies": {
980 "DisableSecurityBypass": {
981 "InvalidCertificate": true false,
982 "SafeBrowsing": true false
983 }
984 }
985 }
986 ```
987 ### DisableSystemAddonUpdate
988 Prevent system add-ons from being installed or update.
989
990 **Compatibility:** Firefox 60, Firefox ESR 60\
991 **CCK2 Equivalent:** N/A\
992 **Preferences Affected:** N/A
993
994 #### Windows
995 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
996 ```
997 #### macOS
998 ```
999 <dict>
1000 <key>DisableSystemAddonUpdate</key>
1001 <true/> | <false/>
1002 </dict>
1003 ```
1004 #### JSON
1005 ```
1006 {
1007 "policies": {
1008 "DisableSystemAddonUpdate": true | false
1009 }
1010 }
1011 ```
1012 ### DisableTelemetry
1013 Prevent the upload of telemetry data.
1014
1015 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1016
1017 **Compatibility:** Firefox 60, Firefox ESR 60\
1018 **CCK2 Equivalent:** `disableTelemetry`\
1019 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1020
1021 #### Windows
1022 ```
1023 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1024 ```
1025 #### macOS
1026 ```
1027 <dict>
1028 <key>DisableTelemetry</key>
1029 <true/> | <false/>
1030 </dict>
1031 ```
1032 #### JSON
1033 ```
1034 {
1035 "policies": {
1036 "DisableTelemetry": true | false
1037 }
1038 }
1039 ```
1040 ### DisplayBookmarksToolbar
1041 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1042
1043 **Compatibility:** Firefox 60, Firefox ESR 60\
1044 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1045 **Preferences Affected:** N/A
1046
1047 #### Windows
1048 ```
1049 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1050 ```
1051 #### macOS
1052 ```
1053 <dict>
1054 <key>DisplayBookmarksToolbar</key>
1055 <true/> | <false/>
1056 </dict>
1057 ```
1058 #### JSON
1059 ```
1060 {
1061 "policies": {
1062 "DisplayBookmarksToolbar": true | false
1063 }
1064 }
1065 ```
1066 ### DisplayMenuBar
1067 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1068
1069 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1070 **CCK2 Equivalent:** `displayMenuBar`\
1071 **Preferences Affected:** N/A
1072
1073 #### Windows
1074 ```
1075 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1076 ```
1077 #### macOS
1078 ```
1079 <dict>
1080 <key>DisplayMenuBar</key>
1081 <true/> | <false/>
1082 </dict>
1083 ```
1084 #### JSON
1085 ```
1086 {
1087 "policies": {
1088 "DisplayMenuBar": true | false
1089 }
1090 }
1091 ```
1092 ### DNSOverHTTPS
1093 Configure DNS over HTTPS.
1094
1095 `Enabled` determines whether DNS over HTTPS is enabled
1096
1097 `ProviderURL` is a URL to another provider.
1098
1099 `Locked` prevents the user from changing DNS over HTTPS preferences.
1100
1101 **Compatibility:** Firefox 63, Firefox ESR 68\
1102 **CCK2 Equivalent:** N/A\
1103 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1104
1105 #### Windows
1106 ```
1107 Software\Policies\Mozilla\Firefox\Cookies\Enabled = 0x1 | 0x0
1108 Software\Policies\Mozilla\Firefox\Cookies\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1109 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1110 ```
1111 #### macOS
1112 ```
1113 <dict>
1114 <key>Cookies</key>
1115 <dict>
1116 <key>Enabled</key>
1117 <true/> | <false/>
1118 <key>ProviderURL</key>
1119 <string>URL_TO_ALTERNATE_PROVIDER</string>
1120 <key>Locked</key>
1121 <true/> | <false/>
1122 </dict>
1123 </dict>
1124 ```
1125 #### JSON
1126 ```
1127 {
1128 "policies": {
1129 "DNSOverHTTPS": {
1130 "Enabled": true | false,
1131 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1132 "Locked": true | false
1133 }
1134 }
1135 }
1136 ```
1137 ### DontCheckDefaultBrowser
1138 Don't check if Firefox is the default browser at startup.
1139
1140 **Compatibility:** Firefox 60, Firefox ESR 60\
1141 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1142 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1143
1144 #### Windows
1145 ```
1146 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1147 ```
1148 #### macOS
1149 ```
1150 <dict>
1151 <key>DontCheckDefaultBrowser</key>
1152 <true/> | <false/>
1153 </dict>
1154 ```
1155 #### JSON
1156 ```
1157 {
1158 "policies": {
1159 "DontCheckDefaultBrowser": true | false
1160 }
1161 }
1162 ```
1163 ### DefaultDownloadDirectory
1164 Set the default download directory.
1165
1166 You can use ${home} for the native home directory.
1167
1168 **Compatibility:** Firefox 68, Firefox ESR 68\
1169 **CCK2 Equivalent:** N/A\
1170 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1171
1172 #### Windows
1173 ```
1174 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1175 ```
1176 #### macOS
1177 ```
1178 <dict>
1179 <key>DefaultDownloadDirectory</key>
1180 <string>${home}/Downloads</string>
1181 </dict>
1182 ```
1183 #### JSON
1184 ```
1185 {
1186 "policies": {
1187 "DefaultDownloadDirectory": "${home}/Downloads"
1188 }
1189 ```
1190 ### DownloadDirectory
1191 Set and lock the download directory.
1192
1193 You can use ${home} for the native home directory.
1194
1195 **Compatibility:** Firefox 68, Firefox ESR 68\
1196 **CCK2 Equivalent:** N/A\
1197 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1198
1199 #### Windows
1200 ```
1201 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1202 ```
1203 #### macOS
1204 ```
1205 <dict>
1206 <key>DownloadDirectory</key>
1207 <string>${home}/Downloads</string>
1208 </dict>
1209 ```
1210 #### JSON
1211 ```
1212 {
1213 "policies": {
1214 "DownloadDirectory": "${home}/Downloads"
1215 }
1216 ```
1217 ### EnableTrackingProtection
1218 Configure tracking protection.
1219
1220 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1221
1222 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1223
1224 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1225
1226 **Compatibility:** Firefox 60, Firefox ESR 60\
1227 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1228 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`
1229
1230 #### Windows
1231 ```
1232 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1233 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1234 ```
1235 #### macOS
1236 ```
1237 <dict>
1238 <key>EnableTrackingProtection</key>
1239 <dict>
1240 <key>Value</key>
1241 <true/> | <false/>
1242
1243 <key><Locked/key>
1244 <true/> | <false/>
1245 </dict>
1246 </dict>
1247 ```
1248 #### JSON
1249 ```
1250 {
1251 "policies": {
1252 "EnableTrackingProtection": {
1253 "Value": [true, false],
1254 "Locked": [true, false]
1255 }
1256 }
1257 ```
1258 ### EnterprisePoliciesEnabled
1259 Enable policy support on macOS.
1260
1261 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1262 **CCK2 Equivalent:** N/A\
1263 **Preferences Affected:** N/A
1264
1265 #### macOS
1266 ```
1267 <dict>
1268 <key>EnterprisePoliciesEnabled</key>
1269 <true/>
1270 </dict>
1271 ```
1272 ### Extensions
1273 Control the installation, uninstallation and locking of extensions.
1274
1275 `Install` is a list of URLs or native paths for extensions to be installed.
1276
1277 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1278
1279 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1280
1281 **Compatibility:** Firefox 60, Firefox ESR 60\
1282 **CCK2 Equivalent:** `addons`\
1283 **Preferences Affected:** N/A
1284
1285 #### Windows
1286 ```
1287 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1288 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1289 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1290 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1291 ```
1292 #### macOS
1293 ```
1294 <dict>
1295 <key>Extensions</key>
1296 <dict>
1297 <key>Install</key>
1298 <array>
1299 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1300 <string>//path/to/xpi</string>
1301 </array>
1302 <key>Uninstall</key>
1303 <array>
1304 <string>bad_addon_id@mozilla.org</string>
1305 </array>
1306 <key>Locked</key>
1307 <array>
1308 <string>addon_id@mozilla.org</string>
1309 </array>
1310 </dict>
1311 </dict>
1312 ```
1313 #### JSON
1314
1315
1316 ```
1317 {
1318 "policies": {
1319 "Extensions": {
1320 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1321 "Uninstall": ["bad_addon_id@mozilla.org"],
1322 "Locked": ["addon_id@mozilla.org"]
1323 }
1324 }
1325 }
1326 ```
1327 ### ExtensionSettings
1328 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1329
1330 This policy maps an extension ID to its configuration. With an extension ID, configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1331
1332 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1333
1334 The configuration for each extension is another dictionary that can contain the fields documented below.
1335
1336 | Name | Description |
1337 | --- | --- |
1338 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1339 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1340 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1341 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1342 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1343 | `install_url`| Maps to a string indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi
1344 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1345 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1346 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1347
1348 **Compatibility:** Firefox 68, Firefox ESR 68\
1349 **CCK2 Equivalent:** N/A\
1350 **Preferences Affected:** N/A
1351
1352 #### Windows
1353 Due to a bug in Firefox 68, this policy is not working via GPO on Windows. We will have a fix soon.
1354 #### macOS
1355 ```
1356 <dict>
1357 <key>ExtensionSettings</key>
1358 <dict>
1359 <key>*</key>
1360 <dict>
1361 <key>blocked_install_message</key>
1362 <string>Custom error message.</string>
1363 <key>install_sources</key>
1364 <array>
1365 <string>https://addons.mozilla.org/</string>
1366 </array>
1367 <key>installation_mode</key>
1368 <string>blocked</string>
1369 </dict>
1370 <key>uBlock0@raymondhill.net</key>
1371 <dict>
1372 <key>installation_mode</key>
1373 <string>force_installed</string>
1374 <key>install_url</key>
1375 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1376 </dict>
1377 </dict>
1378 </dict>
1379 ```
1380 #### JSON
1381 ```
1382 {
1383 "policies": {
1384 "ExtensionSettings": {
1385 "*": {
1386 "blocked_install_message": "Custom error message.",
1387 "install_sources": ["https://addons.mozilla.org/"],
1388 "installation_mode": "blocked"
1389 },
1390 "uBlock0@raymondhill.net": {
1391 "installation_mode": "force_installed",
1392 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1393 }
1394 }
1395 }
1396 }
1397 ```
1398
1399 ### ExtensionUpdate
1400 Control extension updates.
1401
1402 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1403 **CCK2 Equivalent:** N/A\
1404 **Preferences Affected:** `extensions.update.enabled`
1405
1406 #### Windows
1407 ```
1408 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>ExtensionUpdate</key>
1414 <true/> | <false/>
1415 </dict>
1416 ```
1417 #### JSON
1418 ```
1419 {
1420 "policies": {
1421 "ExtensionUpdate": true | false
1422 }
1423 }
1424 ```
1425 ### FlashPlugin
1426 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1427
1428 `Allow` is a list of origins where Flash are allowed.
1429
1430 `Block` is a list of origins where Flash is not allowed.
1431
1432 `Default` determines whether or not Flash is allowed by default.
1433
1434 `Locked` prevents the user from changing Flash preferences.
1435
1436 **Compatibility:** Firefox 60, Firefox ESR 60\
1437 **CCK2 Equivalent:** `permissions.plugin`\
1438 **Preferences Affected:** `plugin.state.flash`
1439
1440 #### Windows
1441 ```
1442 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1443 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1444 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1445 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1446 ```
1447 #### macOS
1448 ```
1449 <dict>
1450 <key>FlashPlugin</key>
1451 <dict>
1452 <key>Allow</key>
1453 <array>
1454 <string>http://example.org</string>
1455 </array>
1456 <key>Block</key>
1457 <array>
1458 <string>http://example.edu</string>
1459 </array>
1460 <key>Default</key>
1461 <true/> | <false/>
1462 <key>Locked</key>
1463 <true/> | <false/>
1464 </dict>
1465 </dict>
1466 ```
1467 #### JSON
1468 ```
1469 {
1470 "policies": {
1471 "FlashPlugin": {
1472 "Allow": ["http://example.org/"],
1473 "Block": ["http://example.edu/"],
1474 "Default": true | false,
1475 "Locked": true | false
1476 }
1477 }
1478 }
1479 ```
1480 ### FirefoxHome
1481 Customize the Firefox Home page.
1482
1483 **Compatibility:** Firefox 68, Firefox ESR 68\
1484 **CCK2 Equivalent:** N/A\
1485 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1486
1487 #### Windows
1488 ```
1489 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1490 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1491 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1492 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1493 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1494 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1495 ```
1496 #### macOS
1497 ```
1498 <dict>
1499 <key>FirefoxHome</key>
1500 <dict>
1501 <key>Search</key>
1502 <true/> | <false/>
1503 <key>TopSites</key>
1504 <true/> | <false/>
1505 <key>Highlights</key>
1506 <true/> | <false/>
1507 <key>Pocket</key>
1508 <true/> | <false/>
1509 <key>Snippets</key>
1510 <true/> | <false/>
1511 <key>Locked</key>
1512 <true/> | <false/>
1513 </dict>
1514 </dict>
1515 ```
1516 #### JSON
1517 ```
1518 {
1519 "policies": {
1520 "FirefoxHome": {
1521 "Search": true | false,
1522 "TopSites": true | false,
1523 "Highlights": true | false,
1524 "Pocket": true | false,
1525 "Snippets": true | false,
1526 "Locked": true | false
1527 }
1528 }
1529 }
1530 ```
1531 ### HardwareAcceleration
1532 Control hardware acceleration.
1533
1534 **Compatibility:** Firefox 60, Firefox ESR 60\
1535 **CCK2 Equivalent:** N/A\
1536 **Preferences Affected:** `layers.acceleration.disabled`
1537
1538 #### Windows
1539 ```
1540 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1541 ```
1542 #### macOS
1543 ```
1544 <dict>
1545 <key>HardwareAcceleration</key>
1546 <true/> | <false/>
1547 </dict>
1548 ```
1549 #### JSON
1550 ```
1551 {
1552 "policies": {
1553 "HardwareAcceleration": true | false
1554 }
1555 }
1556 ```
1557 ### Homepage
1558 Configure the default homepage and how Firefox starts.
1559
1560 `URL` is the default homepage.
1561
1562 `Locked` prevents the user from changing homepage preferences.
1563
1564 `Additional` allows for more than one homepage.
1565
1566 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1567
1568 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1569 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1570 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1571
1572 #### Windows
1573 ```
1574 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1575 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1576 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1577 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1578 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1579 ```
1580 #### macOS
1581 ```
1582 <dict>
1583 <key>Homepage</key>
1584 <dict>
1585 <key>URL</key>
1586 <string>http://example.com</string>
1587 <key>Locked</key>
1588 <true/> | <false/>
1589 <key>Additional</key>
1590 <array>
1591 <string>http://example.org</string>
1592 <string>http://example.edu</string>
1593 </array>
1594 <key>StartPage</key>
1595 <string>always | never | from-visited</string>
1596 </dict>
1597 </dict>
1598 ```
1599 #### JSON
1600 ```
1601 {
1602 "policies": {
1603 "Homepage": {
1604 "URL": "http://example.com/",
1605 "Locked": true | false,
1606 "Additional": ["http://example.org/",
1607 "http://example.edu/"],
1608 "StartPage": "none" | "homepage" | "previous-session"
1609 }
1610 }
1611 }
1612 ```
1613 ### InstallAddonsPermission
1614 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1615
1616 `Allow` is a list of origins where extension installs are allowed.
1617
1618 `Default` determines whether or not extension installs are allowed by default.
1619
1620 **Compatibility:** Firefox 60, Firefox ESR 60\
1621 **CCK2 Equivalent:** `permissions.install`\
1622 **Preferences Affected:** `xpinstall.enabled`
1623
1624 #### Windows
1625 ```
1626 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1627 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1628 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1629 ```
1630 #### macOS
1631 ```
1632 <dict>
1633 <key>InstallAddonsPermission</key>
1634 <dict>
1635 <key>Allow</key>
1636 <array>
1637 <string>http://example.org</string>
1638 <string>http://example.edu</string>
1639 </array>
1640 <key>Default</key>
1641 <true/> | <false/>
1642 </dict>
1643 </dict>
1644 ```
1645 #### JSON
1646 ```
1647 {
1648 "policies": {
1649 "InstallAddonsPermission": {
1650 "Allow": ["http://example.org/",
1651 "http://example.edu/"],
1652 "Default": true | false
1653 }
1654 }
1655 }
1656 ```
1657 ### LocalFileLinks
1658 Enable linking to local files by origin.
1659
1660 **Compatibility:** Firefox 68, Firefox ESR 68\
1661 **CCK2 Equivalent:** N/A\
1662 **Preferences Affected:** `capability.policy.localfilelinks.*`
1663
1664 #### Windows
1665 ```
1666 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1667 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1668 ```
1669 #### macOS
1670 ```
1671 <dict>
1672 <key>LocalFileLinks</key>
1673 <array>
1674 <string>http://example.org</string>
1675 <string>http://example.edu</string>
1676 </array>
1677 </dict>
1678 ```
1679 #### JSON
1680 ```
1681 {
1682 "policies": {
1683 "LocalFileLinks": ["http://example.org/",
1684 "http://example.edu/"]
1685 }
1686 }
1687 ```
1688 ### NoDefaultBookmarks
1689 Disable the creation of default bookmarks.
1690
1691 This policy is only effective if the user profile has not been created yet.
1692
1693 **Compatibility:** Firefox 60, Firefox ESR 60\
1694 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1695 **Preferences Affected:** N/A
1696
1697 #### Windows
1698 ```
1699 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1700 ```
1701 #### macOS
1702 ```
1703 <dict>
1704 <key>NoDefaultBookmarks</key>
1705 <true/> | <false/>
1706 </dict>
1707 ```
1708 #### JSON
1709 ```
1710 {
1711 "policies": {
1712 "NoDefaultBookmarks": true | false
1713 }
1714 }
1715 ```
1716 ### NetworkPrediction
1717 Enable or disable network prediction (DNS prefetching).
1718
1719 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1720 **CCK2 Equivalent:** N/A\
1721 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1722
1723 #### Windows
1724 ```
1725 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1726 ```
1727 #### macOS
1728 ```
1729 <dict>
1730 <key>NetworkPrediction</key>
1731 <true/> | <false/>
1732 </dict>
1733 ```
1734 #### JSON
1735 ```
1736 {
1737 "policies": {
1738 "NetworkPrediction": true | false
1739 }
1740 ```
1741 ### NewTabPage
1742 Enable or disable the New Tab page.
1743
1744 **Compatibility:** Firefox 68, Firefox ESR 68\
1745 **CCK2 Equivalent:** N/A\
1746 **Preferences Affected:** `browser.newtabpage.enabled`
1747
1748 #### Windows
1749 ```
1750 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1751 ```
1752 #### macOS
1753 ```
1754 <dict>
1755 <key>NewTabPage</key>
1756 <true/> | <false/>
1757 </dict>
1758 ```
1759 #### JSON
1760 ```
1761 {
1762 "policies": {
1763 "NewTabPage": true | false
1764 }
1765 ```
1766 ### OfferToSaveLogins
1767 Control whether or not Firefox offers to save passwords.
1768
1769 **Compatibility:** Firefox 60, Firefox ESR 60\
1770 **CCK2 Equivalent:** `dontRememberPasswords`\
1771 **Preferences Affected:** `signon.rememberSignons`
1772
1773 #### Windows
1774 ```
1775 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1776 ```
1777 #### macOS
1778 ```
1779 <dict>
1780 <key>OfferToSaveLogins</key>
1781 <true/> | <false/>
1782 </dict>
1783 ```
1784 #### JSON
1785 ```
1786 {
1787 "policies": {
1788 "OfferToSaveLogins": true | false
1789 }
1790 }
1791 ```
1792 ### OverrideFirstRunPage
1793 Override the first run page. If the value is blank, no first run page is displayed.
1794
1795 **Compatibility:** Firefox 60, Firefox ESR 60\
1796 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1797 **Preferences Affected:** `startup.homepage_welcome_url`
1798
1799 #### Windows
1800 ```
1801 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1802 ```
1803 #### macOS
1804 ```
1805 <dict>
1806 <key>OverrideFirstRunPage</key>
1807 <string>http://example.org</string>
1808 </dict>
1809 ```
1810 #### JSON
1811 ```
1812 {
1813 "policies": {
1814 "OverrideFirstRunPage": "http://example.org"
1815 }
1816 ```
1817 ### OverridePostUpdatePage
1818 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1819
1820 **Compatibility:** Firefox 60, Firefox ESR 60\
1821 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1822 **Preferences Affected:** `startup.homepage_override_url`
1823
1824 #### Windows
1825 ```
1826 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>OverridePostUpdatePage</key>
1832 <string>http://example.org</string>
1833 </dict>
1834 ```
1835 #### JSON
1836 ```
1837 {
1838 "policies": {
1839 "OverridePostUpdatePage": "http://example.org"
1840 }
1841 ```
1842 ### Permissions
1843 Set permissions associated with camera, microphone, location, and notifications
1844
1845 `Allow` is a list of origins where the feature is allowed.
1846
1847 `Block` is a list of origins where the feature is not allowed.
1848
1849 `BlockNewRequests` determines whether or not new requests can be made for the feature.
1850
1851 `Locked` prevents the user from changing preferences for the feature.
1852
1853 **Compatibility:** Firefox 62, Firefox ESR 60.2\
1854 **CCK2 Equivalent:** N/A\
1855 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
1856
1857 #### Windows
1858 ```
1859 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
1860 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
1861 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
1862 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
1863 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
1864 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
1865 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
1866 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
1867 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
1868 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
1869 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
1870 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
1871 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
1872 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
1873 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
1874 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
1875 ```
1876 #### macOS
1877 ```
1878 <dict>
1879 <key>Permissions</key>
1880 <dict>
1881 <key>Camera</key>
1882 <dict>
1883 <key>Allow</key>
1884 <array>
1885 <string>https://example.org</string>
1886 </array>
1887 <key>Block</key>
1888 <array>
1889 <string>https://example.edu</string>
1890 </array>
1891 <key>BlockNewRequests</key>
1892 <true/>
1893 <key>Locked</key>
1894 <true/>
1895 </dict>
1896 <key>Microphone</key>
1897 <dict>
1898 <key>Allow</key>
1899 <array>
1900 <string>https://example.org</string>
1901 </array>
1902 <key>Block</key>
1903 <array>
1904 <string>https://example.edu</string>
1905 </array>
1906 <key>BlockNewRequests</key>
1907 <true/>
1908 <key>Locked</key>
1909 <true/>
1910 </dict>
1911 <key>Location</key>
1912 <dict>
1913 <key>Allow</key>
1914 <array>
1915 <string>https://example.org</string>
1916 </array>
1917 <key>Block</key>
1918 <array>
1919 <string>https://example.edu</string>
1920 </array>
1921 <key>BlockNewRequests</key>
1922 <true/>
1923 <key>Locked</key>
1924 <true/>
1925 </dict>
1926 <key>Notifications</key>
1927 <dict>
1928 <key>Allow</key>
1929 <array>
1930 <string>https://example.org</string>
1931 </array>
1932 <key>Block</key>
1933 <array>
1934 <string>https://example.edu</string>
1935 </array>
1936 <key>BlockNewRequests</key>
1937 <true/>
1938 <key>Locked</key>
1939 <true/>
1940 </dict>
1941 </dict>
1942 </dict>
1943 ```
1944 #### JSON
1945 ```
1946 {
1947 "policies": {
1948 "Permissions": {
1949 "Camera": {
1950 "Allow": ["https://example.org"],
1951 "Block": ["https://example.edu"],
1952 "BlockNewRequests": true | false,
1953 "Locked": true | false
1954 },
1955 "Microphone": {
1956 "Allow": ["https://example.org"],
1957 "Block": ["https://example.edu"],
1958 "BlockNewRequests": true | false,
1959 "Locked": true | false
1960 },
1961 "Location": {
1962 "Allow": ["https://example.org"],
1963 "Block": ["https://example.edu"],
1964 "BlockNewRequests": true | false,
1965 "Locked": true | false
1966 },
1967 "Notifications": {
1968 "Allow": ["https://example.org"],
1969 "Block": ["https://example.edu"],
1970 "BlockNewRequests": true | false,
1971 "Locked": true | false
1972 }
1973 }
1974 }
1975 }
1976 ```
1977 ### PopupBlocking
1978 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
1979
1980 `Allow` is a list of origins where popup-windows are allowed.
1981
1982 `Default` determines whether or not pop-up windows are allowed by default.
1983
1984 `Locked` prevents the user from changing pop-up preferences.
1985
1986 **Compatibility:** Firefox 60, Firefox ESR 60\
1987 **CCK2 Equivalent:** `permissions.popup`\
1988 **Preferences Affected:** `dom.disable_open_during_load`
1989
1990 #### Windows
1991 ```
1992 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
1993 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
1994 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
1995 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
1996 ```
1997 #### macOS
1998 ```
1999 <dict>
2000 <key>PopupBlocking</key>
2001 <dict>
2002 <key>Allow</key>
2003 <array>
2004 <string>http://example.org</string>
2005 <string>http://example.edu</string>
2006 </array>
2007 <key>Default</key>
2008 <true/> | <false/>
2009 <key>Locked</key>
2010 <true/> | <false/>
2011 </dict>
2012 </dict>
2013 ```
2014 #### JSON
2015 ```
2016 {
2017 "policies": {
2018 "PopupBlocking": {
2019 "Allow": ["http://example.org/",
2020 "http://example.edu/"],
2021 "Default": true | false,
2022 "Locked": true | false
2023 }
2024 }
2025 }
2026 ```
2027 ### Preferences
2028 Set and lock certain preferences.
2029
2030 **Compatibility:** See below\
2031 **CCK2 Equivalent:** `preferences`\
2032 **Preferences Affected:** See below
2033
2034 | Preference | Type | Compatibility
2035 | --- | --- | ---
2036 | app.update.auto | boolean | Firefox 68, Firefox 68 ESR
2037 | browser.cache.disk.enable | boolean | Firefox 68, Firefox 68 ESR
2038 | browser.cache.disk.parent_directory | string | Firefox 68, Firefox 68 ESR
2039 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox 68 ESR
2040 | browser.search.update | boolean | Firefox 68, Firefox 68 ESR
2041 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox 68 ESR
2042 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox 68 ESR
2043 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox 68 ESR
2044 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox 68 ESR
2045 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox 68 ESR
2046 | dom.disable_window_flip | boolean | Firefox 68, Firefox 68 ESR
2047 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox 68 ESR
2048 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox 68 ESR
2049 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox 68 ESR
2050 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox 68 ESR
2051 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox 68 ESR
2052 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox 68 ESR
2053 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox 68 ESR
2054 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox 68 ESR
2055 | network.IDN_show_punycode | boolean | Firefox 68, Firefox 68 ESR
2056 | places.history.enabled | boolean | Firefox 68, Firefox 68 ESR
2057 | security.default_personal_cert | string | Firefox 68, Firefox 68 ESR
2058 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox 68 ESR
2059 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox 68 ESR
2060 #### Windows
2061 ```
2062 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2063 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2064 ```
2065 #### macOS
2066 ```
2067 <dict>
2068 <key>Preferences</key>
2069 <dict>
2070 <key>boolean_preference_name</key>
2071 <true/> | <false/>
2072 <key>string_preference_name</key>
2073 <string>string_value</string>
2074 </dict>
2075 </dict>
2076 ```
2077 #### JSON
2078 ```
2079 {
2080 "policies": {
2081 "Preferences": {
2082 "boolean_preference_name": true | false,
2083 "string_preference_name": "string_value"
2084 }
2085 }
2086 }
2087 ```
2088 ### PromptForDownloadLocation
2089 Ask where to save each file before downloading.
2090
2091 **Compatibility:** Firefox 68, Firefox ESR 68\
2092 **CCK2 Equivalent:** N/A
2093 **Preferences Affected:** `browser.download.useDownloadDir`
2094
2095 #### Windows
2096 ```
2097 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2098 ```
2099 #### macOS
2100 ```
2101 <dict>
2102 <key>PromptForDownloadLocation</key>
2103 <true/> | <false/>
2104 </dict>
2105 ```
2106 #### JSON
2107 ```
2108 {
2109 "policies": {
2110 "PromptForDownloadLocation": true | false
2111 }
2112 }
2113 ```
2114 ### Proxy
2115 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2116 To specify ports, append them to the hostnames with a colon (:).
2117
2118 `Mode` is the proxy method being used.
2119
2120 `Locked` is whether or not proxy settings can be changed.
2121
2122 `HTTPProxy` is the HTTP proxy server.
2123
2124 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2125
2126 `SSLProxy` is the SSL proxy server.
2127
2128 `FTPProxy` is the FTP proxy server.
2129
2130 `SOCKSProxy` is the SOCKS proxy server
2131
2132 `SOCKSVersion` is the SOCKS version (4 or 5)
2133
2134 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2135
2136 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2137
2138 `AutoLogin` means do not prompt for authentication if password is saved.
2139
2140 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2141
2142 **Compatibility:** Firefoox 60, Firefox ESR 60\
2143 **CCK2 Equivalent:** `networkProxy*`\
2144 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2145
2146 #### Windows
2147 ```
2148 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2149 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2150 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2151 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2152 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2153 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2154 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2155 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2156 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2157 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2158 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2159 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2160 ```
2161 #### macOS
2162 ```
2163 <dict>
2164 <key>Proxy</key>
2165 <dict>
2166 <key>Mode</key>
2167 <string>none | system | manual | autoDetect| autoConfig</string>
2168 <key>Locked</key>
2169 <true> | </false>
2170 <key>HTTPProxy</key>
2171 <string>https://httpproxy.example.com</string>
2172 <key>UseHTTPProxyForAllProtocols</key>
2173 <true> | </false>
2174 <key>SSLProxy</key>
2175 <string>https://sslproxy.example.com</string>
2176 <key>FTPProxy</key>
2177 <string>https://ftpproxy.example.com</string>
2178 <key>SOCKSProxy</key>
2179 <string>https://socksproxy.example.com</string>
2180 <key>SOCKSVersion</key>
2181 <string>4 | 5</string>
2182 <key>Passthrough</key>
2183 <string>&lt;local>&gt;</string>
2184 <key>AutoConfigURL</key>
2185 <string>URL_TO_AUTOCONFIG</string>
2186 <key>AutoLogin</key>
2187 <true> | </false>
2188 <key>UseProxyForDNS</key>
2189 <true> | </false>
2190 </dict>
2191 </dict>
2192 ```
2193 ### JSON
2194 ```
2195 {
2196 "policies": {
2197 "Proxy": {
2198 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2199 "Locked": [true, false],
2200 "HTTPProxy": "hostname",
2201 "UseHTTPProxyForAllProtocols": [true, false],
2202 "SSLProxy": "hostname",
2203 "FTPProxy": "hostname",
2204 "SOCKSProxy": "hostname",
2205 "SOCKSVersion": 4 | 5
2206 "Passthrough": "<local>",
2207 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2208 "AutoLogin": [true, false],
2209 "UseProxyForDNS": [true, false]
2210 }
2211 }
2212 }
2213 ```
2214 ### RequestedLocales
2215 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2216
2217 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2218
2219 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2220 **CCK2 Equivalent:** N/A\
2221 **Preferences Affected:** N/A
2222 #### Windows
2223 ```
2224 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2225 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2226
2227 or
2228
2229 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2230 ```
2231 #### macOS
2232 ```
2233 <dict>
2234 <key>RequestedLocales</key>
2235 <array>
2236 <string>de</string>
2237 <string>en-US</string>
2238 </array>
2239 </dict>
2240
2241 or
2242
2243 <dict>
2244 <key>RequestedLocales</key>
2245 <string>de,en-US</string>
2246 </dict>
2247
2248 ```
2249 #### JSON
2250 ```
2251 {
2252 "policies": {
2253 "RequestedLocales": ["de", "en-US"]
2254 }
2255 }
2256
2257 or
2258
2259 {
2260 "policies": {
2261 "RequestedLocales": "de,en-US"
2262 }
2263 }
2264 ```
2265 ### SanitizeOnShutdown (Selective)
2266 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2267
2268 **Compatibility:** Firefox 68, Firefox ESR 68\
2269 **CCK2 Equivalent:** N/A\
2270 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2271 #### Windows
2272 ```
2273 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2274 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2275 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2276 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2277 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2278 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2279 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2280 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2281 ```
2282 #### macOS
2283 ```
2284 <dict>
2285 <key>SanitizeOnShutdown</key>
2286 <dict>
2287 <key>Cache</key>
2288 <true/> | <false/>
2289 <key>Cookies</key>
2290 <true/> | <false/>
2291 <key>Downloads</key>
2292 <true/> | <false/>
2293 <key>FormData</key>
2294 <true/> | <false/>
2295 <key>History</key>
2296 <true/> | <false/>
2297 <key>Sessions</key>
2298 <true/> | <false/>
2299 <key>SiteSettings</key>
2300 <true/> | <false/>
2301 <key>OfflineApps</key>
2302 <true/> | <false/>
2303 </dict>
2304 </dict>
2305 ```
2306 #### JSON
2307 ```
2308 {
2309 "policies": {
2310 "SanitizeOnShutdown": {
2311 "Cache": true | false,
2312 "Cookies": true | false,
2313 "Downloads": true | false,
2314 "FormData": true | false,
2315 "History": true | false,
2316 "Sessions": true | false,
2317 "SiteSettings": true | false,
2318 "OfflineApps": true | false
2319 }
2320 }
2321 }
2322 ```
2323 ### SanitizeOnShutdown (All)
2324 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2325
2326 **Compatibility:** Firefox 60, Firefox ESR 60\
2327 **CCK2 Equivalent:** N/A\
2328 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2329 #### Windows
2330 ```
2331 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2332 ```
2333 #### macOS
2334 ```
2335 <dict>
2336 <key>SanitizeOnShutdown</key>
2337 <true/> | <false/>
2338 </dict>
2339 ```
2340 #### JSON
2341 ```
2342 {
2343 "policies": {
2344 "SanitizeOnShutdown": true | false
2345 }
2346 }
2347 ```
2348 ### SearchBar
2349 Set whether or not search bar is displayed.
2350
2351 **Compatibility:** Firefox 60, Firefox ESR 60\
2352 **CCK2 Equivalent:** `showSearchBar`\
2353 **Preferences Affected:** N/A
2354
2355 #### Windows
2356 ```
2357 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2358 ```
2359 #### macOS
2360 ```
2361 <dict>
2362 <key>SearchBar</key>
2363 <string>unified | separate</string>
2364 </dict>
2365 ```
2366
2367 #### JSON
2368 ```
2369 {
2370 "policies": {
2371 "SearchBar": "unified" | "separate"
2372 }
2373 }
2374 ```
2375
2376
2377
2378
2379
2380 ### SearchEngines (This policy is only available on the ESR.)
2381
2382 ### SearchEngines | Default
2383
2384 Set the default search engine. This policy is only available on the ESR.
2385
2386 **Compatibility:** Firefox ESR 60\
2387 **CCK2 Equivalent:** `defaultSearchEngine`\
2388 **Preferences Affected:** N/A
2389
2390 ### Windows
2391 ```
2392 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2393 ```
2394 #### macOS
2395 ```
2396 <dict>
2397 <key>SearchEngines</key>
2398 <dict>
2399 <key>Default</key>
2400 <string>NAME_OF_SEARCH_ENGINE</string>
2401 </dict>
2402 </dict>
2403 ```
2404 ### JSON
2405 ```
2406 {
2407 "policies": {
2408 "SearchEngines": {
2409 "Default": "NAME_OF_SEARCH_ENGINE"
2410 }
2411 }
2412 }
2413 ```
2414 ### SearchEngines | PreventInstalls
2415
2416 Prevent installing search engines from webpages.
2417
2418 **Compatibility:** Firefox ESR 60\
2419 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2420 **Preferences Affected:** N/A
2421
2422 ### Windows
2423 ```
2424 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2425 ```
2426 #### macOS
2427 ```
2428 <dict>
2429 <key>SearchEngines</key>
2430 <dict>
2431 <key>PreventInstalls</key>
2432 <true/> | <false/>
2433 </dict>
2434 </dict>
2435 ```
2436 ### JSON
2437 ```
2438 {
2439 "policies": {
2440 "SearchEngines": {
2441 "PreventInstalls": true | false
2442 }
2443 }
2444 }
2445 ```
2446 ### SearchEngines | Remove
2447
2448 Hide built-in search engines. This policy is only available on the ESR.
2449
2450 **Compatibility:** Firefox ESR 60.2\
2451 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2452 **Preferences Affected:** N/A
2453
2454 ### Windows
2455 ```
2456 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2457 ```
2458 #### macOS
2459 ```
2460 <dict>
2461 <key>SearchEngines</key>
2462 <dict>
2463 <key>Remove</key>
2464 <array>
2465 <string>NAME_OF_SEARCH_ENGINE</string>
2466 </array>
2467 </dict>
2468 </dict>
2469 ```
2470 ### JSON
2471 ```
2472 {
2473 "policies": {
2474 "SearchEngines": {
2475 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2476 }
2477 }
2478 }
2479 ```
2480 ### SearchEngines | Add
2481
2482 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2483
2484 `Name` is the name of the search engine.
2485
2486 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2487
2488 `Method` is either GET or POST
2489
2490 `IconURL` is a URL for the icon to use.
2491
2492 `Alias` is a keyword to use for the engine.
2493
2494 `Description` is a description of the search engine.
2495
2496 `PostData` is the POST data as name value pairs separated by &.
2497
2498 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2499
2500 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2501 **CCK2 Equivalent:** `searchplugins`\
2502 **Preferences Affected:** N/A
2503
2504 #### Windows
2505 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2506 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2507 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2508 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2509 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2510 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2511 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2512 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2513
2514 #### macOS
2515 ```
2516 <dict>
2517 <key>SearchEngines</key>
2518 <dict>
2519 <key>Add</key>
2520 <array>
2521 <dict>
2522 <key>Name</key>
2523 <string>Example1</string>
2524 <key>URLTemplate</key>
2525 <string>https://www.example.org/q={searchTerms}</string>
2526 <key>Method</key>
2527 <string>GET | POST </string>
2528 <key>IconURL</key>
2529 <string>https://www.example.org/favicon.ico</string>
2530 <key>Alias</key>
2531 <string>example</string>
2532 <key>Description</key>
2533 <string>Example Description</string>
2534 <key>SuggestURLTemplate</key>
2535 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2536 <key>PostData</key>
2537 <string>name=value&q={searchTerms}</string>
2538 </dict>
2539 <array>
2540 </dict>
2541 </dict>
2542 ```
2543 ### JSON
2544 ```
2545 {
2546 "policies": {
2547 "SearchEngines": {
2548 "Add": [
2549 {
2550 "Name": "Example1",
2551 "URLTemplate": "https://www.example.org/q={searchTerms}",
2552 "Method": "GET" | "POST",
2553 "IconURL": "https://www.example.org/favicon.ico",
2554 "Alias": "example",
2555 "Description": "Description",
2556 "PostData": "name=value&q={searchTerms}",
2557 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2558 }
2559 ]
2560 }
2561 }
2562 }
2563 ```
2564 ### SearchSuggestEnabled
2565
2566 Enable search suggestions.
2567
2568 **Compatibility:** Firefox 68, Firefox ESR 68\
2569 **CCK2 Equivalent:** N/A\
2570 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2571
2572 ### Windows
2573 ```
2574 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2575 ```
2576 #### macOS
2577 ```
2578 <dict>
2579 <key>SearchSuggestEnabled</key>
2580 <true/> | <false/>
2581 </dict>
2582 ```
2583 ### JSON
2584 ```
2585 {
2586 "policies": {
2587 "SearchSuggestEnabled": true | false
2588 }
2589 }
2590 ```
2591 ### SecurityDevices
2592
2593 Install PKCS #11 modules.
2594
2595 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2596 **CCK2 Equivalent:** `certs.devices`\
2597 **Preferences Affected:** N/A
2598
2599 #### Windows
2600 ```
2601 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2602 ```
2603 #### macOS
2604 ```
2605 <dict>
2606 <key>SecurityDevices</key>
2607 <dict>
2608 <key>NAME_OF_DEVICE</key>
2609 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2610 </dict>
2611 </dict>
2612 ```
2613
2614 #### JSON
2615 ```
2616 {
2617 "policies": {
2618 "SecurityDevices": {
2619 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2620 }
2621 }
2622 }
2623 ```
2624 ### SSLVersionMax
2625
2626 Set and lock the maximum version of TLS.
2627
2628 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2629 **CCK2 Equivalent:** N/A\
2630 **Preferences Affected:** `security.tls.version.max`
2631
2632 #### Windows
2633 ```
2634 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2635 ```
2636 #### macOS
2637 ```
2638 <dict>
2639 <key>SSLVersionMax</key>
2640 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2641 </dict>
2642 ```
2643
2644 #### JSON
2645 ```
2646 {
2647 "policies": {
2648 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2649 }
2650 }
2651 ```
2652 ### SSLVersionMin
2653
2654 Set and lock the minimum version of TLS.
2655
2656 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2657 **CCK2 Equivalent:** N/A\
2658 **Preferences Affected:** `security.tls.version.min`
2659
2660 #### Windows
2661 ```
2662 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2663 ```
2664 #### macOS
2665 ```
2666 <dict>
2667 <key>SSLVersionMin</key>
2668 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2669 </dict>
2670 ```
2671
2672 #### JSON
2673 ```
2674 {
2675 "policies": {
2676 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2677 }
2678 }
2679 ```
2680 ### WebsiteFilter
2681 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2682
2683 **Compatibility:** Firefox 60, Firefox ESR 60\
2684 **CCK2 Equivalent:** N/A\
2685 **Preferences Affected:** N/A
2686
2687 #### Windows
2688 ```
2689 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2690 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2691 ```
2692 #### macOS
2693 ```
2694 <dict>
2695 <key>WebsiteFilter</key>
2696 <dict>
2697 <key>Block</key>
2698 <array>
2699 <string><all_urls></string>
2700 </array>
2701 <key>Exceptions</key>
2702 <array>
2703 <string>http://example.org/*</string>
2704 </array>
2705 </dict>
2706
2707 </dict>
2708 ```
2709 ### JSON
2710 ```
2711 {
2712 "policies": {
2713 "WebsiteFilter": {
2714 "Block": ["<all_urls>"],
2715 "Exceptions": ["http://example.org/*"]
2716 }
2717 }
2718 }
2719 ```

patrick-canterino.de