]> git.p6c8.net - policy-templates.git/blob - README.md
Add some better examples, point to new ID addon.
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
573
574 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
575 **CCK2 Equivalent:** N/A\
576 **Preferences Affected:** `security.enterprise_roots.enabled`
577
578 #### Windows (GPO)
579 ```
580 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
581 ```
582 #### Windows (Intune)
583 OMA-URI:
584 ```
585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
586 ```
587 Value (string):
588 ```
589 <enabled/> or <disabled/>
590 ```
591 #### macOS
592 ```
593 <dict>
594 <key>Certificates</key>
595 <dict>
596 <key>ImportEnterpriseRoots</key>
597 <true/> | <false/>
598 </dict>
599 </dict>
600 ```
601 #### policies.json
602 ```
603 {
604 "policies": {
605 "Certificates": {
606 "ImportEnterpriseRoots": true | false
607 }
608 }
609 }
610 ```
611 ### Certificates | Install
612
613 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
614
615 - Windows
616 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
617 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
618 - macOS
619 - /Library/Application Support/Mozilla/Certificates
620 - ~/Library/Application Support/Mozilla/Certificates
621 - Linux
622 - /usr/lib/mozilla/certificates
623 - /usr/lib64/mozilla/certificates
624 - ~/.mozilla/certificates
625
626 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
627
628 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
629
630 Certificates are installed using the trust string `CT,CT,`.
631
632 Binary (DER) and ASCII (PEM) certificates are both supported.
633
634 **Compatibility:** Firefox 64, Firefox ESR 64\
635 **CCK2 Equivalent:** `certs.ca`\
636 **Preferences Affected:** N/A
637
638 #### Windows (GPO)
639 ```
640 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
641 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
642 ```
643 #### Windows (Intune)
644 OMA-URI:
645 ```
646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
647 ```
648 Value (string):
649 ```
650 <enabled/>
651 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
652 ```
653 #### macOS
654 ```
655 <dict>
656 <key>Certificates</key>
657 <dict>
658 <key>Install</key>
659 <array>
660 <string>cert1.der</string>
661 <string>/Users/username/cert2.pem</string>
662 </array>
663 </dict>
664 </dict>
665 ```
666 #### policies.json
667 ```
668 {
669 "policies": {
670 "Certificates": {
671 "Install": ["cert1.der", "/home/username/cert2.pem"]
672 }
673 }
674 }
675 ```
676 ### Cookies
677 Configure cookie preferences.
678
679 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
680
681 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
682
683 `Default` determines whether cookies are accepted at all.
684
685 `AcceptThirdParty` determines how third-party cookies are handled.
686
687 `ExpireAtSessionEnd` determines when cookies expire.
688
689 `RejectTracker` only rejects cookies for trackers.
690
691 `Locked` prevents the user from changing cookie preferences.
692
693 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
694 **CCK2 Equivalent:** N/A\
695 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
696
697 #### Windows (GPO)
698 ```
699 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
700 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
701 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
702 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
703 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
706 ```
707 #### Windows (Intune)
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
711 ```
712 Value (string):
713 ```
714 <enabled/>
715 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
716 ```
717 OMA-URI:
718 ```
719 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
720 ```
721 Value (string):
722 ```
723 <enabled/>
724 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
725 ```
726 OMA-URI:
727 ```
728 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
729 ```
730 Value (string):
731 ```
732 <enabled/> or <disabled/>
733 ```
734 OMA-URI:
735 ```
736 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
737 ```
738 Value (string):
739 ```
740 <enabled/>
741 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
742 ```
743 OMA-URI:
744 ```
745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
746 ```
747 Value (string):
748 ```
749 <enabled/> or <disabled/>
750 ```
751 OMA-URI:
752 ```
753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
754 ```
755 Value (string):
756 ```
757 <enabled/> or <disabled/>
758 ```
759 OMA-URI:
760 ```
761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
762 ```
763 Value (string):
764 ```
765 <enabled/> or <disabled/>
766 ```
767 #### macOS
768 ```
769 <dict>
770 <key>Cookies</key>
771 <dict>
772 <key>Allow</key>
773 <array>
774 <string>http://example.com</string>
775 </array>
776 <key>Block</key>
777 <array>
778 <string>http://example.org</string>
779 </array>
780 <key>Default</key>
781 <true/> | <false/>
782 <key>AcceptThirdParty</key>
783 <string>always | never | from-visited</string>
784 <key>ExpireAtSessionEnd</key>
785 <true/> | <false/>
786 <key>RejectTracker</key>
787 <true/> | <false/>
788 <key>Locked</key>
789 <true/> | <false/>
790 </dict>
791 </dict>
792 ```
793 #### policies.json
794 ```
795 {
796 "policies": {
797 "Cookies": {
798 "Allow": ["http://example.org/"],
799 "Block": ["http://example.edu/"],
800 "Default": true | false,
801 "AcceptThirdParty": "always" | "never" | "from-visited",
802 "ExpireAtSessionEnd": true | false,
803 "RejectTracker": true | false,
804 "Locked": true | false
805 }
806 }
807 }
808 ```
809 ### DisableSetDesktopBackground
810 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
811
812 **Compatibility:** Firefox 60, Firefox ESR 60\
813 **CCK2 Equivalent:** `removeSetDesktopBackground`\
814 **Preferences Affected:** N/A
815
816 #### Windows (GPO)
817 ```
818 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
819 ```
820 #### Windows (Intune)
821 OMA-URI:
822 ```
823 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
824 ```
825 Value (string):
826 ```
827 <enabled/> or <disabled/>
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableSetDesktopBackground</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableSetDesktopBackground": true | false
841 }
842 }
843 ```
844 ### DisableMasterPasswordCreation
845 Remove the master password functionality.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `noMasterPassword`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
854 ```
855 #### Windows (Intune)
856 OMA-URI:
857 ```
858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
859 ```
860 Value (string):
861 ```
862 <enabled/> or <disabled/>
863 ```
864 #### macOS
865 ```
866 <dict>
867 <key>DisableMasterPasswordCreation</key>
868 <true/> | <false/>
869 </dict>
870 ```
871 #### policies.json
872 ```
873 {
874 "policies": {
875 "DisableMasterPasswordCreation": true | false
876 }
877 }
878 ```
879 ### DisableAppUpdate
880 Turn off application updates.
881
882 **Compatibility:** Firefox 60, Firefox ESR 60\
883 **CCK2 Equivalent:** `disableFirefoxUpdates`\
884 **Preferences Affected:** N/A
885
886 #### Windows (GPO)
887 ```
888 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
889 ```
890 #### Windows (Intune)
891 OMA-URI:
892 ```
893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
894 ```
895 Value (string):
896 ```
897 <enabled/> or <disabled/>
898 ```
899 #### macOS
900 ```
901 <dict>
902 <key>DisableAppUpdate</key>
903 <true/> | <false/>
904 </dict>
905 ```
906 #### policies.json
907 ```
908 {
909 "policies": {
910 "DisableAppUpdate": true | false
911 }
912 }
913 ```
914 ### DisableBuiltinPDFViewer
915 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
916
917 **Compatibility:** Firefox 60, Firefox ESR 60\
918 **CCK2 Equivalent:** `disablePDFjs`\
919 **Preferences Affected:** `pdfjs.disabled`
920
921 #### Windows (GPO)
922 ```
923 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
924 ```
925 #### Windows (Intune)
926 OMA-URI:
927 ```
928 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
929 ```
930 Value (string):
931 ```
932 <enabled/> or <disabled/>
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisableBuiltinPDFViewer</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisableBuiltinPDFViewer": true | false
946 }
947 }
948 ```
949 ### DisabledCiphers
950 Disable specific cryptographic ciphers.
951
952 ---
953 **Note:**
954
955 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
956
957 ---
958 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
959 **CCK2 Equivalent:** N/A\
960 **Preferences Affected:** N/A
961
962 #### Windows (GPO)
963 ```
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
975 ```
976 #### Windows (Intune)
977 OMA-URI:
978 ```
979 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
990 ```
991 Value (string):
992 ```
993 <enabled/> or <disabled/>
994 ```
995 #### macOS
996 ```
997 <dict>
998 <key>DisabledCiphers</key>
999 <dict>
1000 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1005 <true/> | <false/>
1006 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1007 <true/> | <false/>
1008 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1009 <true/> | <false/>
1010 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1011 <true/> | <false/>
1012 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1013 <true/> | <false/>
1014 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1015 <true/> | <false/>
1016 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1017 <true/> | <false/>
1018 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1019 <true/> | <false/>
1020 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1021 <true/> | <false/>
1022 </dict>
1023 </dict>
1024 ```
1025 #### policies.json
1026 ```
1027 {
1028 "policies": {
1029 "DisabledCiphers" {
1030 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1031 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1032 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1035 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1037 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1039 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1040 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1041 }
1042 }
1043 }
1044 ```
1045 ### DisableDefaultBrowserAgent
1046 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1047
1048 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1049 **CCK2 Equivalent:** N/A\
1050 **Preferences Affected:** N/A
1051
1052 #### Windows (GPO)
1053 ```
1054 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1055 ```
1056 #### Windows (Intune)
1057 OMA-URI:
1058 ```
1059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1060 ```
1061 Value (string):
1062 ```
1063 <enabled/> or <disabled/>
1064 ```
1065 #### policies.json
1066 ```
1067 {
1068 "policies": {
1069 "DisableDefaultBrowserAgent": true | false
1070 }
1071 }
1072 ```
1073 ### DisableDeveloperTools
1074 Remove access to all developer tools.
1075
1076 **Compatibility:** Firefox 60, Firefox ESR 60\
1077 **CCK2 Equivalent:** `removeDeveloperTools`\
1078 **Preferences Affected:** `devtools.policy.disabled`
1079
1080 #### Windows (GPO)
1081 ```
1082 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1083 ```
1084 #### Windows (Intune)
1085 OMA-URI:
1086 ```
1087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1088 ```
1089 Value (string):
1090 ```
1091 <enabled/> or <disabled/>
1092 ```
1093 #### macOS
1094 ```
1095 <dict>
1096 <key>DisableDeveloperTools</key>
1097 <true/> | <false/>
1098 </dict>
1099 ```
1100 #### policies.json
1101 ```
1102 {
1103 "policies": {
1104 "DisableDeveloperTools": true | false
1105 }
1106 }
1107 ```
1108 ### DisableFeedbackCommands
1109 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1110
1111 **Compatibility:** Firefox 60, Firefox ESR 60\
1112 **CCK2 Equivalent:** N/A\
1113 **Preferences Affected:** N/A
1114
1115 #### Windows (GPO)
1116 ```
1117 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1118 ```
1119 #### Windows (Intune)
1120 OMA-URI:
1121 ```
1122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1123 ```
1124 Value (string):
1125 ```
1126 <enabled/> or <disabled/>
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisableFeedbackCommands</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisableFeedbackCommands": true | false
1140 }
1141 }
1142 ```
1143 ### DisableFirefoxScreenshots
1144 Remove access to Firefox Screenshots.
1145
1146 **Compatibility:** Firefox 60, Firefox ESR 60\
1147 **CCK2 Equivalent:** N/A\
1148 **Preferences Affected:** `extensions.screenshots.disabled`
1149
1150 #### Windows (GPO)
1151 ```
1152 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1153 ```
1154 #### Windows (Intune)
1155 OMA-URI:
1156 ```
1157 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1158 ```
1159 Value (string):
1160 ```
1161 <enabled/> or <disabled/>
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisableFirefoxScreenshots</key>
1167 <true/> | <false/>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisableFirefoxScreenshots": true | false
1175 }
1176 }
1177 ```
1178 ### DisableFirefoxAccounts
1179 Disable Firefox Accounts integration (Sync).
1180
1181 **Compatibility:** Firefox 60, Firefox ESR 60\
1182 **CCK2 Equivalent:** `disableSync`\
1183 **Preferences Affected:** `identity.fxaccounts.enabled`
1184
1185 #### Windows (GPO)
1186 ```
1187 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1188 ```
1189 #### Windows (Intune)
1190 OMA-URI:
1191 ```
1192 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1193 ```
1194 Value (string):
1195 ```
1196 <enabled/> or <disabled/>
1197 ```
1198 #### macOS
1199 ```
1200 <dict>
1201 <key>DisableFirefoxAccounts</key>
1202 <true/> | <false/>
1203 </dict>
1204 ```
1205 #### policies.json
1206 ```
1207 {
1208 "policies": {
1209 "DisableFirefoxAccounts": true | false
1210 }
1211 }
1212 ```
1213 ### DisableFirefoxStudies
1214 Disable Firefox studies (Shield).
1215
1216 **Compatibility:** Firefox 60, Firefox ESR 60\
1217 **CCK2 Equivalent:** N/A\
1218 **Preferences Affected:** N/A
1219
1220 #### Windows (GPO)
1221 ```
1222 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1223 ```
1224 #### Windows (Intune)
1225 OMA-URI:
1226 ```
1227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1228 ```
1229 Value (string):
1230 ```
1231 <enabled/> or <disabled/>
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>DisableFirefoxStudies</key>
1237 <true/> | <false/>
1238 </dict>
1239 ```
1240 #### policies.json
1241 ```
1242 {
1243 "policies": {
1244 "DisableFirefoxStudies": true | false
1245 }
1246 }
1247 ```
1248 ### DisableForgetButton
1249 Disable the "Forget" button.
1250
1251 **Compatibility:** Firefox 60, Firefox ESR 60\
1252 **CCK2 Equivalent:** `disableForget`\
1253 **Preferences Affected:** N/A
1254
1255 #### Windows (GPO)
1256 ```
1257 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1258 ```
1259 #### Windows (Intune)
1260 OMA-URI:
1261 ```
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1263 ```
1264 Value (string):
1265 ```
1266 <enabled/> or <disabled/>
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DisableForgetButton</key>
1272 <true/> | <false/>
1273 </dict>
1274 ```
1275 #### policies.json
1276 ```
1277 {
1278 "policies": {
1279 "DisableForgetButton": true | false
1280 }
1281 }
1282 ```
1283 ### DisableFormHistory
1284 Turn off saving information on web forms and the search bar.
1285
1286 **Compatibility:** Firefox 60, Firefox ESR 60\
1287 **CCK2 Equivalent:** `disableFormFill`\
1288 **Preferences Affected:** ` browser.formfill.enable`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1293 ```
1294 #### Windows (Intune)
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/> or <disabled/>
1302 ```
1303 #### macOS
1304 ```
1305 <dict>
1306 <key>DisableFormHistory</key>
1307 <true/> | <false/>
1308 </dict>
1309 ```
1310 #### policies.json
1311 ```
1312 {
1313 "policies": {
1314 "DisableFormHistory": true | false
1315 }
1316 }
1317 ```
1318 ### DisablePasswordReveal
1319 Do not allow passwords to be shown in saved logins
1320
1321 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1322 **CCK2 Equivalent:** N/A
1323 **Preferences Affected:** N/A
1324
1325 #### Windows (GPO)
1326 ```
1327 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1328 ```
1329 #### Windows (Intune)
1330 OMA-URI:
1331 ```
1332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1333 ```
1334 Value (string):
1335 ```
1336 <enabled/> or <disabled/>
1337 ```
1338 #### macOS
1339 ```
1340 <dict>
1341 <key>DisablePasswordReveal</key>
1342 <true/> | <false/>
1343 </dict>
1344 ```
1345 #### policies.json
1346 ```
1347 {
1348 "policies": {
1349 "DisablePasswordReveal": true | false
1350 }
1351 }
1352 ```
1353 ### DisablePocket
1354 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1355
1356 **Compatibility:** Firefox 60, Firefox ESR 60\
1357 **CCK2 Equivalent:** `disablePocket`\
1358 **Preferences Affected:** `extensions.pocket.enabled`
1359
1360 #### Windows (GPO)
1361 ```
1362 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1363 ```
1364 #### Windows (Intune)
1365 OMA-URI:
1366 ```
1367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1368 ```
1369 Value (string):
1370 ```
1371 <enabled/> or <disabled/>
1372 ```
1373 #### macOS
1374 ```
1375 <dict>
1376 <key>DisablePocket</key>
1377 <true/> | <false/>
1378 </dict>
1379 ```
1380 #### policies.json
1381 ```
1382 {
1383 "policies": {
1384 "DisablePocket": true | false
1385 }
1386 }
1387 ```
1388 ### DisablePrivateBrowsing
1389 Remove access to private browsing.
1390
1391 **Compatibility:** Firefox 60, Firefox ESR 60\
1392 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1393 **Preferences Affected:** N/A
1394
1395 #### Windows (GPO)
1396 ```
1397 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1398 ```
1399 #### Windows (Intune)
1400 OMA-URI:
1401 ```
1402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1403 ```
1404 Value (string):
1405 ```
1406 <enabled/> or <disabled/>
1407 ```
1408 #### macOS
1409 ```
1410 <dict>
1411 <key>DisablePrivateBrowsing</key>
1412 <true/> | <false/>
1413 </dict>
1414 ```
1415 #### policies.json
1416 ```
1417 {
1418 "policies": {
1419 "DisablePrivateBrowsing": true | false
1420 }
1421 }
1422 ```
1423 ### DisableProfileImport
1424 Disables the "Import data from another browser" option in the bookmarks window.
1425
1426 **Compatibility:** Firefox 60, Firefox ESR 60\
1427 **CCK2 Equivalent:** N/A\
1428 **Preferences Affected:** N/A
1429
1430 #### Windows (GPO)
1431 ```
1432 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1433 ```
1434 #### Windows (Intune)
1435 OMA-URI:
1436 ```
1437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1438 ```
1439 Value (string):
1440 ```
1441 <enabled/> or <disabled/>
1442 ```
1443 #### macOS
1444 ```
1445 <dict>
1446 <key>DisableProfileImport</key>
1447 <true/> | <false/>
1448 </dict>
1449 ```
1450 #### policies.json
1451 ```
1452 {
1453 "policies": {
1454 "DisableProfileImport": true | false
1455 }
1456 }
1457 ```
1458 ### DisableProfileRefresh
1459 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1460
1461 **Compatibility:** Firefox 60, Firefox ESR 60\
1462 **CCK2 Equivalent:** `disableResetFirefox`\
1463 **Preferences Affected:** `browser.disableResetPrompt`
1464
1465 #### Windows (GPO)
1466 ```
1467 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1468 ```
1469 #### Windows (Intune)
1470 OMA-URI:
1471 ```
1472 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1473 ```
1474 Value (string):
1475 ```
1476 <enabled/> or <disabled/>
1477 ```
1478 #### macOS
1479 ```
1480 <dict>
1481 <key>DisableProfileRefresh</key>
1482 <true/> | <false/>
1483 </dict>
1484 ```
1485 #### policies.json
1486 ```
1487 {
1488 "policies": {
1489 "DisableProfileRefresh": true | false
1490 }
1491 }
1492 ```
1493 ### DisableSafeMode
1494 Disable safe mode within the browser.
1495
1496 On Windows, this disables safe mode via the command line as well.
1497
1498 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1499 **CCK2 Equivalent:** `disableSafeMode`\
1500 **Preferences Affected:** N/A
1501
1502 #### Windows (GPO)
1503 ```
1504 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1505 ```
1506 #### Windows (Intune)
1507 OMA-URI:
1508 ```
1509 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1510 ```
1511 Value (string):
1512 ```
1513 <enabled/> or <disabled/>
1514 ```
1515 #### macOS
1516 ```
1517 <dict>
1518 <key>DisableSafeMode</key>
1519 <true/> | <false/>
1520 </dict>
1521 ```
1522 #### policies.json
1523 ```
1524 {
1525 "policies": {
1526 "DisableSafeMode": true | false
1527 }
1528 }
1529 ```
1530 ### DisableSecurityBypass
1531 Prevent the user from bypassing security in certain cases.
1532
1533 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1534
1535 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1536
1537 **Compatibility:** Firefox 60, Firefox ESR 60\
1538 **CCK2 Equivalent:** N/A\
1539 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1540
1541 #### Windows (GPO)
1542 ```
1543 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1545 ```
1546 #### Windows (Intune)
1547 OMA-URI:
1548 ```
1549 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1550 ```
1551 Value (string):
1552 ```
1553 <enabled/> or <disabled/>
1554 ```
1555 OMA-URI:
1556 ```
1557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1558 ```
1559 Value (string):
1560 ```
1561 <enabled/> or <disabled/>
1562 ```
1563
1564 #### macOS
1565 ```
1566 <dict>
1567 <key>DisableSecurityBypass</key>
1568 <dict>
1569 <key>InvalidCertificate</key>
1570 <true/> | <false/>
1571 <key><SafeBrowsing/key>
1572 <true/> | <false/>
1573 </dict>
1574 </dict>
1575 ```
1576 #### policies.json
1577 ```
1578 {
1579 "policies": {
1580 "DisableSecurityBypass": {
1581 "InvalidCertificate": true | false,
1582 "SafeBrowsing": true | false
1583 }
1584 }
1585 }
1586 ```
1587 ### DisableSystemAddonUpdate
1588 Prevent system add-ons from being installed or update.
1589
1590 **Compatibility:** Firefox 60, Firefox ESR 60\
1591 **CCK2 Equivalent:** N/A\
1592 **Preferences Affected:** N/A
1593
1594 #### Windows (GPO)
1595 ```
1596 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1597 ```
1598 #### Windows (Intune)
1599 OMA-URI:
1600 ```
1601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1602 ```
1603 Value (string):
1604 ```
1605 <enabled/> or <disabled/>
1606 ```
1607 #### macOS
1608 ```
1609 <dict>
1610 <key>DisableSystemAddonUpdate</key>
1611 <true/> | <false/>
1612 </dict>
1613 ```
1614 #### policies.json
1615 ```
1616 {
1617 "policies": {
1618 "DisableSystemAddonUpdate": true | false
1619 }
1620 }
1621 ```
1622 ### DisableTelemetry
1623 Prevent the upload of telemetry data.
1624
1625 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1626
1627 **Compatibility:** Firefox 60, Firefox ESR 60\
1628 **CCK2 Equivalent:** `disableTelemetry`\
1629 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1630
1631 #### Windows (GPO)
1632 ```
1633 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1634 ```
1635 #### Windows (Intune)
1636 OMA-URI:
1637 ```
1638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1639 ```
1640 Value (string):
1641 ```
1642 <enabled/> or <disabled/>
1643 ```
1644 #### macOS
1645 ```
1646 <dict>
1647 <key>DisableTelemetry</key>
1648 <true/> | <false/>
1649 </dict>
1650 ```
1651 #### policies.json
1652 ```
1653 {
1654 "policies": {
1655 "DisableTelemetry": true | false
1656 }
1657 }
1658 ```
1659 ### DisplayBookmarksToolbar
1660 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1661
1662 **Compatibility:** Firefox 60, Firefox ESR 60\
1663 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1664 **Preferences Affected:** N/A
1665
1666 #### Windows (GPO)
1667 ```
1668 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1669 ```
1670 #### Windows (Intune)
1671 OMA-URI:
1672 ```
1673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1674 ```
1675 Value (string):
1676 ```
1677 <enabled/> or <disabled/>
1678 ```
1679 #### macOS
1680 ```
1681 <dict>
1682 <key>DisplayBookmarksToolbar</key>
1683 <true/> | <false/>
1684 </dict>
1685 ```
1686 #### policies.json
1687 ```
1688 {
1689 "policies": {
1690 "DisplayBookmarksToolbar": true | false
1691 }
1692 }
1693 ```
1694 ### DisplayMenuBar (Deprecated)
1695 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1696
1697 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1698 **CCK2 Equivalent:** `displayMenuBar`\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1704 ```
1705 #### macOS
1706 ```
1707 <dict>
1708 <key>DisplayMenuBar</key>
1709 <true/> | <false/>
1710 </dict>
1711 ```
1712 #### policies.json
1713 ```
1714 {
1715 "policies": {
1716 "DisplayMenuBar": true | false
1717 }
1718 }
1719 ```
1720 ### DisplayMenuBar
1721 Set the state of the menubar.
1722
1723 `always` means the menubar is shown and cannot be hidden.
1724
1725 `never` means the menubar is hidden and cannot be shown.
1726
1727 `default-on` means the menubar is on by default but can be hidden.
1728
1729 `default-off` means the menubar is off by default but can be shown.
1730
1731 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1732 **CCK2 Equivalent:** `displayMenuBar`\
1733 **Preferences Affected:** N/A
1734
1735 #### Windows (GPO)
1736 ```
1737 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1738 ```
1739 #### Windows (Intune)
1740 OMA-URI:
1741 ```
1742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1743 ```
1744 Value (string):
1745 ```
1746 <enabled/>
1747 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1748 ```
1749 #### macOS
1750 ```
1751 <dict>
1752 <key>DisplayMenuBar</key>
1753 <string>always | never | default-on | default-off</string>
1754 </dict>
1755 ```
1756 #### policies.json
1757 ```
1758 {
1759 "policies": {
1760 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1761 }
1762 }
1763 ```
1764 ### DNSOverHTTPS
1765 Configure DNS over HTTPS.
1766
1767 `Enabled` determines whether DNS over HTTPS is enabled
1768
1769 `ProviderURL` is a URL to another provider.
1770
1771 `Locked` prevents the user from changing DNS over HTTPS preferences.
1772
1773 `ExcludedDomains` excludes domains from DNS over HTTPS.
1774
1775 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1776 **CCK2 Equivalent:** N/A\
1777 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1778
1779 #### Windows (GPO)
1780 ```
1781 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1785 ```
1786 #### Windows (Intune)
1787 OMA-URI:
1788 ```
1789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1790 ```
1791 Value (string):
1792 ```
1793 <enabled/> or <disabled/>
1794 ```
1795 OMA-URI:
1796 ```
1797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1798 ```
1799 Value (string):
1800 ```
1801 <enabled/>
1802 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1803 ```
1804 OMA-URI:
1805 ```
1806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1807 ```
1808 Value (string):
1809 ```
1810 <enabled/> or <disabled/>
1811 ```
1812 OMA-URI:
1813 ```
1814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1815 ```
1816 Value (string):
1817 ```
1818 <enabled/>
1819 <data id="List" value="1&#xF000;example.com"/>
1820 ```
1821 #### macOS
1822 ```
1823 <dict>
1824 <key>DNSOverHTTPS</key>
1825 <dict>
1826 <key>Enabled</key>
1827 <true/> | <false/>
1828 <key>ProviderURL</key>
1829 <string>URL_TO_ALTERNATE_PROVIDER</string>
1830 <key>Locked</key>
1831 <true/> | <false/>
1832 <key>ExcludedDomains</key>
1833 <array>
1834 <string>example.com</string>
1835 </array>
1836 </dict>
1837 </dict>
1838 ```
1839 #### policies.json
1840 ```
1841 {
1842 "policies": {
1843 "DNSOverHTTPS": {
1844 "Enabled": true | false,
1845 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1846 "Locked": true | false,
1847 "ExcludedDomains": ["example.com"]
1848 }
1849 }
1850 }
1851 ```
1852 ### DontCheckDefaultBrowser
1853 Don't check if Firefox is the default browser at startup.
1854
1855 **Compatibility:** Firefox 60, Firefox ESR 60\
1856 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1857 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1858
1859 #### Windows (GPO)
1860 ```
1861 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1862 ```
1863 #### Windows (Intune)
1864 OMA-URI:
1865 ```
1866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1867 ```
1868 Value (string):
1869 ```
1870 <enabled/> or <disabled/>
1871 ```
1872 #### macOS
1873 ```
1874 <dict>
1875 <key>DontCheckDefaultBrowser</key>
1876 <true/> | <false/>
1877 </dict>
1878 ```
1879 #### policies.json
1880 ```
1881 {
1882 "policies": {
1883 "DontCheckDefaultBrowser": true | false
1884 }
1885 }
1886 ```
1887 ### DefaultDownloadDirectory
1888 Set the default download directory.
1889
1890 You can use ${home} for the native home directory.
1891
1892 **Compatibility:** Firefox 68, Firefox ESR 68\
1893 **CCK2 Equivalent:** N/A\
1894 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1895
1896 #### Windows (GPO)
1897 ```
1898 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1899 ```
1900 #### Windows (Intune)
1901 OMA-URI:
1902 ```
1903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1904 ```
1905 Value (string):
1906 ```
1907 <enabled/>
1908 <data id="Preferences_String" value="${home}\Downloads"/>
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>DefaultDownloadDirectory</key>
1914 <string>${home}/Downloads</string>
1915 </dict>
1916 ```
1917 #### policies.json (macOS and Linux)
1918 ```
1919 {
1920 "policies": {
1921 "DefaultDownloadDirectory": "${home}/Downloads"
1922 }
1923 ```
1924 #### policies.json (Windows)
1925 ```
1926 {
1927 "policies": {
1928 "DefaultDownloadDirectory": "${home}\\Downloads"
1929 }
1930 ```
1931 ### DownloadDirectory
1932 Set and lock the download directory.
1933
1934 You can use ${home} for the native home directory.
1935
1936 **Compatibility:** Firefox 68, Firefox ESR 68\
1937 **CCK2 Equivalent:** N/A\
1938 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1939
1940 #### Windows (GPO)
1941 ```
1942 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1943 ```
1944 #### Windows (Intune)
1945 OMA-URI:
1946 ```
1947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1948 ```
1949 Value (string):
1950 ```
1951 <enabled/>
1952 <data id="Preferences_String" value="${home}\Downloads"/>
1953 ```
1954 #### macOS
1955 ```
1956 <dict>
1957 <key>DownloadDirectory</key>
1958 <string>${home}/Downloads</string>
1959 </dict>
1960 ```
1961 #### policies.json (macOS and Linux)
1962 ```
1963 {
1964 "policies": {
1965 "DownloadDirectory": "${home}/Downloads"
1966 }
1967 ```
1968 #### policies.json (Windows)
1969 ```
1970 {
1971 "policies": {
1972 "DownloadDirectory": "${home}\\Downloads"
1973 }
1974 ```
1975 ### EnableTrackingProtection
1976 Configure tracking protection.
1977
1978 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1979
1980 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1981
1982 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1983
1984 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1985
1986 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1987
1988 `Exceptions` are origins for which tracking protection is not enabled.
1989
1990 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1991 **CCK2 Equivalent:** N/A\
1992 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1993
1994 #### Windows (GPO)
1995 ```
1996 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2001 ```
2002 #### Windows (Intune)
2003 OMA-URI:
2004 ```
2005 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2006 ```
2007 Value (string):
2008 ```
2009 <enabled/>
2010 <data id="TrackingProtectionLocked" value="true | false"/>
2011 <data id="Cryptomining" value="true | false"/>
2012 <data id="Fingerprinting" value="true | false"/>
2013 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2014 ```
2015 #### macOS
2016 ```
2017 <dict>
2018 <key>EnableTrackingProtection</key>
2019 <dict>
2020 <key>Value</key>
2021 <true/> | <false/>
2022 <key><Locked</key>
2023 <true/> | <false/>
2024 <key><Cryptomining</key>
2025 <true/> | <false/>
2026 <key><Fingerprinting</key>
2027 <true/> | <false/>
2028 <key>Exceptions</key>
2029 <array>
2030 <string>https://example.com</string>
2031 </array>
2032 </dict>
2033 </dict>
2034 ```
2035 #### policies.json
2036 ```
2037 {
2038 "policies": {
2039 "EnableTrackingProtection": {
2040 "Value": true | false,
2041 "Locked": true | false,
2042 "Cryptomining": true | false,
2043 "Fingerprinting": true | false,
2044 "Exceptions": ["https://example.com"]
2045 }
2046 }
2047 ```
2048 ### EncryptedMediaExtensions
2049 Enable or disable Encrypted Media Extensions and optionally lock it.
2050
2051 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2052
2053 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2054
2055 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2056 **CCK2 Equivalent:** N/A\
2057 **Preferences Affected:** `media.eme.enabled`
2058
2059 #### Windows (GPO)
2060 ```
2061 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2063 ```
2064 #### Windows (Intune)
2065 OMA-URI:
2066 ```
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2069 ```
2070 Value (string):
2071 ```
2072 <enabled/>or <disabled/>
2073 ```
2074 #### macOS
2075 ```
2076 <dict>
2077 <key>EncryptedMediaExtensions</key>
2078 <dict>
2079 <key>Enabled</key>
2080 <true/> | <false/>
2081 <key><Locked</key>
2082 <true/> | <false/>
2083 </dict>
2084 </dict>
2085 ```
2086 #### policies.json
2087 ```
2088 {
2089 "policies": {
2090 "EncryptedMediaExtensions": {
2091 "Enabled": true | false,
2092 "Locked": true | false
2093 }
2094 }
2095 ```
2096 ### EnterprisePoliciesEnabled
2097 Enable policy support on macOS.
2098
2099 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2100 **CCK2 Equivalent:** N/A\
2101 **Preferences Affected:** N/A
2102
2103 #### macOS
2104 ```
2105 <dict>
2106 <key>EnterprisePoliciesEnabled</key>
2107 <true/>
2108 </dict>
2109 ```
2110 ### Extensions
2111 Control the installation, uninstallation and locking of extensions.
2112
2113 `Install` is a list of URLs or native paths for extensions to be installed.
2114
2115 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2116
2117 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2118
2119 **Compatibility:** Firefox 60, Firefox ESR 60\
2120 **CCK2 Equivalent:** `addons`\
2121 **Preferences Affected:** N/A
2122
2123 #### Windows (GPO)
2124 ```
2125 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2128 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2129 ```
2130 #### macOS
2131 ```
2132 <dict>
2133 <key>Extensions</key>
2134 <dict>
2135 <key>Install</key>
2136 <array>
2137 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2138 <string>//path/to/xpi</string>
2139 </array>
2140 <key>Uninstall</key>
2141 <array>
2142 <string>bad_addon_id@mozilla.org</string>
2143 </array>
2144 <key>Locked</key>
2145 <array>
2146 <string>addon_id@mozilla.org</string>
2147 </array>
2148 </dict>
2149 </dict>
2150 ```
2151 #### policies.json
2152 ```
2153 {
2154 "policies": {
2155 "Extensions": {
2156 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2157 "Uninstall": ["bad_addon_id@mozilla.org"],
2158 "Locked": ["addon_id@mozilla.org"]
2159 }
2160 }
2161 }
2162 ```
2163 ### ExtensionSettings
2164 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2165
2166 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2167
2168 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2169
2170 The configuration for each extension is another dictionary that can contain the fields documented below.
2171
2172 | Name | Description |
2173 | --- | --- |
2174 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2175 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2178 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2179 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2180 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2181 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2182 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2183 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2184
2185 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2186 **CCK2 Equivalent:** N/A\
2187 **Preferences Affected:** N/A
2188
2189 #### Windows (GPO)
2190 ```
2191 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2192 {
2193 "*": {
2194 "blocked_install_message": "Custom error message.",
2195 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2196 "installation_mode": "blocked",
2197 "allowed_types": ["extension"]
2198 },
2199 "uBlock0@raymondhill.net": {
2200 "installation_mode": "force_installed",
2201 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2202 },
2203 "https-everywhere@eff.org": {
2204 "installation_mode": "allowed",
2205 }
2206 }
2207 ```
2208 #### Windows (Intune)
2209 OMA-URI:
2210 ```
2211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2212 ```
2213 Value (string):
2214 ```
2215 <enabled/>
2216 <data id="ExtensionSettings" value='
2217 "*": {
2218 "blocked_install_message": "Custom error message.",
2219 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2220 "installation_mode": "blocked",
2221 "allowed_types": ["extension"]
2222 },
2223 "uBlock0@raymondhill.net": {
2224 "installation_mode": "force_installed",
2225 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2226 },
2227 "https-everywhere@eff.org": {
2228 "installation_mode": "allowed",
2229 }'/>
2230 ```
2231 #### macOS
2232 ```
2233 <dict>
2234 <key>ExtensionSettings</key>
2235 <dict>
2236 <key>*</key>
2237 <dict>
2238 <key>blocked_install_message</key>
2239 <string>Custom error message.</string>
2240 <key>install_sources</key>
2241 <array>
2242 <string>about:addons</string>
2243 <string>https://addons.mozilla.org/</string>
2244 </array>
2245 <key>installation_mode</key>
2246 <string>blocked</string>
2247 <key>allowed_types</key>
2248 <array>
2249 <string>extension</string>
2250 </array>
2251 </dict>
2252 <key>uBlock0@raymondhill.net</key>
2253 <dict>
2254 <key>installation_mode</key>
2255 <string>force_installed</string>
2256 <key>install_url</key>
2257 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2258 </dict>
2259 <key>https-everywhere@eff.org</key>
2260 <dict>
2261 <key>installation_mode</key>
2262 <string>allowed</string>
2263 </dict>
2264 </dict>
2265 </dict>
2266 ```
2267 #### policies.json
2268 ```
2269 {
2270 "policies": {
2271 "ExtensionSettings": {
2272 "*": {
2273 "blocked_install_message": "Custom error message.",
2274 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2275 "installation_mode": "blocked",
2276 "allowed_types": ["extension"]
2277 },
2278 "uBlock0@raymondhill.net": {
2279 "installation_mode": "force_installed",
2280 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2281 },
2282 "https-everywhere@eff.org": {
2283 "installation_mode": "allowed"
2284 }
2285 }
2286 }
2287 }
2288 ```
2289 ### ExtensionUpdate
2290 Control extension updates.
2291
2292 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2293 **CCK2 Equivalent:** N/A\
2294 **Preferences Affected:** `extensions.update.enabled`
2295
2296 #### Windows (GPO)
2297 ```
2298 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2299 ```
2300 #### Windows (Intune)
2301 OMA-URI:
2302 ```
2303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2304 ```
2305 Value (string):
2306 ```
2307 <enabled/> or <disabled/>
2308 ```
2309 #### macOS
2310 ```
2311 <dict>
2312 <key>ExtensionUpdate</key>
2313 <true/> | <false/>
2314 </dict>
2315 ```
2316 #### policies.json
2317 ```
2318 {
2319 "policies": {
2320 "ExtensionUpdate": true | false
2321 }
2322 }
2323 ```
2324 ### FlashPlugin
2325 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2326
2327 `Allow` is a list of origins where Flash are allowed.
2328
2329 `Block` is a list of origins where Flash is not allowed.
2330
2331 `Default` determines whether or not Flash is allowed by default.
2332
2333 `Locked` prevents the user from changing Flash preferences.
2334
2335 **Compatibility:** Firefox 60, Firefox ESR 60\
2336 **CCK2 Equivalent:** `permissions.plugin`\
2337 **Preferences Affected:** `plugin.state.flash`
2338
2339 #### Windows (GPO)
2340 ```
2341 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2342 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2343 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2344 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2345 ```
2346 #### Windows (Intune)
2347 OMA-URI:
2348 ```
2349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2350 ```
2351 Value (string):
2352 ```
2353 <enabled/>
2354 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2355 ```
2356 OMA-URI:
2357 ```
2358 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2359 ```
2360 Value (string):
2361 ```
2362 <enabled/> or <disabled/>
2363 ```
2364 OMA-URI:
2365 ```
2366 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2367 ```
2368 Value (string):
2369 ```
2370 <enabled/> or <disabled/>
2371 ```
2372 #### macOS
2373 ```
2374 <dict>
2375 <key>FlashPlugin</key>
2376 <dict>
2377 <key>Allow</key>
2378 <array>
2379 <string>http://example.org</string>
2380 </array>
2381 <key>Block</key>
2382 <array>
2383 <string>http://example.edu</string>
2384 </array>
2385 <key>Default</key>
2386 <true/> | <false/>
2387 <key>Locked</key>
2388 <true/> | <false/>
2389 </dict>
2390 </dict>
2391 ```
2392 #### policies.json
2393 ```
2394 {
2395 "policies": {
2396 "FlashPlugin": {
2397 "Allow": ["http://example.org/"],
2398 "Block": ["http://example.edu/"],
2399 "Default": true | false,
2400 "Locked": true | false
2401 }
2402 }
2403 }
2404 ```
2405
2406
2407
2408 ### Handlers
2409 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2410
2411 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2412
2413 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2414
2415 | Name | Description |
2416 | --- | --- |
2417 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2418 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2419 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2420 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2421 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2422 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2423
2424 **Compatibility:** Firefox 78, Firefox ESR 78\
2425 **CCK2 Equivalent:** N/A\
2426 **Preferences Affected:** N/A
2427
2428 #### Windows (GPO)
2429 ```
2430 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2431 {
2432 "mimeTypes": {
2433 "application/msword": {
2434 "action": "useSystemDefault",
2435 "ask": true | false
2436 }
2437 },
2438 "schemes": {
2439 "mailto": {
2440 "action": "useHelperApp",
2441 "ask": true | false,
2442 "handlers": [{
2443 "name": "Gmail",
2444 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2445 }]
2446 }
2447 },
2448 "extensions": {
2449 "pdf": {
2450 "action": "useHelperApp",
2451 "ask": true | false,
2452 "handlers": [{
2453 "name": "Adobe Acrobat",
2454 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2455 }]
2456 }
2457 }
2458 }
2459 ```
2460 #### Windows (Intune)
2461 OMA-URI:
2462 ```
2463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2464 ```
2465 Value (string):
2466 ```
2467 <enabled/>
2468 <data id="Handlers" value='
2469 {
2470 "mimeTypes": {
2471 "application/msword": {
2472 "action": "useSystemDefault",
2473 "ask": true | false
2474 }
2475 },
2476 "schemes": {
2477 "mailto": {
2478 "action": "useHelperApp",
2479 "ask": true | false,
2480 "handlers": [{
2481 "name": "Gmail",
2482 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2483 }]
2484 }
2485 },
2486 "extensions": {
2487 "pdf": {
2488 "action": "useHelperApp",
2489 "ask": true | false,
2490 "handlers": [{
2491 "name": "Adobe Acrobat",
2492 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2493 }]
2494 }
2495 }
2496 }
2497 '/>
2498 ```
2499 #### macOS
2500 ```
2501 <dict>
2502 <key>Handlers</key>
2503 <dict>
2504 <key>mimeTypes</key>
2505 <dict>
2506 <key>application/msword</key>
2507 <dict>
2508 <key>action</key>
2509 <string>useSystemDefault</string>
2510 <key>ask</key>
2511 <true/> | <false/>
2512 </dict>
2513 </dict>
2514 <key>schemes</key>
2515 <dict>
2516 <key>mailto</key>
2517 <dict>
2518 <key>action</key>
2519 <string>useHelperApp</string>
2520 <key>ask</key>
2521 <true/> | <false/>
2522 <key>handlers</key>
2523 <array>
2524 <dict>
2525 <key>name</key>
2526 <string>Gmail</string>
2527 <key>uriTemplate</key>
2528 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2529 </dict>
2530 </array>
2531 </dict>
2532 </dict>
2533 <key>extensions</key>
2534 <dict>
2535 <key>pdf</key>
2536 <dict>
2537 <key>action</key>
2538 <string>useHelperApp</string>
2539 <key>ask</key>
2540 <true/> | <false/>
2541 <key>handlers</key>
2542 <array>
2543 <dict>
2544 <key>name</key>
2545 <string>Adobe Acrobat</string>
2546 <key>path</key>
2547 <string>/System/Applications/Preview.app</string>
2548 </dict>
2549 </array>
2550 </dict>
2551 </dict>
2552 </dict>
2553 </dict>
2554 ```
2555 #### policies.json
2556 ```
2557 {
2558 "mimeTypes": {
2559 "application/msword": {
2560 "action": "useSystemDefault",
2561 "ask": false
2562 }
2563 },
2564 "schemes": {
2565 "mailto": {
2566 "action": "useHelperApp",
2567 "ask": true | false,
2568 "handlers": [{
2569 "name": "Gmail",
2570 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2571 }]
2572 }
2573 },
2574 "extensions": {
2575 "pdf": {
2576 "action": "useHelperApp",
2577 "ask": true | false,
2578 "handlers": [{
2579 "name": "Adobe Acrobat",
2580 "path": "/usr/bin/acroread"
2581 }]
2582 }
2583 }
2584 }
2585 ```
2586 ### FirefoxHome
2587 Customize the Firefox Home page.
2588
2589 **Compatibility:** Firefox 68, Firefox ESR 68\
2590 **CCK2 Equivalent:** N/A\
2591 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2592
2593 #### Windows (GPO)
2594 ```
2595 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2596 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2597 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2598 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2599 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2600 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2601 ```
2602 #### Windows (Intune)
2603 OMA-URI:
2604 ```
2605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2606 ```
2607 Value (string):
2608 ```
2609 <enabled/>
2610 <data id="FirefoxHome_Search" value="true | false"/>
2611 <data id="FirefoxHome_TopSites" value="true | false"/>
2612 <data id="FirefoxHome_Highlights" value="true | false"/>
2613 <data id="FirefoxHome_Pocket" value="true | false"/>
2614 <data id="FirefoxHome_Snippets" value="true | false"/>
2615 <data id="FirefoxHome_Locked" value="true | false"/>
2616 ```
2617 #### macOS
2618 ```
2619 <dict>
2620 <key>FirefoxHome</key>
2621 <dict>
2622 <key>Search</key>
2623 <true/> | <false/>
2624 <key>TopSites</key>
2625 <true/> | <false/>
2626 <key>Highlights</key>
2627 <true/> | <false/>
2628 <key>Pocket</key>
2629 <true/> | <false/>
2630 <key>Snippets</key>
2631 <true/> | <false/>
2632 <key>Locked</key>
2633 <true/> | <false/>
2634 </dict>
2635 </dict>
2636 ```
2637 #### policies.json
2638 ```
2639 {
2640 "policies": {
2641 "FirefoxHome": {
2642 "Search": true | false,
2643 "TopSites": true | false,
2644 "Highlights": true | false,
2645 "Pocket": true | false,
2646 "Snippets": true | false,
2647 "Locked": true | false
2648 }
2649 }
2650 }
2651 ```
2652 ### HardwareAcceleration
2653 Control hardware acceleration.
2654
2655 **Compatibility:** Firefox 60, Firefox ESR 60\
2656 **CCK2 Equivalent:** N/A\
2657 **Preferences Affected:** `layers.acceleration.disabled`
2658
2659 #### Windows (GPO)
2660 ```
2661 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2662 ```
2663 #### Windows (Intune)
2664 OMA-URI:
2665 ```
2666 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2667 ```
2668 Value (string):
2669 ```
2670 <enabled/> or <disabled/>
2671 ```
2672 #### macOS
2673 ```
2674 <dict>
2675 <key>HardwareAcceleration</key>
2676 <true/> | <false/>
2677 </dict>
2678 ```
2679 #### policies.json
2680 ```
2681 {
2682 "policies": {
2683 "HardwareAcceleration": true | false
2684 }
2685 }
2686 ```
2687 ### Homepage
2688 Configure the default homepage and how Firefox starts.
2689
2690 `URL` is the default homepage.
2691
2692 `Locked` prevents the user from changing homepage preferences.
2693
2694 `Additional` allows for more than one homepage.
2695
2696 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2697
2698 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2699
2700 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2701 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2702 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2703
2704 #### Windows (GPO)
2705 ```
2706 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2707 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2708 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2709 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2710 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2711 ```
2712 #### Windows (Intune)
2713 OMA-URI:
2714 ```
2715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2716 ```
2717 Value (string):
2718 ```
2719 <enabled/>
2720
2721 <data id="HomepageURL" value="https://example.com"/>
2722 <data id="HomepageLocked" value="true | false"/>
2723 ```
2724 OMA-URI:
2725 ```
2726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2727 ```
2728 Value (string):
2729 ```
2730 <enabled/>
2731
2732 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2733 ```
2734 OMA-URI:
2735 ```
2736 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2737 ```
2738 Value (string):
2739 ```
2740 <enabled/>
2741
2742 <data id="StartPage" value="none | homepage | previous-session"/>
2743 ```
2744 #### macOS
2745 ```
2746 <dict>
2747 <key>Homepage</key>
2748 <dict>
2749 <key>URL</key>
2750 <string>http://example.com</string>
2751 <key>Locked</key>
2752 <true/> | <false/>
2753 <key>Additional</key>
2754 <array>
2755 <string>http://example.org</string>
2756 <string>http://example.edu</string>
2757 </array>
2758 <key>StartPage</key>
2759 <string>none | homepage | previous-session | homepage-locked</string>
2760 </dict>
2761 </dict>
2762 ```
2763 #### policies.json
2764 ```
2765 {
2766 "policies": {
2767 "Homepage": {
2768 "URL": "http://example.com/",
2769 "Locked": true | false,
2770 "Additional": ["http://example.org/",
2771 "http://example.edu/"],
2772 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2773 }
2774 }
2775 }
2776 ```
2777 ### InstallAddonsPermission
2778 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2779
2780 `Allow` is a list of origins where extension installs are allowed.
2781
2782 `Default` determines whether or not extension installs are allowed by default.
2783
2784 **Compatibility:** Firefox 60, Firefox ESR 60\
2785 **CCK2 Equivalent:** `permissions.install`\
2786 **Preferences Affected:** `xpinstall.enabled`
2787
2788 #### Windows (GPO)
2789 ```
2790 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2791 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2792 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2793 ```
2794 #### Windows (Intune)
2795 OMA-URI:
2796 ```
2797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2798 ```
2799 Value (string):
2800 ```
2801 <enabled/>
2802 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2803 ```
2804 OMA-URI:
2805 ```
2806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2807 ```
2808 Value (string):
2809 ```
2810 <enabled/>
2811 ```
2812 #### macOS
2813 ```
2814 <dict>
2815 <key>InstallAddonsPermission</key>
2816 <dict>
2817 <key>Allow</key>
2818 <array>
2819 <string>http://example.org</string>
2820 <string>http://example.edu</string>
2821 </array>
2822 <key>Default</key>
2823 <true/> | <false/>
2824 </dict>
2825 </dict>
2826 ```
2827 #### policies.json
2828 ```
2829 {
2830 "policies": {
2831 "InstallAddonsPermission": {
2832 "Allow": ["http://example.org/",
2833 "http://example.edu/"],
2834 "Default": true | false
2835 }
2836 }
2837 }
2838 ```
2839 ### LegacyProfiles
2840 Disable the feature enforcing a separate profile for each installation.
2841
2842 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2843
2844 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2845
2846 This policy only work on Windows via GPO (not policies.json).
2847
2848 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2849 **CCK2 Equivalent:** N/A\
2850 **Preferences Affected:** N/A
2851
2852 #### Windows (GPO)
2853 ```
2854 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2855 ```
2856 #### Windows (Intune)
2857 OMA-URI:
2858 ```
2859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2860 ```
2861 Value (string):
2862 ```
2863 <enabled/> or <disabled/>
2864 ```
2865 ### LocalFileLinks
2866 Enable linking to local files by origin.
2867
2868 **Compatibility:** Firefox 68, Firefox ESR 68\
2869 **CCK2 Equivalent:** N/A\
2870 **Preferences Affected:** `capability.policy.localfilelinks.*`
2871
2872 #### Windows (GPO)
2873 ```
2874 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2875 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2876 ```
2877 #### Windows (Intune)
2878 OMA-URI:
2879 ```
2880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2881 ```
2882 Value (string):
2883 ```
2884 <enabled/>
2885 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2886 ```
2887 #### macOS
2888 ```
2889 <dict>
2890 <key>LocalFileLinks</key>
2891 <array>
2892 <string>http://example.org</string>
2893 <string>http://example.edu</string>
2894 </array>
2895 </dict>
2896 ```
2897 #### policies.json
2898 ```
2899 {
2900 "policies": {
2901 "LocalFileLinks": ["http://example.org/",
2902 "http://example.edu/"]
2903 }
2904 }
2905 ```
2906 ### MasterPassword
2907 Require or prevent using a master password.
2908
2909 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2910
2911 **Compatibility:** Firefox 78, Firefox ESR 78\
2912 **CCK2 Equivalent:** `noMasterPassword`\
2913 **Preferences Affected:** N/A
2914
2915 #### Windows (GPO)
2916 ```
2917 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2918 ```
2919 #### Windows (Intune)
2920 OMA-URI:
2921 ```
2922 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2923 ```
2924 Value (string):
2925 ```
2926 <enabled/> or <disabled/>
2927 ```
2928 #### macOS
2929 ```
2930 <dict>
2931 <key>MasterPassword</key>
2932 <true/> | <false/>
2933 </dict>
2934 ```
2935 #### policies.json
2936 ```
2937 {
2938 "policies": {
2939 "MasterPassword": true | false
2940 }
2941 }
2942 ```
2943 ### NetworkPrediction
2944 Enable or disable network prediction (DNS prefetching).
2945
2946 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2947 **CCK2 Equivalent:** N/A\
2948 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2949
2950 #### Windows (GPO)
2951 ```
2952 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2953 ```
2954 #### Windows (Intune)
2955 OMA-URI:
2956 ```
2957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2958 ```
2959 Value (string):
2960 ```
2961 <enabled/> or <disabled/>
2962 ```
2963 #### macOS
2964 ```
2965 <dict>
2966 <key>NetworkPrediction</key>
2967 <true/> | <false/>
2968 </dict>
2969 ```
2970 #### policies.json
2971 ```
2972 {
2973 "policies": {
2974 "NetworkPrediction": true | false
2975 }
2976 ```
2977 ### NewTabPage
2978 Enable or disable the New Tab page.
2979
2980 **Compatibility:** Firefox 68, Firefox ESR 68\
2981 **CCK2 Equivalent:** N/A\
2982 **Preferences Affected:** `browser.newtabpage.enabled`
2983
2984 #### Windows (GPO)
2985 ```
2986 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2987 ```
2988 #### Windows (Intune)
2989 OMA-URI:
2990 ```
2991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2992 ```
2993 Value (string):
2994 ```
2995 <enabled/> or <disabled/>
2996 ```
2997 #### macOS
2998 ```
2999 <dict>
3000 <key>NewTabPage</key>
3001 <true/> | <false/>
3002 </dict>
3003 ```
3004 #### policies.json
3005 ```
3006 {
3007 "policies": {
3008 "NewTabPage": true | false
3009 }
3010 ```
3011 ### NoDefaultBookmarks
3012 Disable the creation of default bookmarks.
3013
3014 This policy is only effective if the user profile has not been created yet.
3015
3016 **Compatibility:** Firefox 60, Firefox ESR 60\
3017 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3018 **Preferences Affected:** N/A
3019
3020 #### Windows (GPO)
3021 ```
3022 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3023 ```
3024 #### Windows (Intune)
3025 OMA-URI:
3026 ```
3027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3028 ```
3029 Value (string):
3030 ```
3031 <enabled/> or <disabled/>
3032 ```
3033 #### macOS
3034 ```
3035 <dict>
3036 <key>NoDefaultBookmarks</key>
3037 <true/> | <false/>
3038 </dict>
3039 ```
3040 #### policies.json
3041 ```
3042 {
3043 "policies": {
3044 "NoDefaultBookmarks": true | false
3045 }
3046 }
3047 ```
3048 ### OfferToSaveLogins
3049 Control whether or not Firefox offers to save passwords.
3050
3051 **Compatibility:** Firefox 60, Firefox ESR 60\
3052 **CCK2 Equivalent:** `dontRememberPasswords`\
3053 **Preferences Affected:** `signon.rememberSignons`
3054
3055 #### Windows (GPO)
3056 ```
3057 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3058 ```
3059 #### Windows (Intune)
3060 OMA-URI:
3061 ```
3062 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3063 ```
3064 Value (string):
3065 ```
3066 <enabled/> or <disabled/>
3067 ```
3068 #### macOS
3069 ```
3070 <dict>
3071 <key>OfferToSaveLogins</key>
3072 <true/> | <false/>
3073 </dict>
3074 ```
3075 #### policies.json
3076 ```
3077 {
3078 "policies": {
3079 "OfferToSaveLogins": true | false
3080 }
3081 }
3082 ```
3083 ### OfferToSaveLoginsDefault
3084 Sets the default value of signon.rememberSignons without locking it.
3085
3086 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3087 **CCK2 Equivalent:** `dontRememberPasswords`\
3088 **Preferences Affected:** `signon.rememberSignons`
3089
3090 #### Windows (GPO)
3091 ```
3092 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3093 ```
3094 #### Windows (Intune)
3095 OMA-URI:
3096 ```
3097 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3098 ```
3099 Value (string):
3100 ```
3101 <enabled/> or <disabled/>
3102 ```
3103 #### macOS
3104 ```
3105 <dict>
3106 <key>OfferToSaveLoginsDefault</key>
3107 <true/> | <false/>
3108 </dict>
3109 ```
3110 #### policies.json
3111 ```
3112 {
3113 "policies": {
3114 "OfferToSaveLoginsDefault": true | false
3115 }
3116 }
3117 ```
3118 ### OverrideFirstRunPage
3119 Override the first run page. If the value is blank, no first run page is displayed.
3120
3121 **Compatibility:** Firefox 60, Firefox ESR 60\
3122 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3123 **Preferences Affected:** `startup.homepage_welcome_url`
3124
3125 #### Windows (GPO)
3126 ```
3127 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3128 ```
3129 #### Windows (Intune)
3130 OMA-URI:
3131 ```
3132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3133 ```
3134 Value (string):
3135 ```
3136 <enabled/>
3137 <data id="OverridePage" value="https://example.com"/>
3138 ```
3139 #### macOS
3140 ```
3141 <dict>
3142 <key>OverrideFirstRunPage</key>
3143 <string>http://example.org</string>
3144 </dict>
3145 ```
3146 #### policies.json
3147 ```
3148 {
3149 "policies": {
3150 "OverrideFirstRunPage": "http://example.org"
3151 }
3152 ```
3153 ### OverridePostUpdatePage
3154 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3155
3156 **Compatibility:** Firefox 60, Firefox ESR 60\
3157 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3158 **Preferences Affected:** `startup.homepage_override_url`
3159
3160 #### Windows (GPO)
3161 ```
3162 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3163 ```
3164 #### Windows (Intune)
3165 OMA-URI:
3166 ```
3167 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3168 ```
3169 Value (string):
3170 ```
3171 <enabled/>
3172 <data id="OverridePage" value="https://example.com"/>
3173 ```
3174 #### macOS
3175 ```
3176 <dict>
3177 <key>OverridePostUpdatePage</key>
3178 <string>http://example.org</string>
3179 </dict>
3180 ```
3181 #### policies.json
3182 ```
3183 {
3184 "policies": {
3185 "OverridePostUpdatePage": "http://example.org"
3186 }
3187 ```
3188 ### PasswordManagerEnabled
3189 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3190
3191 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3192 **CCK2 Equivalent:** N/A\
3193 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3194
3195 #### Windows (GPO)
3196 ```
3197 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3198 ```
3199 #### Windows (Intune)
3200 OMA-URI:
3201 ```
3202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3203 ```
3204 Value (string):
3205 ```
3206 <enabled/> or <disabled/>
3207 ```
3208 #### macOS
3209 ```
3210 <dict>
3211 <key>PasswordManagerEnabled</key>
3212 <true/> | <false/>
3213 </dict>
3214 ```
3215 #### policies.json
3216 ```
3217 {
3218 "policies": {
3219 "PasswordManagerEnabled": true | false
3220 }
3221 }
3222 ```
3223 ### PDFjs
3224 Disable or configure PDF.js, the built-in PDF viewer.
3225
3226 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3227
3228 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3229
3230 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3231
3232 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3233 **CCK2 Equivalent:** N/A\
3234 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3235
3236 #### Windows (GPO)
3237 ```
3238 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3239 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3240 ```
3241 #### Windows (Intune)
3242 OMA-URI:
3243 ```
3244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3245 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3246 ```
3247 Value (string):
3248 ```
3249 <enabled/>or <disabled/>
3250 ```
3251 #### macOS
3252 ```
3253 <dict>
3254 <key>PDFjs</key>
3255 <dict>
3256 <key>Enabled</key>
3257 <true/> | <false/>
3258 <key><EnablePermissions</key>
3259 <true/> | <false/>
3260 </dict>
3261 </dict>
3262 ```
3263 #### policies.json
3264 ```
3265 {
3266 "policies": {
3267 "PSFjs": {
3268 "Enabled": true | false,
3269 "EnablePermissions": true | false
3270 }
3271 }
3272 ```
3273 ### Permissions
3274 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3275
3276 `Allow` is a list of origins where the feature is allowed.
3277
3278 `Block` is a list of origins where the feature is not allowed.
3279
3280 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3281
3282 `Locked` prevents the user from changing preferences for the feature.
3283
3284 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3285
3286 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3287 **CCK2 Equivalent:** N/A\
3288 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3289
3290 #### Windows (GPO)
3291 ```
3292 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3293 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3294 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3295 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3296 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3297 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3298 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3299 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3300 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3301 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3302 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3303 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3304 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3305 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3306 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3307 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3308 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3309 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3310 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3311 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3312 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3313 ```
3314 #### Windows (Intune)
3315 OMA-URI:
3316 ```
3317 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3318 ```
3319 Value (string):
3320 ```
3321 <enabled/> or <disabled/>
3322 ```
3323 OMA-URI:
3324 ```
3325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3326 ```
3327 Value (string):
3328 ```
3329 <enabled/> or <disabled/>
3330 ```
3331 OMA-URI:
3332 ```
3333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3334 ```
3335 Value (string):
3336 ```
3337 <enabled/>
3338 <data id="Permissions" value="1&#xF000;https://example.org"/>
3339 ```
3340 OMA-URI:
3341 ```
3342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3343 ```
3344 Value (string):
3345 ```
3346 <enabled/> or <disabled/>
3347 ```
3348 OMA-URI:
3349 ```
3350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3351 ```
3352 Value (string):
3353 ```
3354 <enabled/> or <disabled/>
3355 ```
3356 OMA-URI:
3357 ```
3358 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3359 ```
3360 Value (string):
3361 ```
3362 <enabled/>
3363 <data id="Permissions" value="1&#xF000;https://example.org"/>
3364 ```
3365 OMA-URI:
3366 ```
3367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3368 ```
3369 Value (string):
3370 ```
3371 <enabled/>
3372 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3373 ```
3374 OMA-URI:
3375 ```
3376 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3377 ```
3378 Value (string):
3379 ```
3380 <enabled/>
3381 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3382 ```
3383 OMA-URI:
3384 ```
3385 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3386 ```
3387 Value (string):
3388 ```
3389 <enabled/> or <disabled/>
3390 ```
3391 #### macOS
3392 ```
3393 <dict>
3394 <key>Permissions</key>
3395 <dict>
3396 <key>Camera</key>
3397 <dict>
3398 <key>Allow</key>
3399 <array>
3400 <string>https://example.org</string>
3401 <string>https://example.org:1234</string>
3402 </array>
3403 <key>Block</key>
3404 <array>
3405 <string>https://example.edu</string>
3406 </array>
3407 <key>BlockNewRequests</key>
3408 <true/> | <false/>
3409 <key>Locked</key>
3410 <true/> | <false/>
3411 </dict>
3412 <key>Microphone</key>
3413 <dict>
3414 <key>Allow</key>
3415 <array>
3416 <string>https://example.org</string>
3417 </array>
3418 <key>Block</key>
3419 <array>
3420 <string>https://example.edu</string>
3421 </array>
3422 <key>BlockNewRequests</key>
3423 <true/> | <false/>
3424 <key>Locked</key>
3425 <true/> | <false/>
3426 </dict>
3427 <key>Location</key>
3428 <dict>
3429 <key>Allow</key>
3430 <array>
3431 <string>https://example.org</string>
3432 </array>
3433 <key>Block</key>
3434 <array>
3435 <string>https://example.edu</string>
3436 </array>
3437 <key>BlockNewRequests</key>
3438 <true/> | <false/>
3439 <key>Locked</key>
3440 <true/> | <false/>
3441 </dict>
3442 <key>Notifications</key>
3443 <dict>
3444 <key>Allow</key>
3445 <array>
3446 <string>https://example.org</string>
3447 </array>
3448 <key>Block</key>
3449 <array>
3450 <string>https://example.edu</string>
3451 </array>
3452 <key>BlockNewRequests</key>
3453 <true/>
3454 <key>Locked</key>
3455 <true/>
3456 </dict>
3457 <key>Autoplay</key>
3458 <dict>
3459 <key>Allow</key>
3460 <array>
3461 <string>https://example.org</string>
3462 </array>
3463 <key>Block</key>
3464 <array>
3465 <string>https://example.edu</string>
3466 </array>
3467 <key>Default</key>
3468 <string>allow-audio-video | block-audio | block-audio-video</string>
3469 <key>Locked</key>
3470 <true/> | <false/>
3471 </dict>
3472 </dict>
3473 </dict>
3474 ```
3475 #### policies.json
3476 ```
3477 {
3478 "policies": {
3479 "Permissions": {
3480 "Camera": {
3481 "Allow": ["https://example.org","https://example.org:1234"],
3482 "Block": ["https://example.edu"],
3483 "BlockNewRequests": true | false,
3484 "Locked": true | false
3485 },
3486 "Microphone": {
3487 "Allow": ["https://example.org"],
3488 "Block": ["https://example.edu"],
3489 "BlockNewRequests": true | false,
3490 "Locked": true | false
3491 },
3492 "Location": {
3493 "Allow": ["https://example.org"],
3494 "Block": ["https://example.edu"],
3495 "BlockNewRequests": true | false,
3496 "Locked": true | false
3497 },
3498 "Notifications": {
3499 "Allow": ["https://example.org"],
3500 "Block": ["https://example.edu"],
3501 "BlockNewRequests": true | false,
3502 "Locked": true | false
3503 },
3504 "Autoplay": {
3505 "Allow": ["https://example.org"],
3506 "Block": ["https://example.edu"],
3507 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3508 "Locked": true | false
3509 }
3510 }
3511 }
3512 }
3513 ```
3514 ### PictureInPicture
3515
3516 Enable or disable Picture-in-Picture.
3517
3518 **Compatibility:** Firefox 78, Firefox ESR 78\
3519 **CCK2 Equivalent:** N/A\
3520 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3521
3522 #### Windows (GPO)
3523 ```
3524 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3525 ```
3526 #### Windows (Intune)
3527 OMA-URI:
3528 ```
3529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3530 ```
3531 Value (string):
3532 ```
3533 <enabled/> or <disabled/>
3534 ```
3535 #### macOS
3536 ```
3537 <dict>
3538 <key>PictureInPicture</key>
3539 <true/> | <false/>
3540 </dict>
3541 ```
3542 #### policies.json
3543 ```
3544 {
3545 "policies": {
3546 "PictureInPicture": true | false
3547 }
3548 }
3549 ```
3550 ### PopupBlocking
3551 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3552
3553 `Allow` is a list of origins where popup-windows are allowed.
3554
3555 `Default` determines whether or not pop-up windows are allowed by default.
3556
3557 `Locked` prevents the user from changing pop-up preferences.
3558
3559 **Compatibility:** Firefox 60, Firefox ESR 60\
3560 **CCK2 Equivalent:** `permissions.popup`\
3561 **Preferences Affected:** `dom.disable_open_during_load`
3562
3563 #### Windows (GPO)
3564 ```
3565 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3566 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3567 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3568 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3569 ```
3570 #### Windows (Intune)
3571 OMA-URI:
3572 ```
3573 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3574 ```
3575 Value (string):
3576 ```
3577 <enabled/>
3578 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3579 ```
3580 OMA-URI:
3581 ```
3582 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3583 ```
3584 Value (string):
3585 ```
3586 <enabled/> or <disabled/>
3587 ```
3588 OMA-URI:
3589 ```
3590 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3591 ```
3592 Value (string):
3593 ```
3594 <enabled/> or <disabled/>
3595 ```
3596 #### macOS
3597 ```
3598 <dict>
3599 <key>PopupBlocking</key>
3600 <dict>
3601 <key>Allow</key>
3602 <array>
3603 <string>http://example.org</string>
3604 <string>http://example.edu</string>
3605 </array>
3606 <key>Default</key>
3607 <true/> | <false/>
3608 <key>Locked</key>
3609 <true/> | <false/>
3610 </dict>
3611 </dict>
3612 ```
3613 #### policies.json
3614 ```
3615 {
3616 "policies": {
3617 "PopupBlocking": {
3618 "Allow": ["http://example.org/",
3619 "http://example.edu/"],
3620 "Default": true | false,
3621 "Locked": true | false
3622 }
3623 }
3624 }
3625 ```
3626 ### Preferences
3627 Set and lock certain preferences.
3628
3629 **Compatibility:** See below\
3630 **CCK2 Equivalent:** `preferences`\
3631 **Preferences Affected:** See below
3632
3633 | Preference | Type | Compatibility | Default
3634 | --- | --- | --- | ---
3635 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3637 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3639 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3641 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3643 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3645 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3647 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3648 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3649 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3650 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3651 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3653 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3655 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3657 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3659 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3661 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3663 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3665 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3667 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3669 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3671 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3673 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3675 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3677 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3679 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3681 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3682 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3683 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3684 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3685 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3686 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3687 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3689 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3691 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3693 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3695 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3697 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3698 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3699 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3700 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3701 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3702 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3703 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3704 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3705 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3706 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3707 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3708 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3709 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3710 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3711 disabled
3712 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3714 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3716 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3718 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3720 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3721 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3722 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3723 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3724 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3725 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3726 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3727 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3728 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3729 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3730 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3731 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3732 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3733 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3734 #### Windows (GPO)
3735 ```
3736 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3737 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3738 ```
3739 #### Windows (Intune)
3740 OMA-URI: (periods are replaced by underscores)
3741 ```
3742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3743 ```
3744 Value (string):
3745 ```
3746 <enabled/> or <disabled/>
3747 ```
3748 #### macOS
3749 ```
3750 <dict>
3751 <key>Preferences</key>
3752 <dict>
3753 <key>boolean_preference_name</key>
3754 <true/> | <false/>
3755 <key>string_preference_name</key>
3756 <string>string_value</string>
3757 </dict>
3758 </dict>
3759 ```
3760 #### policies.json
3761 ```
3762 {
3763 "policies": {
3764 "Preferences": {
3765 "boolean_preference_name": true | false,
3766 "string_preference_name": "string_value"
3767 }
3768 }
3769 }
3770 ```
3771 ### PromptForDownloadLocation
3772 Ask where to save each file before downloading.
3773
3774 **Compatibility:** Firefox 68, Firefox ESR 68\
3775 **CCK2 Equivalent:** N/A\
3776 **Preferences Affected:** `browser.download.useDownloadDir`
3777
3778 #### Windows (GPO)
3779 ```
3780 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3781 ```
3782 #### Windows (Intune)
3783 OMA-URI:
3784 ```
3785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3786 ```
3787 Value (string):
3788 ```
3789 <enabled/> or <disabled/>
3790 ```
3791 #### macOS
3792 ```
3793 <dict>
3794 <key>PromptForDownloadLocation</key>
3795 <true/> | <false/>
3796 </dict>
3797 ```
3798 #### policies.json
3799 ```
3800 {
3801 "policies": {
3802 "PromptForDownloadLocation": true | false
3803 }
3804 }
3805 ```
3806 ### Proxy
3807 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3808 To specify ports, append them to the hostnames with a colon (:).
3809
3810 `Mode` is the proxy method being used.
3811
3812 `Locked` is whether or not proxy settings can be changed.
3813
3814 `HTTPProxy` is the HTTP proxy server.
3815
3816 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3817
3818 `SSLProxy` is the SSL proxy server.
3819
3820 `FTPProxy` is the FTP proxy server.
3821
3822 `SOCKSProxy` is the SOCKS proxy server
3823
3824 `SOCKSVersion` is the SOCKS version (4 or 5)
3825
3826 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3827
3828 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3829
3830 `AutoLogin` means do not prompt for authentication if password is saved.
3831
3832 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3833
3834 **Compatibility:** Firefox 60, Firefox ESR 60\
3835 **CCK2 Equivalent:** `networkProxy*`\
3836 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3837
3838 #### Windows (GPO)
3839 ```
3840 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3841 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3842 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3843 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3844 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3845 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3846 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3847 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3848 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3849 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3850 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3851 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3852 ```
3853 #### Windows (Intune)
3854 OMA-URI:
3855 ```
3856 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3857 ```
3858 Value (string):
3859 ```
3860 <enabled/>
3861 <data id="ProxyLocked" value="true | false"/>
3862 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3863 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3864 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3865 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3866 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3867 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3868 <data id="SOCKSVersion" value="4 | 5"/>
3869 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3870 <data id="Passthrough" value="<local>"/>
3871 <data id="AutoLogin" value="true | false"/>
3872 <data id="UseProxyForDNS" value="true | false"/>
3873 ```
3874 #### macOS
3875 ```
3876 <dict>
3877 <key>Proxy</key>
3878 <dict>
3879 <key>Mode</key>
3880 <string>none | system | manual | autoDetect | autoConfig</string>
3881 <key>Locked</key>
3882 <true> | </false>
3883 <key>HTTPProxy</key>
3884 <string>https://httpproxy.example.com</string>
3885 <key>UseHTTPProxyForAllProtocols</key>
3886 <true> | </false>
3887 <key>SSLProxy</key>
3888 <string>https://sslproxy.example.com</string>
3889 <key>FTPProxy</key>
3890 <string>https://ftpproxy.example.com</string>
3891 <key>SOCKSProxy</key>
3892 <string>https://socksproxy.example.com</string>
3893 <key>SOCKSVersion</key>
3894 <string>4 | 5</string>
3895 <key>Passthrough</key>
3896 <string>&lt;local>&gt;</string>
3897 <key>AutoConfigURL</key>
3898 <string>URL_TO_AUTOCONFIG</string>
3899 <key>AutoLogin</key>
3900 <true> | </false>
3901 <key>UseProxyForDNS</key>
3902 <true> | </false>
3903 </dict>
3904 </dict>
3905 ```
3906 #### policies.json
3907 ```
3908 {
3909 "policies": {
3910 "Proxy": {
3911 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3912 "Locked": true | false,
3913 "HTTPProxy": "hostname",
3914 "UseHTTPProxyForAllProtocols": true | false,
3915 "SSLProxy": "hostname",
3916 "FTPProxy": "hostname",
3917 "SOCKSProxy": "hostname",
3918 "SOCKSVersion": 4 | 5
3919 "Passthrough": "<local>",
3920 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3921 "AutoLogin": true | false,
3922 "UseProxyForDNS": true | false
3923 }
3924 }
3925 }
3926 ```
3927 ### RequestedLocales
3928 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3929
3930 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3931
3932 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3933 **CCK2 Equivalent:** N/A\
3934 **Preferences Affected:** N/A
3935 #### Windows (GPO)
3936 ```
3937 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3938 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3939
3940 or
3941
3942 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3943 ```
3944 #### Windows (Intune)
3945 OMA-URI:
3946 ```
3947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3948 ```
3949 Value (string):
3950 ```
3951 <enabled/>
3952 <data id="Preferences_String" value="de,en-US"/>
3953 ```
3954 #### macOS
3955 ```
3956 <dict>
3957 <key>RequestedLocales</key>
3958 <array>
3959 <string>de</string>
3960 <string>en-US</string>
3961 </array>
3962 </dict>
3963
3964 or
3965
3966 <dict>
3967 <key>RequestedLocales</key>
3968 <string>de,en-US</string>
3969 </dict>
3970
3971 ```
3972 #### policies.json
3973 ```
3974 {
3975 "policies": {
3976 "RequestedLocales": ["de", "en-US"]
3977 }
3978 }
3979
3980 or
3981
3982 {
3983 "policies": {
3984 "RequestedLocales": "de,en-US"
3985 }
3986 }
3987 ```
3988 <a name="SanitizeOnShutdown"></a>
3989
3990 ### SanitizeOnShutdown (Selective)
3991 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3992
3993 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3994
3995 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3996 **CCK2 Equivalent:** N/A\
3997 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3998 #### Windows (GPO)
3999 ```
4000 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4001 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4002 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4003 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4004 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4005 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4006 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4007 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4008 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4009 ```
4010 #### Windows (Intune)
4011 OMA-URI:
4012 ```
4013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4014 ```
4015 Value (string):
4016 ```
4017 <enabled/> or <disabled/>
4018 ```
4019 #### macOS
4020 ```
4021 <dict>
4022 <key>SanitizeOnShutdown</key>
4023 <dict>
4024 <key>Cache</key>
4025 <true/> | <false/>
4026 <key>Cookies</key>
4027 <true/> | <false/>
4028 <key>Downloads</key>
4029 <true/> | <false/>
4030 <key>FormData</key>
4031 <true/> | <false/>
4032 <key>History</key>
4033 <true/> | <false/>
4034 <key>Sessions</key>
4035 <true/> | <false/>
4036 <key>SiteSettings</key>
4037 <true/> | <false/>
4038 <key>OfflineApps</key>
4039 <true/> | <false/>
4040 <key>Locked</key>
4041 <true/> | <false/>
4042 </dict>
4043 </dict>
4044 ```
4045 #### policies.json
4046 ```
4047 {
4048 "policies": {
4049 "SanitizeOnShutdown": {
4050 "Cache": true | false,
4051 "Cookies": true | false,
4052 "Downloads": true | false,
4053 "FormData": true | false,
4054 "History": true | false,
4055 "Sessions": true | false,
4056 "SiteSettings": true | false,
4057 "OfflineApps": true | false,
4058 "Locked": true | false
4059 }
4060 }
4061 }
4062 ```
4063 ### SanitizeOnShutdown (All)
4064 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4065
4066 **Compatibility:** Firefox 60, Firefox ESR 60\
4067 **CCK2 Equivalent:** N/A\
4068 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4069 #### Windows (GPO)
4070 ```
4071 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4072 ```
4073 #### Windows (Intune)
4074 OMA-URI:
4075 ```
4076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4077 ```
4078 Value (string):
4079 ```
4080 <enabled/> or <disabled/>
4081 ```
4082 #### macOS
4083 ```
4084 <dict>
4085 <key>SanitizeOnShutdown</key>
4086 <true/> | <false/>
4087 </dict>
4088 ```
4089 #### policies.json
4090 ```
4091 {
4092 "policies": {
4093 "SanitizeOnShutdown": true | false
4094 }
4095 }
4096 ```
4097 ### SearchBar
4098 Set whether or not search bar is displayed.
4099
4100 **Compatibility:** Firefox 60, Firefox ESR 60\
4101 **CCK2 Equivalent:** `showSearchBar`\
4102 **Preferences Affected:** N/A
4103
4104 #### Windows (GPO)
4105 ```
4106 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4107 ```
4108
4109 #### Windows (Intune)
4110 OMA-URI:
4111 ```
4112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4113 ```
4114 Value (string):
4115 ```
4116 <enabled/>
4117 <data id="Permissions" value="unified | separate"/>
4118 ```
4119 #### macOS
4120 ```
4121 <dict>
4122 <key>SearchBar</key>
4123 <string>unified | separate</string>
4124 </dict>
4125 ```
4126 #### policies.json
4127 ```
4128 {
4129 "policies": {
4130 "SearchBar": "unified" | "separate"
4131 }
4132 }
4133 ```
4134 <a name="SearchEngines"></a>
4135
4136 ### SearchEngines (This policy is only available on the ESR.)
4137
4138 ### SearchEngines | Default
4139
4140 Set the default search engine. This policy is only available on the ESR.
4141
4142 **Compatibility:** Firefox ESR 60\
4143 **CCK2 Equivalent:** `defaultSearchEngine`\
4144 **Preferences Affected:** N/A
4145
4146 #### Windows (GPO)
4147 ```
4148 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4149 ```
4150 #### Windows (Intune)
4151 OMA-URI:
4152 ```
4153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4154 ```
4155 Value (string):
4156 ```
4157 <enabled/>
4158 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4159 ```
4160 #### macOS
4161 ```
4162 <dict>
4163 <key>SearchEngines</key>
4164 <dict>
4165 <key>Default</key>
4166 <string>NAME_OF_SEARCH_ENGINE</string>
4167 </dict>
4168 </dict>
4169 ```
4170 #### policies.json
4171 ```
4172 {
4173 "policies": {
4174 "SearchEngines": {
4175 "Default": "NAME_OF_SEARCH_ENGINE"
4176 }
4177 }
4178 }
4179 ```
4180 ### SearchEngines | PreventInstalls
4181
4182 Prevent installing search engines from webpages.
4183
4184 **Compatibility:** Firefox ESR 60\
4185 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4186 **Preferences Affected:** N/A
4187
4188 #### Windows (GPO)
4189 ```
4190 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4191 ```
4192 #### Windows (Intune)
4193 OMA-URI:
4194 ```
4195 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4196 ```
4197 Value (string):
4198 ```
4199 <enabled/> or <disabled/>
4200 ```
4201 #### macOS
4202 ```
4203 <dict>
4204 <key>SearchEngines</key>
4205 <dict>
4206 <key>PreventInstalls</key>
4207 <true/> | <false/>
4208 </dict>
4209 </dict>
4210 ```
4211 #### policies.json
4212 ```
4213 {
4214 "policies": {
4215 "SearchEngines": {
4216 "PreventInstalls": true | false
4217 }
4218 }
4219 }
4220 ```
4221 ### SearchEngines | Remove
4222
4223 Hide built-in search engines. This policy is only available on the ESR.
4224
4225 **Compatibility:** Firefox ESR 60.2\
4226 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4227 **Preferences Affected:** N/A
4228
4229 #### Windows (GPO)
4230 ```
4231 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4232 ```
4233 #### Windows (Intune)
4234 OMA-URI:
4235 ```
4236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4237 ```
4238 Value (string):
4239 ```
4240 <enabled/>
4241 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4242 ```
4243 #### macOS
4244 ```
4245 <dict>
4246 <key>SearchEngines</key>
4247 <dict>
4248 <key>Remove</key>
4249 <array>
4250 <string>NAME_OF_SEARCH_ENGINE</string>
4251 </array>
4252 </dict>
4253 </dict>
4254 ```
4255 #### policies.json
4256 ```
4257 {
4258 "policies": {
4259 "SearchEngines": {
4260 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4261 }
4262 }
4263 }
4264 ```
4265 ### SearchEngines | Add
4266
4267 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4268
4269 `Name` is the name of the search engine.
4270
4271 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4272
4273 `Method` is either GET or POST
4274
4275 `IconURL` is a URL for the icon to use.
4276
4277 `Alias` is a keyword to use for the engine.
4278
4279 `Description` is a description of the search engine.
4280
4281 `PostData` is the POST data as name value pairs separated by &.
4282
4283 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4284
4285 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4286 **CCK2 Equivalent:** `searchplugins`\
4287 **Preferences Affected:** N/A
4288
4289 #### Windows (GPO)
4290 ```
4291 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4292 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4293 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4294 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4295 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4296 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4297 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4298 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4299 ```
4300 #### Windows (Intune)
4301 OMA-URI:
4302 ```
4303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4304 ```
4305 Value (string):
4306 ```
4307 <enabled/>
4308 <data id="SearchEngine_Name" value="Example1"/>
4309 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4310 <data id="SearchEngine_Method" value="GET | POST"/>
4311 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4312 <data id="SearchEngine_Alias" value="example"/>
4313 <data id="SearchEngine_Description" value="Example Description"/>
4314 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4315 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4316 ```
4317 #### macOS
4318 ```
4319 <dict>
4320 <key>SearchEngines</key>
4321 <dict>
4322 <key>Add</key>
4323 <array>
4324 <dict>
4325 <key>Name</key>
4326 <string>Example1</string>
4327 <key>URLTemplate</key>
4328 <string>https://www.example.org/q={searchTerms}</string>
4329 <key>Method</key>
4330 <string>GET | POST </string>
4331 <key>IconURL</key>
4332 <string>https://www.example.org/favicon.ico</string>
4333 <key>Alias</key>
4334 <string>example</string>
4335 <key>Description</key>
4336 <string>Example Description</string>
4337 <key>SuggestURLTemplate</key>
4338 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4339 <key>PostData</key>
4340 <string>name=value&q={searchTerms}</string>
4341 </dict>
4342 <array>
4343 </dict>
4344 </dict>
4345 ```
4346 #### policies.json
4347 ```
4348 {
4349 "policies": {
4350 "SearchEngines": {
4351 "Add": [
4352 {
4353 "Name": "Example1",
4354 "URLTemplate": "https://www.example.org/q={searchTerms}",
4355 "Method": "GET" | "POST",
4356 "IconURL": "https://www.example.org/favicon.ico",
4357 "Alias": "example",
4358 "Description": "Description",
4359 "PostData": "name=value&q={searchTerms}",
4360 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4361 }
4362 ]
4363 }
4364 }
4365 }
4366 ```
4367 ### SearchSuggestEnabled
4368
4369 Enable search suggestions.
4370
4371 **Compatibility:** Firefox 68, Firefox ESR 68\
4372 **CCK2 Equivalent:** N/A\
4373 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4374
4375 #### Windows (GPO)
4376 ```
4377 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4378 ```
4379 #### Windows (Intune)
4380 OMA-URI:
4381 ```
4382 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4383 ```
4384 Value (string):
4385 ```
4386 <enabled/> or <disabled/>
4387 ```
4388 #### macOS
4389 ```
4390 <dict>
4391 <key>SearchSuggestEnabled</key>
4392 <true/> | <false/>
4393 </dict>
4394 ```
4395 #### policies.json
4396 ```
4397 {
4398 "policies": {
4399 "SearchSuggestEnabled": true | false
4400 }
4401 }
4402 ```
4403 ### SecurityDevices
4404
4405 Install PKCS #11 modules.
4406
4407 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4408 **CCK2 Equivalent:** `certs.devices`\
4409 **Preferences Affected:** N/A
4410
4411 #### Windows (GPO)
4412 ```
4413 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4414 ```
4415 #### Windows (Intune)
4416 OMA-URI:
4417 ```
4418 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4419 ```
4420 Value (string):
4421 ```
4422 <enabled/>
4423 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4424 ```
4425 #### macOS
4426 ```
4427 <dict>
4428 <key>SecurityDevices</key>
4429 <dict>
4430 <key>NAME_OF_DEVICE</key>
4431 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4432 </dict>
4433 </dict>
4434 ```
4435
4436 #### policies.json
4437 ```
4438 {
4439 "policies": {
4440 "SecurityDevices": {
4441 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4442 }
4443 }
4444 }
4445 ```
4446 ### SSLVersionMax
4447
4448 Set and lock the maximum version of TLS.
4449
4450 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4451 **CCK2 Equivalent:** N/A\
4452 **Preferences Affected:** `security.tls.version.max`
4453
4454 #### Windows (GPO)
4455 ```
4456 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4457 ```
4458 #### Windows (Intune)
4459 OMA-URI:
4460 ```
4461 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4462 ```
4463 Value (string):
4464 ```
4465 <enabled/>
4466 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4467 ```
4468 #### macOS
4469 ```
4470 <dict>
4471 <key>SSLVersionMax</key>
4472 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4473 </dict>
4474 ```
4475
4476 #### policies.json
4477 ```
4478 {
4479 "policies": {
4480 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4481 }
4482 }
4483 ```
4484 ### SSLVersionMin
4485
4486 Set and lock the minimum version of TLS.
4487
4488 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4489 **CCK2 Equivalent:** N/A\
4490 **Preferences Affected:** `security.tls.version.min`
4491
4492 #### Windows (GPO)
4493 ```
4494 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4495 ```
4496 #### Windows (Intune)
4497 OMA-URI:
4498 ```
4499 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4500 ```
4501 Value (string):
4502 ```
4503 <enabled/>
4504 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4505 ```
4506 #### macOS
4507 ```
4508 <dict>
4509 <key>SSLVersionMin</key>
4510 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4511 </dict>
4512 ```
4513
4514 #### policies.json
4515 ```
4516 {
4517 "policies": {
4518 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4519 }
4520 }
4521 ```
4522 ### SupportMenu
4523 Add a menuitem to the help menu for specifying support information.
4524
4525 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4526 **CCK2 Equivalent:** helpMenu\
4527 **Preferences Affected:** N/A
4528
4529 #### Windows (GPO)
4530 ```
4531 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4532 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4533 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4534 ```
4535 #### Windows (Intune)
4536 OMA-URI:
4537 ```
4538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4539 ```
4540 Value (string):
4541 ```
4542 <enabled/>
4543 <data id="SupportMenuTitle" value="Support Menu"/>
4544 <data id="SupportMenuURL" value="http://example.com/support"/>
4545 <data id="SupportMenuAccessKey" value="S">
4546 ```
4547 #### macOS
4548 ```
4549 <dict>
4550 <key>SupportMenu</key>
4551 <dict>
4552 <key>Title</key>
4553 <string>SupportMenu</string>
4554 <key>URL</key>
4555 <string>http://example.com/support</string>
4556 <key>AccessKey</key>
4557 <string>S</string>
4558 </dict>
4559 </dict>
4560 ```
4561 #### policies.json
4562 ```
4563 {
4564 "policies": {
4565 "SupportMenu": {
4566 "Title": "Support Menu",
4567 "URL": "http://example.com/support",
4568 "AccessKey": "S"
4569 }
4570 }
4571 }
4572 ```
4573 ### UserMessaging
4574
4575 Prevent installing search engines from webpages.
4576
4577 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4578
4579 `ExtensionRecommendations` Don't recommend extensions.
4580
4581 `FeatureRecommendations` Don't recommend browser features.
4582
4583 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4584
4585 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4586 **CCK2 Equivalent:** N/A\
4587 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4588
4589 #### Windows (GPO)
4590 ```
4591 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4592 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4593 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4594 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4595 ```
4596 #### Windows (Intune)
4597 OMA-URI:
4598 ```
4599 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4600 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4603 ```
4604 Value (string):
4605 ```
4606 <enabled/> or <disabled/>
4607 ```
4608 #### macOS
4609 ```
4610 <dict>
4611 <key>UserMessaging</key>
4612 <dict>
4613 <key>WhatsNew</key>
4614 <true/> | <false/>
4615 <key>ExtensionRecommendations</key>
4616 <true/> | <false/>
4617 <key>FeatureRecommendations</key>
4618 <true/> | <false/>
4619 <key>UrlbarInterventions</key>
4620 <true/> | <false/>
4621 </dict>
4622 </dict>
4623 ```
4624 #### policies.json
4625 ```
4626 {
4627 "policies": {
4628 "UserMessaging": {
4629 "WhatsNew": true | false,
4630 "ExtensionRecommendations": true | false,
4631 "FeatureRecommendations": true | false,
4632 "UrlbarInterventions": true | false
4633 }
4634 }
4635 }
4636 ```
4637 ### WebsiteFilter
4638 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4639
4640 **Compatibility:** Firefox 60, Firefox ESR 60\
4641 **CCK2 Equivalent:** N/A\
4642 **Preferences Affected:** N/A
4643
4644 #### Windows (GPO)
4645 ```
4646 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4647 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4648 ```
4649 #### Windows (Intune)
4650 OMA-URI:
4651 ```
4652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4653 ```
4654 Value (string):
4655 ```
4656 <enabled/>
4657 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4658 ```
4659 OMA-URI:
4660 ```
4661 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4662 ```
4663 Value (string):
4664 ```
4665 <enabled/>
4666 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4667 ```
4668 #### macOS
4669 ```
4670 <dict>
4671 <key>WebsiteFilter</key>
4672 <dict>
4673 <key>Block</key>
4674 <array>
4675 <string><all_urls></string>
4676 </array>
4677 <key>Exceptions</key>
4678 <array>
4679 <string>http://example.org/*</string>
4680 </array>
4681 </dict>
4682
4683 </dict>
4684 ```
4685 #### policies.json
4686 ```
4687 {
4688 "policies": {
4689 "WebsiteFilter": {
4690 "Block": ["<all_urls>"],
4691 "Exceptions": ["http://example.org/*"]
4692 }
4693 }
4694 }
4695 ```

patrick-canterino.de