]> git.p6c8.net - policy-templates.git/blob - README.md
Added more Intune configuration examples
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### Windows (Intune)
111 OMA-URI:
112 ```
113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
114 ```
115 Value (string):
116 ```
117 <enabled/> or <disabled/>
118 ```
119 #### macOS
120 ```
121 <dict>
122 <key>AppAutoUpdate</key>
123 <true/> | <false/>
124 </dict>
125 ```
126 #### policies.json
127 ```
128 {
129 "policies": {
130 "AppAutoUpdate": true | false
131 }
132 }
133 ```
134 ### AppUpdateURL
135
136 Change the URL for application update.
137
138 **Compatibility:** Firefox 62, Firefox ESR 60.2\
139 **CCK2 Equivalent:** N/A\
140 **Preferences Affected:** `app.update.url`
141
142 #### Windows (GPO)
143 ```
144 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
145 ```
146 #### Windows (Intune)
147 OMA-URI:
148 ```
149 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
150 ```
151 Value (string):
152 ```
153 <enabled/>
154 <data id="AppUpdateURL" value="https://yoursite.com"/>
155 ```
156 #### macOS
157 ```
158 <dict>
159 <key>AppUpdateURL</key>
160 <string>https://yoursite.com</string>
161 </dict>
162 ```
163 #### policies.json
164 ```
165 {
166 "policies": {
167 "AppUpdateURL": "https://yoursite.com"
168 }
169 }
170 ```
171 ### Authentication
172
173 Configure sites that support integrated authentication.
174
175 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
176
177 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
178 **CCK2 Equivalent:** N/A\
179 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
180
181 #### Windows (GPO)
182 ```
183 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
184 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
185 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
186 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
190 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
191 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
192 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
194 ```
195 #### Windows (Intune)
196 OMA-URI:
197 ```
198 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
199 ```
200 Value (string):
201 ```
202 <enabled/>
203
204 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
205 ```
206 OMA-URI:
207 ```
208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
209 ```
210 Value (string):
211 ```
212 <enabled/>
213
214 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
215 ```
216 OMA-URI:
217 ```
218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
219 ```
220 Value (string):
221 ```
222 <enabled/>
223
224 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
225 ```
226 OMA-URI:
227 ```
228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
229 ```
230 Value (string):
231 ```
232 <enabled/>
233
234 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
235 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
236 ```
237 OMA-URI:
238 ```
239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
240 ```
241 Value (string):
242 ```
243 <enabled/>
244
245 <data id="StartPage" value="none | homepage | previous-session"/>
246 ```
247 #### macOS
248 ```
249 <dict>
250 <key>Authentication</key>
251 <dict>
252 <key>SPNEGO</key>
253 <array>
254 <string>mydomain.com</string>
255 <string>https://myotherdomain.com</string>
256 </array>
257 <key>Delegated</key>
258 <array>
259 <string>mydomain.com</string>
260 <string>https://myotherdomain.com</string>
261 </array>
262 <key>NTLM</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>AllowNonFQDN</key>
268 <dict>
269 <key>SPNEGO</key>
270 <true/> | <false/>
271 <key>NTLM</key>
272 <true/> | <false/>
273 </dict>
274 <key>AllowProxies</key>
275 <dict>
276 <key>SPNEGO</key>
277 <true/> | <false/>
278 <key>NTLM</key>
279 <true/> | <false/>
280 </dict>
281 <key>Locked</key>
282 <true/> | <false/>
283 </dict>
284 </dict>
285 ```
286 #### policies.json
287 ```
288 {
289 "policies": {
290 "Authentication": {
291 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
292 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
293 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
294 "AllowNonFQDN": {
295 "SPNEGO": true | false,
296 "NTLM": true | false
297 },
298 "AllowProxies": {
299 "SPNEGO": true | false,
300 "NTLM": true | false
301 },
302 "Locked": true | false
303 }
304 }
305 }
306 ```
307 ### BlockAboutAddons
308
309 Block access to the Add-ons Manager (about:addons).
310
311 **Compatibility:** Firefox 60, Firefox ESR 60\
312 **CCK2 Equivalent:** `disableAddonsManager`\
313 **Preferences Affected:** N/A
314
315 #### Windows (GPO)
316 ```
317 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
318 ```
319 #### Windows (Intune)
320 OMA-URI:
321 ```
322 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
323 ```
324 Value (string):
325 ```
326 <enabled/> or <disabled/>
327 ```
328 #### macOS
329 ```
330 <dict>
331 <key>BlockAboutAddons</key>
332 <true/> | <false/>
333 </dict>
334 ```
335 #### policies.json
336 ```
337 {
338 "policies": {
339 "BlockAboutAddons": true | false
340 }
341 }
342 ```
343 ### BlockAboutConfig
344
345 Block access to about:config.
346
347 **Compatibility:** Firefox 60, Firefox ESR 60\
348 **CCK2 Equivalent:** `disableAboutConfig`\
349 **Preferences Affected:** N/A
350
351 #### Windows (GPO)
352 ```
353 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
354 ```
355 #### Windows (Intune)
356 OMA-URI:
357 ```
358 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
359 ```
360 Value (string):
361 ```
362 <enabled/> or <disabled/>
363 ```
364 #### macOS
365 ```
366 <dict>
367 <key>BlockAboutConfig</key>
368 <true/> | <false/>
369 </dict>
370 ```
371 #### policies.json
372 ```
373 {
374 "policies": {
375 "BlockAboutConfig": true | false
376 }
377 }
378 ```
379 ### BlockAboutProfiles
380
381 Block access to About Profiles (about:profiles).
382
383 **Compatibility:** Firefox 60, Firefox ESR 60\
384 **CCK2 Equivalent:** `disableAboutProfiles`\
385 **Preferences Affected:** N/A
386
387 #### Windows (GPO)
388 ```
389 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
390 ```
391 #### Windows (Intune)
392 OMA-URI:
393 ```
394 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
395 ```
396 Value (string):
397 ```
398 <enabled/> or <disabled/>
399 ```
400 #### macOS
401 ```
402 <dict>
403 <key>BlockAboutProfiles</key>
404 <true/> | <false/>
405 </dict>
406 ```
407 #### policies.json
408 ```
409 {
410 "policies": {
411 "BlockAboutProfiles": true | false
412 }
413 }
414 ```
415 ### BlockAboutSupport
416
417 Block access to Troubleshooting Information (about:support).
418
419 **Compatibility:** Firefox 60, Firefox ESR 60\
420 **CCK2 Equivalent:** `disableAboutSupport`\
421 **Preferences Affected:** N/A
422
423 #### Windows (GPO)
424 ```
425 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
426 ```
427 #### Windows (Intune)
428 OMA-URI:
429 ```
430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
431 ```
432 Value (string):
433 ```
434 <enabled/> or <disabled/>
435 ```
436 #### macOS
437 ```
438 <dict>
439 <key>BlockAboutSupport</key>
440 <true/> | <false/>
441 </dict>
442 ```
443 #### policies.json
444 ```
445 {
446 "policies": {
447 "BlockAboutSupport": true | false
448 }
449 }
450 ```
451 ### Bookmarks
452
453 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
454
455 **Compatibility:** Firefox 60, Firefox ESR 60\
456 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
457 **Preferences Affected:** N/A
458
459 #### Windows (GPO)
460 ```
461 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
462 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
463 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
464 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
465 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
466 ```
467 #### Windows (Intune)
468 OMA-URI:
469 ```
470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
471 ```
472 Value (string):
473 ```
474 <enabled/>
475 <data id="BookmarkTitle" value="Example"/>
476 <data id="BookmarkURL" value="https://example.com"/>
477 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
478 <data id="BookmarkPlacement" value="toolbar | menu"/>
479 <data id="BookmarkFolder" value="FolderName"/>
480 ```
481 #### macOS
482 ```
483 <dict>
484 <key>Bookmarks</key>
485 <array>
486 <dict>
487 <key>Title</key>
488 <string>Example</string>
489 <key>URL</key>
490 <string>https://example.com</string>
491 <key>Favicon</key>
492 <string>https://example.com/favicon.ico</string>
493 <key>Placement</key>
494 <string>toolbar | menu</string>
495 <key>Folder</key>
496 <string>FolderName</string>
497 </dict>
498 </array>
499 </dict>
500 ```
501 #### policies.json
502 ```
503 {
504 "policies": {
505 "Bookmarks": [
506 {
507 "Title": "Example",
508 "URL": "https://example.com",
509 "Favicon": "https://example.com/favicon.ico",
510 "Placement": "toolbar" | "menu",
511 "Folder": "FolderName"
512 }
513 ]
514 }
515 }
516 ```
517 ### CaptivePortal
518 Enable or disable the detection of captive portals.
519
520 **Compatibility:** Firefox 67, Firefox ESR 60.7\
521 **CCK2 Equivalent:** N/A\
522 **Preferences Affected:** `network.captive-portal-service.enabled`
523
524 #### Windows (GPO)
525 ```
526 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
527 ```
528 #### Windows (Intune)
529 OMA-URI:
530 ```
531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
532 ```
533 Value (string):
534 ```
535 <enabled/> or <disabled/>
536 ```
537 #### macOS
538 ```
539 <dict>
540 <key>CaptivePortal</key>
541 <true/> | <false/>
542 </dict>
543 ```
544 #### policies.json
545 ```
546 {
547 "policies": {
548 "CaptivePortal": true | false
549 }
550 }
551 ```
552 ### Certificates
553
554 ### Certificates | ImportEnterpriseRoots
555
556 Trust certificates that have been added to the operating system certificate store by a user or administrator.
557
558 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
559
560 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
561 **CCK2 Equivalent:** N/A\
562 **Preferences Affected:** `security.enterprise_roots.enabled`
563
564 #### Windows (GPO)
565 ```
566 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
567 ```
568 #### Windows (Intune)
569 OMA-URI:
570 ```
571 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
572 ```
573 Value (string):
574 ```
575 <enabled/> or <disabled/>
576 ```
577 #### macOS
578 ```
579 <dict>
580 <key>Certificates</key>
581 <dict>
582 <key>ImportEnterpriseRoots</key>
583 <true/> | <false/>
584 </dict>
585 </dict>
586 ```
587 #### policies.json
588 ```
589 {
590 "policies": {
591 "Certificates": {
592 "ImportEnterpriseRoots": true | false
593 }
594 }
595 }
596 ```
597 ### Certificates | Install
598
599 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
600
601 - Windows
602 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
603 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
604 - macOS
605 - /Library/Application Support/Mozilla/Certificates
606 - ~/Library/Application Support/Mozilla/Certificates
607 - Linux
608 - /usr/lib/mozilla/certificates
609 - /usr/lib64/mozilla/certificates
610 - ~/.mozilla/certificates
611
612 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
613
614 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
615
616 Certificates are installed using the trust string `CT,CT,`.
617
618 Binary (DER) and ASCII (PEM) certificates are both supported.
619
620 **Compatibility:** Firefox 64, Firefox ESR 64\
621 **CCK2 Equivalent:** `certs.ca`\
622 **Preferences Affected:** N/A
623
624 #### Windows (GPO)
625 ```
626 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
627 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
628 ```
629 #### Windows (Intune)
630 OMA-URI:
631 ```
632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
633 ```
634 Value (string):
635 ```
636 <enabled/>
637 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
638 ```
639 #### macOS
640 ```
641 <dict>
642 <key>Certificates</key>
643 <dict>
644 <key>Install</key>
645 <array>
646 <string>cert1.der</string>
647 <string>/Users/username/cert2.pem</string>
648 </array>
649 </dict>
650 </dict>
651 ```
652 #### policies.json
653 ```
654 {
655 "policies": {
656 "Certificates": {
657 "Install": ["cert1.der", "/home/username/cert2.pem"]
658 }
659 }
660 }
661 ```
662 ### Cookies
663 Configure cookie preferences.
664
665 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
666
667 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
668
669 `Default` determines whether cookies are accepted at all.
670
671 `AcceptThirdParty` determines how third-party cookies are handled.
672
673 `ExpireAtSessionEnd` determines when cookies expire.
674
675 `RejectTracker` only rejects cookies for trackers.
676
677 `Locked` prevents the user from changing cookie preferences.
678
679 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
680 **CCK2 Equivalent:** N/A\
681 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
682
683 #### Windows (GPO)
684 ```
685 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
686 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
687 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
688 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
689 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
690 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
691 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
692 ```
693 #### Windows (Intune)
694 OMA-URI:
695 ```
696 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
697 ```
698 Value (string):
699 ```
700 <enabled/>
701 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
702 ```
703 OMA-URI:
704 ```
705 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
706 ```
707 Value (string):
708 ```
709 <enabled/>
710 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
711 ```
712 OMA-URI:
713 ```
714 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
715 ```
716 Value (string):
717 ```
718 <enabled/> or <disabled/>
719 ```
720 OMA-URI:
721 ```
722 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
723 ```
724 Value (string):
725 ```
726 <enabled/>
727 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
728 ```
729 OMA-URI:
730 ```
731 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
732 ```
733 Value (string):
734 ```
735 <enabled/> or <disabled/>
736 ```
737 OMA-URI:
738 ```
739 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
740 ```
741 Value (string):
742 ```
743 <enabled/> or <disabled/>
744 ```
745 OMA-URI:
746 ```
747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
748 ```
749 Value (string):
750 ```
751 <enabled/> or <disabled/>
752 ```
753 #### macOS
754 ```
755 <dict>
756 <key>Cookies</key>
757 <dict>
758 <key>Allow</key>
759 <array>
760 <string>http://example.com</string>
761 </array>
762 <key>Block</key>
763 <array>
764 <string>http://example.org</string>
765 </array>
766 <key>Default</key>
767 <true/> | <false/>
768 <key>AcceptThirdParty</key>
769 <string>always | never | from-visited</string>
770 <key>ExpireAtSessionEnd</key>
771 <true/> | <false/>
772 <key>RejectTracker</key>
773 <true/> | <false/>
774 <key>Locked</key>
775 <true/> | <false/>
776 </dict>
777 </dict>
778 ```
779 #### policies.json
780 ```
781 {
782 "policies": {
783 "Cookies": {
784 "Allow": ["http://example.org/"],
785 "Block": ["http://example.edu/"],
786 "Default": true | false,
787 "AcceptThirdParty": "always" | "never" | "from-visited",
788 "ExpireAtSessionEnd": true | false,
789 "RejectTracker": true | false,
790 "Locked": true | false
791 }
792 }
793 }
794 ```
795 ### DisableSetDesktopBackground
796 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
797
798 **Compatibility:** Firefox 60, Firefox ESR 60\
799 **CCK2 Equivalent:** `removeSetDesktopBackground`\
800 **Preferences Affected:** N/A
801
802 #### Windows (GPO)
803 ```
804 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
805 ```
806 #### Windows (Intune)
807 OMA-URI:
808 ```
809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
810 ```
811 Value (string):
812 ```
813 <enabled/> or <disabled/>
814 ```
815 #### macOS
816 ```
817 <dict>
818 <key>DisableSetDesktopBackground</key>
819 <true/> | <false/>
820 </dict>
821 ```
822 #### policies.json
823 ```
824 {
825 "policies": {
826 "DisableSetDesktopBackground": true | false
827 }
828 }
829 ```
830 ### DisableMasterPasswordCreation
831 Remove the master password functionality.
832
833 **Compatibility:** Firefox 60, Firefox ESR 60\
834 **CCK2 Equivalent:** `noMasterPassword`\
835 **Preferences Affected:** N/A
836
837 #### Windows (GPO)
838 ```
839 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
840 ```
841 #### Windows (Intune)
842 OMA-URI:
843 ```
844 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
845 ```
846 Value (string):
847 ```
848 <enabled/> or <disabled/>
849 ```
850 #### macOS
851 ```
852 <dict>
853 <key>DisableMasterPasswordCreation</key>
854 <true/> | <false/>
855 </dict>
856 ```
857 #### policies.json
858 ```
859 {
860 "policies": {
861 "DisableMasterPasswordCreation": true | false
862 }
863 }
864 ```
865 ### DisableAppUpdate
866 Turn off application updates.
867
868 **Compatibility:** Firefox 60, Firefox ESR 60\
869 **CCK2 Equivalent:** `disableFirefoxUpdates`\
870 **Preferences Affected:** N/A
871
872 #### Windows (GPO)
873 ```
874 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
875 ```
876 #### Windows (Intune)
877 OMA-URI:
878 ```
879 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
880 ```
881 Value (string):
882 ```
883 <enabled/> or <disabled/>
884 ```
885 #### macOS
886 ```
887 <dict>
888 <key>DisableAppUpdate</key>
889 <true/> | <false/>
890 </dict>
891 ```
892 #### policies.json
893 ```
894 {
895 "policies": {
896 "DisableAppUpdate": true | false
897 }
898 }
899 ```
900 ### DisableBuiltinPDFViewer
901 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
902
903 **Compatibility:** Firefox 60, Firefox ESR 60\
904 **CCK2 Equivalent:** `disablePDFjs`\
905 **Preferences Affected:** `pdfjs.disabled`
906
907 #### Windows (GPO)
908 ```
909 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
910 ```
911 #### Windows (Intune)
912 OMA-URI:
913 ```
914 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
915 ```
916 Value (string):
917 ```
918 <enabled/> or <disabled/>
919 ```
920 #### macOS
921 ```
922 <dict>
923 <key>DisableBuiltinPDFViewer</key>
924 <true/> | <false/>
925 </dict>
926 ```
927 #### policies.json
928 ```
929 {
930 "policies": {
931 "DisableBuiltinPDFViewer": true | false
932 }
933 }
934 ```
935 ### DisableDefaultBrowserAgent
936 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
937
938 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
939 **CCK2 Equivalent:** N/A\
940 **Preferences Affected:** N/A
941
942 #### Windows (GPO)
943 ```
944 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
945 ```
946 #### Windows (Intune)
947 OMA-URI:
948 ```
949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
950 ```
951 Value (string):
952 ```
953 <enabled/> or <disabled/>
954 ```
955 #### policies.json
956 ```
957 {
958 "policies": {
959 "DisableDefaultBrowserAgent": true | false
960 }
961 }
962 ```
963 ### DisableDeveloperTools
964 Remove access to all developer tools.
965
966 **Compatibility:** Firefox 60, Firefox ESR 60\
967 **CCK2 Equivalent:** `removeDeveloperTools`\
968 **Preferences Affected:** `devtools.policy.disabled`
969
970 #### Windows (GPO)
971 ```
972 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
973 ```
974 #### Windows (Intune)
975 OMA-URI:
976 ```
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
978 ```
979 Value (string):
980 ```
981 <enabled/> or <disabled/>
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisableDeveloperTools</key>
987 <true/> | <false/>
988 </dict>
989 ```
990 #### policies.json
991 ```
992 {
993 "policies": {
994 "DisableDeveloperTools": true | false
995 }
996 }
997 ```
998 ### DisableFeedbackCommands
999 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1000
1001 **Compatibility:** Firefox 60, Firefox ESR 60\
1002 **CCK2 Equivalent:** N/A\
1003 **Preferences Affected:** N/A
1004
1005 #### Windows (GPO)
1006 ```
1007 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1008 ```
1009 #### Windows (Intune)
1010 OMA-URI:
1011 ```
1012 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1013 ```
1014 Value (string):
1015 ```
1016 <enabled/> or <disabled/>
1017 ```
1018 #### macOS
1019 ```
1020 <dict>
1021 <key>DisableFeedbackCommands</key>
1022 <true/> | <false/>
1023 </dict>
1024 ```
1025 #### policies.json
1026 ```
1027 {
1028 "policies": {
1029 "DisableFeedbackCommands": true | false
1030 }
1031 }
1032 ```
1033 ### DisableFirefoxScreenshots
1034 Remove access to Firefox Screenshots.
1035
1036 **Compatibility:** Firefox 60, Firefox ESR 60\
1037 **CCK2 Equivalent:** N/A\
1038 **Preferences Affected:** `extensions.screenshots.disabled`
1039
1040 #### Windows (GPO)
1041 ```
1042 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1043 ```
1044 #### Windows (Intune)
1045 OMA-URI:
1046 ```
1047 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1048 ```
1049 Value (string):
1050 ```
1051 <enabled/> or <disabled/>
1052 ```
1053 #### macOS
1054 ```
1055 <dict>
1056 <key>DisableFirefoxScreenshots</key>
1057 <true/> | <false/>
1058 </dict>
1059 ```
1060 #### policies.json
1061 ```
1062 {
1063 "policies": {
1064 "DisableFirefoxScreenshots": true | false
1065 }
1066 }
1067 ```
1068 ### DisableFirefoxAccounts
1069 Disable Firefox Accounts integration (Sync).
1070
1071 **Compatibility:** Firefox 60, Firefox ESR 60\
1072 **CCK2 Equivalent:** `disableSync`\
1073 **Preferences Affected:** `identity.fxaccounts.enabled`
1074
1075 #### Windows (GPO)
1076 ```
1077 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1078 ```
1079 #### Windows (Intune)
1080 OMA-URI:
1081 ```
1082 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1083 ```
1084 Value (string):
1085 ```
1086 <enabled/> or <disabled/>
1087 ```
1088 #### macOS
1089 ```
1090 <dict>
1091 <key>DisableFirefoxAccounts</key>
1092 <true/> | <false/>
1093 </dict>
1094 ```
1095 #### policies.json
1096 ```
1097 {
1098 "policies": {
1099 "DisableFirefoxAccounts": true | false
1100 }
1101 }
1102 ```
1103 ### DisableFirefoxStudies
1104 Disable Firefox studies (Shield).
1105
1106 **Compatibility:** Firefox 60, Firefox ESR 60\
1107 **CCK2 Equivalent:** N/A\
1108 **Preferences Affected:** N/A
1109
1110 #### Windows (GPO)
1111 ```
1112 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1113 ```
1114 #### Windows (Intune)
1115 OMA-URI:
1116 ```
1117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1118 ```
1119 Value (string):
1120 ```
1121 <enabled/> or <disabled/>
1122 ```
1123 #### macOS
1124 ```
1125 <dict>
1126 <key>DisableFirefoxStudies</key>
1127 <true/> | <false/>
1128 </dict>
1129 ```
1130 #### policies.json
1131 ```
1132 {
1133 "policies": {
1134 "DisableFirefoxStudies": true | false
1135 }
1136 }
1137 ```
1138 ### DisableForgetButton
1139 Disable the "Forget" button.
1140
1141 **Compatibility:** Firefox 60, Firefox ESR 60\
1142 **CCK2 Equivalent:** `disableForget`\
1143 **Preferences Affected:** N/A
1144
1145 #### Windows (GPO)
1146 ```
1147 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1148 ```
1149 #### Windows (Intune)
1150 OMA-URI:
1151 ```
1152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1153 ```
1154 Value (string):
1155 ```
1156 <enabled/> or <disabled/>
1157 ```
1158 #### macOS
1159 ```
1160 <dict>
1161 <key>DisableForgetButton</key>
1162 <true/> | <false/>
1163 </dict>
1164 ```
1165 #### policies.json
1166 ```
1167 {
1168 "policies": {
1169 "DisableForgetButton": true | false
1170 }
1171 }
1172 ```
1173 ### DisableFormHistory
1174 Turn off saving information on web forms and the search bar.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60\
1177 **CCK2 Equivalent:** `disableFormFill`\
1178 **Preferences Affected:** ` browser.formfill.enable`
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1183 ```
1184 #### Windows (Intune)
1185 OMA-URI:
1186 ```
1187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1188 ```
1189 Value (string):
1190 ```
1191 <enabled/> or <disabled/>
1192 ```
1193 #### macOS
1194 ```
1195 <dict>
1196 <key>DisableFormHistory</key>
1197 <true/> | <false/>
1198 </dict>
1199 ```
1200 #### policies.json
1201 ```
1202 {
1203 "policies": {
1204 "DisableFormHistory": true | false
1205 }
1206 }
1207 ```
1208 ### DisablePasswordReveal
1209 Do not allow passwords to be shown in saved logins
1210
1211 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1212 **CCK2 Equivalent:** N/A
1213 **Preferences Affected:** N/A
1214
1215 #### Windows (GPO)
1216 ```
1217 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1218 ```
1219 #### Windows (Intune)
1220 OMA-URI:
1221 ```
1222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1223 ```
1224 Value (string):
1225 ```
1226 <enabled/> or <disabled/>
1227 ```
1228 #### macOS
1229 ```
1230 <dict>
1231 <key>DisablePasswordReveal</key>
1232 <true/> | <false/>
1233 </dict>
1234 ```
1235 #### policies.json
1236 ```
1237 {
1238 "policies": {
1239 "DisablePasswordReveal": true | false
1240 }
1241 }
1242 ```
1243 ### DisablePocket
1244 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1245
1246 **Compatibility:** Firefox 60, Firefox ESR 60\
1247 **CCK2 Equivalent:** `disablePocket`\
1248 **Preferences Affected:** `extensions.pocket.enabled`
1249
1250 #### Windows (GPO)
1251 ```
1252 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1253 ```
1254 #### Windows (Intune)
1255 OMA-URI:
1256 ```
1257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1258 ```
1259 Value (string):
1260 ```
1261 <enabled/> or <disabled/>
1262 ```
1263 #### macOS
1264 ```
1265 <dict>
1266 <key>DisablePocket</key>
1267 <true/> | <false/>
1268 </dict>
1269 ```
1270 #### policies.json
1271 ```
1272 {
1273 "policies": {
1274 "DisablePocket": true | false
1275 }
1276 }
1277 ```
1278 ### DisablePrivateBrowsing
1279 Remove access to private browsing.
1280
1281 **Compatibility:** Firefox 60, Firefox ESR 60\
1282 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1283 **Preferences Affected:** N/A
1284
1285 #### Windows (GPO)
1286 ```
1287 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1288 ```
1289 #### Windows (Intune)
1290 OMA-URI:
1291 ```
1292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1293 ```
1294 Value (string):
1295 ```
1296 <enabled/> or <disabled/>
1297 ```
1298 #### macOS
1299 ```
1300 <dict>
1301 <key>DisablePrivateBrowsing</key>
1302 <true/> | <false/>
1303 </dict>
1304 ```
1305 #### policies.json
1306 ```
1307 {
1308 "policies": {
1309 "DisablePrivateBrowsing": true | false
1310 }
1311 }
1312 ```
1313 ### DisableProfileImport
1314 Disables the "Import data from another browser" option in the bookmarks window.
1315
1316 **Compatibility:** Firefox 60, Firefox ESR 60\
1317 **CCK2 Equivalent:** N/A\
1318 **Preferences Affected:** N/A
1319
1320 #### Windows (GPO)
1321 ```
1322 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1323 ```
1324 #### Windows (Intune)
1325 OMA-URI:
1326 ```
1327 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1328 ```
1329 Value (string):
1330 ```
1331 <enabled/> or <disabled/>
1332 ```
1333 #### macOS
1334 ```
1335 <dict>
1336 <key>DisableProfileImport</key>
1337 <true/> | <false/>
1338 </dict>
1339 ```
1340 #### policies.json
1341 ```
1342 {
1343 "policies": {
1344 "DisableProfileImport": true | false
1345 }
1346 }
1347 ```
1348 ### DisableProfileRefresh
1349 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1350
1351 **Compatibility:** Firefox 60, Firefox ESR 60\
1352 **CCK2 Equivalent:** `disableResetFirefox`\
1353 **Preferences Affected:** `browser.disableResetPrompt`
1354
1355 #### Windows (GPO)
1356 ```
1357 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1358 ```
1359 #### Windows (Intune)
1360 OMA-URI:
1361 ```
1362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1363 ```
1364 Value (string):
1365 ```
1366 <enabled/> or <disabled/>
1367 ```
1368 #### macOS
1369 ```
1370 <dict>
1371 <key>DisableProfileRefresh</key>
1372 <true/> | <false/>
1373 </dict>
1374 ```
1375 #### policies.json
1376 ```
1377 {
1378 "policies": {
1379 "DisableProfileRefresh": true | false
1380 }
1381 }
1382 ```
1383 ### DisableSafeMode
1384 Disable safe mode within the browser.
1385
1386 On Windows, this disables safe mode via the command line as well.
1387
1388 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1389 **CCK2 Equivalent:** `disableSafeMode`\
1390 **Preferences Affected:** N/A
1391
1392 #### Windows (GPO)
1393 ```
1394 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1395 ```
1396 #### Windows (Intune)
1397 OMA-URI:
1398 ```
1399 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1400 ```
1401 Value (string):
1402 ```
1403 <enabled/> or <disabled/>
1404 ```
1405 #### macOS
1406 ```
1407 <dict>
1408 <key>DisableSafeMode</key>
1409 <true/> | <false/>
1410 </dict>
1411 ```
1412 #### policies.json
1413 ```
1414 {
1415 "policies": {
1416 "DisableSafeMode": true | false
1417 }
1418 }
1419 ```
1420 ### DisableSecurityBypass
1421 Prevent the user from bypassing security in certain cases.
1422
1423 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1424
1425 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** N/A\
1429 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1434 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1435 ```
1436 #### Windows (Intune)
1437 OMA-URI:
1438 ```
1439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1440 ```
1441 Value (string):
1442 ```
1443 <enabled/> or <disabled/>
1444 ```
1445 OMA-URI:
1446 ```
1447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1448 ```
1449 Value (string):
1450 ```
1451 <enabled/> or <disabled/>
1452 ```
1453
1454 #### macOS
1455 ```
1456 <dict>
1457 <key>DisableSecurityBypass</key>
1458 <dict>
1459 <key>InvalidCertificate</key>
1460 <true/> | <false/>
1461 <key><SafeBrowsing/key>
1462 <true/> | <false/>
1463 </dict>
1464 </dict>
1465 ```
1466 #### policies.json
1467 ```
1468 {
1469 "policies": {
1470 "DisableSecurityBypass": {
1471 "InvalidCertificate": true false,
1472 "SafeBrowsing": true false
1473 }
1474 }
1475 }
1476 ```
1477 ### DisableSystemAddonUpdate
1478 Prevent system add-ons from being installed or update.
1479
1480 **Compatibility:** Firefox 60, Firefox ESR 60\
1481 **CCK2 Equivalent:** N/A\
1482 **Preferences Affected:** N/A
1483
1484 #### Windows (GPO)
1485 ```
1486 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1487 ```
1488 #### Windows (Intune)
1489 OMA-URI:
1490 ```
1491 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1492 ```
1493 Value (string):
1494 ```
1495 <enabled/> or <disabled/>
1496 ```
1497 #### macOS
1498 ```
1499 <dict>
1500 <key>DisableSystemAddonUpdate</key>
1501 <true/> | <false/>
1502 </dict>
1503 ```
1504 #### policies.json
1505 ```
1506 {
1507 "policies": {
1508 "DisableSystemAddonUpdate": true | false
1509 }
1510 }
1511 ```
1512 ### DisableTelemetry
1513 Prevent the upload of telemetry data.
1514
1515 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1516
1517 **Compatibility:** Firefox 60, Firefox ESR 60\
1518 **CCK2 Equivalent:** `disableTelemetry`\
1519 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1520
1521 #### Windows (GPO)
1522 ```
1523 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1524 ```
1525 #### Windows (Intune)
1526 OMA-URI:
1527 ```
1528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1529 ```
1530 Value (string):
1531 ```
1532 <enabled/> or <disabled/>
1533 ```
1534 #### macOS
1535 ```
1536 <dict>
1537 <key>DisableTelemetry</key>
1538 <true/> | <false/>
1539 </dict>
1540 ```
1541 #### policies.json
1542 ```
1543 {
1544 "policies": {
1545 "DisableTelemetry": true | false
1546 }
1547 }
1548 ```
1549 ### DisplayBookmarksToolbar
1550 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1551
1552 **Compatibility:** Firefox 60, Firefox ESR 60\
1553 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1554 **Preferences Affected:** N/A
1555
1556 #### Windows (GPO)
1557 ```
1558 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1559 ```
1560 #### Windows (Intune)
1561 OMA-URI:
1562 ```
1563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1564 ```
1565 Value (string):
1566 ```
1567 <enabled/> or <disabled/>
1568 ```
1569 #### macOS
1570 ```
1571 <dict>
1572 <key>DisplayBookmarksToolbar</key>
1573 <true/> | <false/>
1574 </dict>
1575 ```
1576 #### policies.json
1577 ```
1578 {
1579 "policies": {
1580 "DisplayBookmarksToolbar": true | false
1581 }
1582 }
1583 ```
1584 ### DisplayMenuBar (Deprecated)
1585 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1586
1587 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1588 **CCK2 Equivalent:** `displayMenuBar`\
1589 **Preferences Affected:** N/A
1590
1591 #### Windows (GPO)
1592 ```
1593 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1594 ```
1595 #### macOS
1596 ```
1597 <dict>
1598 <key>DisplayMenuBar</key>
1599 <true/> | <false/>
1600 </dict>
1601 ```
1602 #### policies.json
1603 ```
1604 {
1605 "policies": {
1606 "DisplayMenuBar": true | false
1607 }
1608 }
1609 ```
1610 ### DisplayMenuBar
1611 Set the state of the menubar.
1612
1613 `always` means the menubar is shown and cannot be hidden.
1614
1615 `never` means the menubar is hidden and cannot be shown.
1616
1617 `default-on` means the menubar is on by default but can be hidden.
1618
1619 `default-off` means the menubar is off by default but can be shown.
1620
1621 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1622 **CCK2 Equivalent:** `displayMenuBar`\
1623 **Preferences Affected:** N/A
1624
1625 #### Windows (GPO)
1626 ```
1627 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1628 ```
1629 #### Windows (Intune)
1630 OMA-URI:
1631 ```
1632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1633 ```
1634 Value (string):
1635 ```
1636 <enabled/>
1637 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1638 ```
1639 #### macOS
1640 ```
1641 <dict>
1642 <key>DisplayMenuBar</key>
1643 <string>always | never | default-on | default-off</string>
1644 </dict>
1645 ```
1646 #### policies.json
1647 ```
1648 {
1649 "policies": {
1650 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1651 }
1652 }
1653 ```
1654 ### DNSOverHTTPS
1655 Configure DNS over HTTPS.
1656
1657 `Enabled` determines whether DNS over HTTPS is enabled
1658
1659 `ProviderURL` is a URL to another provider.
1660
1661 `Locked` prevents the user from changing DNS over HTTPS preferences.
1662
1663 `ExcludedDomains` excludes domains from DNS over HTTPS.
1664
1665 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1666 **CCK2 Equivalent:** N/A\
1667 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1668
1669 #### Windows (GPO)
1670 ```
1671 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1672 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1673 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1674 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1675 ```
1676 #### macOS
1677 ```
1678 <dict>
1679 <key>DNSOverHTTPS</key>
1680 <dict>
1681 <key>Enabled</key>
1682 <true/> | <false/>
1683 <key>ProviderURL</key>
1684 <string>URL_TO_ALTERNATE_PROVIDER</string>
1685 <key>Locked</key>
1686 <true/> | <false/>
1687 <key>ExcludedDomains</key>
1688 <array>
1689 <string>example.com</string>
1690 </array>
1691 </dict>
1692 </dict>
1693 ```
1694 #### policies.json
1695 ```
1696 {
1697 "policies": {
1698 "DNSOverHTTPS": {
1699 "Enabled": true | false,
1700 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1701 "Locked": true | false,
1702 "ExcludedDomains": ["example.com"]
1703 }
1704 }
1705 }
1706 ```
1707 ### DontCheckDefaultBrowser
1708 Don't check if Firefox is the default browser at startup.
1709
1710 **Compatibility:** Firefox 60, Firefox ESR 60\
1711 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1712 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1713
1714 #### Windows (GPO)
1715 ```
1716 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1717 ```
1718 #### macOS
1719 ```
1720 <dict>
1721 <key>DontCheckDefaultBrowser</key>
1722 <true/> | <false/>
1723 </dict>
1724 ```
1725 #### policies.json
1726 ```
1727 {
1728 "policies": {
1729 "DontCheckDefaultBrowser": true | false
1730 }
1731 }
1732 ```
1733 ### DefaultDownloadDirectory
1734 Set the default download directory.
1735
1736 You can use ${home} for the native home directory.
1737
1738 **Compatibility:** Firefox 68, Firefox ESR 68\
1739 **CCK2 Equivalent:** N/A\
1740 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1741
1742 #### Windows (GPO)
1743 ```
1744 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1745 ```
1746 #### macOS
1747 ```
1748 <dict>
1749 <key>DefaultDownloadDirectory</key>
1750 <string>${home}/Downloads</string>
1751 </dict>
1752 ```
1753 #### policies.json (macOS and Linux)
1754 ```
1755 {
1756 "policies": {
1757 "DefaultDownloadDirectory": "${home}/Downloads"
1758 }
1759 ```
1760 #### policies.json (Windows)
1761 ```
1762 {
1763 "policies": {
1764 "DefaultDownloadDirectory": "${home}\\Downloads"
1765 }
1766 ```
1767 ### DownloadDirectory
1768 Set and lock the download directory.
1769
1770 You can use ${home} for the native home directory.
1771
1772 **Compatibility:** Firefox 68, Firefox ESR 68\
1773 **CCK2 Equivalent:** N/A\
1774 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1775
1776 #### Windows (GPO)
1777 ```
1778 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1779 ```
1780 #### macOS
1781 ```
1782 <dict>
1783 <key>DownloadDirectory</key>
1784 <string>${home}/Downloads</string>
1785 </dict>
1786 ```
1787 #### policies.json (macOS and Linux)
1788 ```
1789 {
1790 "policies": {
1791 "DownloadDirectory": "${home}/Downloads"
1792 }
1793 ```
1794 #### policies.json (Windows)
1795 ```
1796 {
1797 "policies": {
1798 "DownloadDirectory": "${home}\\Downloads"
1799 }
1800 ```
1801 ### EnableTrackingProtection
1802 Configure tracking protection.
1803
1804 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1805
1806 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1807
1808 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1809
1810 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1811
1812 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1813
1814 `Exceptions` are origins for which tracking protection is not enabled.
1815
1816 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1817 **CCK2 Equivalent:** N/A\
1818 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1819
1820 #### Windows (GPO)
1821 ```
1822 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1823 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1824 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1825 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1826 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1827 ```
1828 #### Windows (Intune)
1829 OMA-URI:
1830 ```
1831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1832 ```
1833 Value (string):
1834 ```
1835 <enabled/>
1836 <data id="TrackingProtectionLocked" value="true | false"/>
1837 <data id="Cryptomining" value="true | false"/>
1838 <data id="Fingerprinting" value="true | false"/>
1839 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1840 ```
1841 #### macOS
1842 ```
1843 <dict>
1844 <key>EnableTrackingProtection</key>
1845 <dict>
1846 <key>Value</key>
1847 <true/> | <false/>
1848 <key><Locked</key>
1849 <true/> | <false/>
1850 <key><Cryptomining</key>
1851 <true/> | <false/>
1852 <key><Fingerprinting</key>
1853 <true/> | <false/>
1854 <key>Exceptions</key>
1855 <array>
1856 <string>https://example.com</string>
1857 </array>
1858 </dict>
1859 </dict>
1860 ```
1861 #### policies.json
1862 ```
1863 {
1864 "policies": {
1865 "EnableTrackingProtection": {
1866 "Value": [true, false],
1867 "Locked": [true, false],
1868 "Cryptomining": [true, false],
1869 "Fingerprinting": [true, false],
1870 "Exceptions": ["https://example.com"]
1871 }
1872 }
1873 ```
1874 ### EnterprisePoliciesEnabled
1875 Enable policy support on macOS.
1876
1877 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1878 **CCK2 Equivalent:** N/A\
1879 **Preferences Affected:** N/A
1880
1881 #### macOS
1882 ```
1883 <dict>
1884 <key>EnterprisePoliciesEnabled</key>
1885 <true/>
1886 </dict>
1887 ```
1888 ### Extensions
1889 Control the installation, uninstallation and locking of extensions.
1890
1891 `Install` is a list of URLs or native paths for extensions to be installed.
1892
1893 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1894
1895 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1896
1897 **Compatibility:** Firefox 60, Firefox ESR 60\
1898 **CCK2 Equivalent:** `addons`\
1899 **Preferences Affected:** N/A
1900
1901 #### Windows (GPO)
1902 ```
1903 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1904 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1905 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1906 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1907 ```
1908 #### macOS
1909 ```
1910 <dict>
1911 <key>Extensions</key>
1912 <dict>
1913 <key>Install</key>
1914 <array>
1915 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1916 <string>//path/to/xpi</string>
1917 </array>
1918 <key>Uninstall</key>
1919 <array>
1920 <string>bad_addon_id@mozilla.org</string>
1921 </array>
1922 <key>Locked</key>
1923 <array>
1924 <string>addon_id@mozilla.org</string>
1925 </array>
1926 </dict>
1927 </dict>
1928 ```
1929 #### policies.json
1930 ```
1931 {
1932 "policies": {
1933 "Extensions": {
1934 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1935 "Uninstall": ["bad_addon_id@mozilla.org"],
1936 "Locked": ["addon_id@mozilla.org"]
1937 }
1938 }
1939 }
1940 ```
1941 ### ExtensionSettings
1942 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1943
1944 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1945
1946 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1947
1948 The configuration for each extension is another dictionary that can contain the fields documented below.
1949
1950 | Name | Description |
1951 | --- | --- |
1952 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1953 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1954 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1955 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1956 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1957 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1958 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1959 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1960 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1961
1962 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1963 **CCK2 Equivalent:** N/A\
1964 **Preferences Affected:** N/A
1965
1966 #### Windows (GPO)
1967 ```
1968 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1969 {
1970 "*": {
1971 "blocked_install_message": "Custom error message.",
1972 "install_sources": ["https://addons.mozilla.org/"],
1973 "installation_mode": "blocked",
1974 "allowed_types": ["extension"]
1975 },
1976 "uBlock0@raymondhill.net": {
1977 "installation_mode": "force_installed",
1978 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1979 }
1980 }
1981 ```
1982 #### Windows (Intune)
1983 OMA-URI:
1984 ```
1985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
1986 ```
1987 Value (string):
1988 ```
1989 <enabled/>
1990 <data id="ExtensionSettings" value='
1991 "*": {
1992 "blocked_install_message": "Custom error message.",
1993 "install_sources": ["https://addons.mozilla.org/"],
1994 "installation_mode": "blocked",
1995 "allowed_types": ["extension"]
1996 },
1997 "uBlock0@raymondhill.net": {
1998 "installation_mode": "force_installed",
1999 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2000 }'/>
2001 ```
2002 #### macOS
2003 ```
2004 <dict>
2005 <key>ExtensionSettings</key>
2006 <dict>
2007 <key>*</key>
2008 <dict>
2009 <key>blocked_install_message</key>
2010 <string>Custom error message.</string>
2011 <key>install_sources</key>
2012 <array>
2013 <string>https://addons.mozilla.org/</string>
2014 </array>
2015 <key>installation_mode</key>
2016 <string>blocked</string>
2017 <key>allowed_types</key>
2018 <array>
2019 <string>extension</string>
2020 </array>
2021 </dict>
2022 <key>uBlock0@raymondhill.net</key>
2023 <dict>
2024 <key>installation_mode</key>
2025 <string>force_installed</string>
2026 <key>install_url</key>
2027 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2028 </dict>
2029 </dict>
2030 </dict>
2031 ```
2032 #### policies.json
2033 ```
2034 {
2035 "policies": {
2036 "ExtensionSettings": {
2037 "*": {
2038 "blocked_install_message": "Custom error message.",
2039 "install_sources": ["https://addons.mozilla.org/"],
2040 "installation_mode": "blocked",
2041 "allowed_types": ["extension"]
2042 },
2043 "uBlock0@raymondhill.net": {
2044 "installation_mode": "force_installed",
2045 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2046 }
2047 }
2048 }
2049 }
2050 ```
2051 ### ExtensionUpdate
2052 Control extension updates.
2053
2054 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2055 **CCK2 Equivalent:** N/A\
2056 **Preferences Affected:** `extensions.update.enabled`
2057
2058 #### Windows (GPO)
2059 ```
2060 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2061 ```
2062 #### macOS
2063 ```
2064 <dict>
2065 <key>ExtensionUpdate</key>
2066 <true/> | <false/>
2067 </dict>
2068 ```
2069 #### policies.json
2070 ```
2071 {
2072 "policies": {
2073 "ExtensionUpdate": true | false
2074 }
2075 }
2076 ```
2077 ### FlashPlugin
2078 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2079
2080 `Allow` is a list of origins where Flash are allowed.
2081
2082 `Block` is a list of origins where Flash is not allowed.
2083
2084 `Default` determines whether or not Flash is allowed by default.
2085
2086 `Locked` prevents the user from changing Flash preferences.
2087
2088 **Compatibility:** Firefox 60, Firefox ESR 60\
2089 **CCK2 Equivalent:** `permissions.plugin`\
2090 **Preferences Affected:** `plugin.state.flash`
2091
2092 #### Windows (GPO)
2093 ```
2094 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2095 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2096 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2097 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2098 ```
2099 #### Windows (Intune)
2100 OMA-URI:
2101 ```
2102 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2103 ```
2104 Value (string):
2105 ```
2106 <enabled/>
2107 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2108
2109 ```
2110 OMA-URI:
2111 ```
2112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2113 ```
2114 Value (string):
2115 ```
2116 <enabled/> or <disabled/>
2117 ```
2118 OMA-URI:
2119 ```
2120 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2121 ```
2122 Value (string):
2123 ```
2124 <enabled/> or <disabled/>
2125 ```
2126 #### macOS
2127 ```
2128 <dict>
2129 <key>FlashPlugin</key>
2130 <dict>
2131 <key>Allow</key>
2132 <array>
2133 <string>http://example.org</string>
2134 </array>
2135 <key>Block</key>
2136 <array>
2137 <string>http://example.edu</string>
2138 </array>
2139 <key>Default</key>
2140 <true/> | <false/>
2141 <key>Locked</key>
2142 <true/> | <false/>
2143 </dict>
2144 </dict>
2145 ```
2146 #### policies.json
2147 ```
2148 {
2149 "policies": {
2150 "FlashPlugin": {
2151 "Allow": ["http://example.org/"],
2152 "Block": ["http://example.edu/"],
2153 "Default": true | false,
2154 "Locked": true | false
2155 }
2156 }
2157 }
2158 ```
2159 ### FirefoxHome
2160 Customize the Firefox Home page.
2161
2162 **Compatibility:** Firefox 68, Firefox ESR 68\
2163 **CCK2 Equivalent:** N/A\
2164 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2165
2166 #### Windows (GPO)
2167 ```
2168 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2169 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2170 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2171 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2172 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2173 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2174 ```
2175 #### macOS
2176 ```
2177 <dict>
2178 <key>FirefoxHome</key>
2179 <dict>
2180 <key>Search</key>
2181 <true/> | <false/>
2182 <key>TopSites</key>
2183 <true/> | <false/>
2184 <key>Highlights</key>
2185 <true/> | <false/>
2186 <key>Pocket</key>
2187 <true/> | <false/>
2188 <key>Snippets</key>
2189 <true/> | <false/>
2190 <key>Locked</key>
2191 <true/> | <false/>
2192 </dict>
2193 </dict>
2194 ```
2195 #### policies.json
2196 ```
2197 {
2198 "policies": {
2199 "FirefoxHome": {
2200 "Search": true | false,
2201 "TopSites": true | false,
2202 "Highlights": true | false,
2203 "Pocket": true | false,
2204 "Snippets": true | false,
2205 "Locked": true | false
2206 }
2207 }
2208 }
2209 ```
2210 ### HardwareAcceleration
2211 Control hardware acceleration.
2212
2213 **Compatibility:** Firefox 60, Firefox ESR 60\
2214 **CCK2 Equivalent:** N/A\
2215 **Preferences Affected:** `layers.acceleration.disabled`
2216
2217 #### Windows (GPO)
2218 ```
2219 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2220 ```
2221 #### macOS
2222 ```
2223 <dict>
2224 <key>HardwareAcceleration</key>
2225 <true/> | <false/>
2226 </dict>
2227 ```
2228 #### policies.json
2229 ```
2230 {
2231 "policies": {
2232 "HardwareAcceleration": true | false
2233 }
2234 }
2235 ```
2236 ### Homepage
2237 Configure the default homepage and how Firefox starts.
2238
2239 `URL` is the default homepage.
2240
2241 `Locked` prevents the user from changing homepage preferences.
2242
2243 `Additional` allows for more than one homepage.
2244
2245 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2246
2247 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2248 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2249 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2250
2251 #### Windows (GPO)
2252 ```
2253 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2254 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2255 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2256 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2257 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2258 ```
2259 #### Windows (Intune)
2260 OMA-URI:
2261 ```
2262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2263 ```
2264 Value (string):
2265 ```
2266 <enabled/>
2267
2268 <data id="HomepageURL" value="https://example.com"/>
2269 <data id="HomepageLocked" value="true | false"/>
2270 ```
2271 OMA-URI:
2272 ```
2273 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2274 ```
2275 Value (string):
2276 ```
2277 <enabled/>
2278
2279 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2280 ```
2281 OMA-URI:
2282 ```
2283 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2284 ```
2285 Value (string):
2286 ```
2287 <enabled/>
2288
2289 <data id="StartPage" value="none | homepage | previous-session"/>
2290 ```
2291 #### macOS
2292 ```
2293 <dict>
2294 <key>Homepage</key>
2295 <dict>
2296 <key>URL</key>
2297 <string>http://example.com</string>
2298 <key>Locked</key>
2299 <true/> | <false/>
2300 <key>Additional</key>
2301 <array>
2302 <string>http://example.org</string>
2303 <string>http://example.edu</string>
2304 </array>
2305 <key>StartPage</key>
2306 <string>none | homepage | previous-session</string>
2307 </dict>
2308 </dict>
2309 ```
2310 #### policies.json
2311 ```
2312 {
2313 "policies": {
2314 "Homepage": {
2315 "URL": "http://example.com/",
2316 "Locked": true | false,
2317 "Additional": ["http://example.org/",
2318 "http://example.edu/"],
2319 "StartPage": "none" | "homepage" | "previous-session"
2320 }
2321 }
2322 }
2323 ```
2324 ### InstallAddonsPermission
2325 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2326
2327 `Allow` is a list of origins where extension installs are allowed.
2328
2329 `Default` determines whether or not extension installs are allowed by default.
2330
2331 **Compatibility:** Firefox 60, Firefox ESR 60\
2332 **CCK2 Equivalent:** `permissions.install`\
2333 **Preferences Affected:** `xpinstall.enabled`
2334
2335 #### Windows (GPO)
2336 ```
2337 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2338 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2339 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2340 ```
2341 #### Windows (Intune)
2342 OMA-URI:
2343 ```
2344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2345 ```
2346 Value (string):
2347 ```
2348 <enabled/>
2349 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2350 ```
2351 OMA-URI:
2352 ```
2353 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2354 ```
2355 Value (string):
2356 ```
2357 <enabled/>
2358 ```
2359 #### macOS
2360 ```
2361 <dict>
2362 <key>InstallAddonsPermission</key>
2363 <dict>
2364 <key>Allow</key>
2365 <array>
2366 <string>http://example.org</string>
2367 <string>http://example.edu</string>
2368 </array>
2369 <key>Default</key>
2370 <true/> | <false/>
2371 </dict>
2372 </dict>
2373 ```
2374 #### policies.json
2375 ```
2376 {
2377 "policies": {
2378 "InstallAddonsPermission": {
2379 "Allow": ["http://example.org/",
2380 "http://example.edu/"],
2381 "Default": true | false
2382 }
2383 }
2384 }
2385 ```
2386 ### LegacyProfiles
2387 Disable the feature enforcing a separate profile for each installation.
2388
2389 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2390
2391 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2392
2393 This policy only work on Windows via GPO (not policies.json).
2394
2395 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2396 **CCK2 Equivalent:** N/A\
2397 **Preferences Affected:** N/A
2398
2399 #### Windows (GPO)
2400 ```
2401 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2402 ```
2403 ### LocalFileLinks
2404 Enable linking to local files by origin.
2405
2406 **Compatibility:** Firefox 68, Firefox ESR 68\
2407 **CCK2 Equivalent:** N/A\
2408 **Preferences Affected:** `capability.policy.localfilelinks.*`
2409
2410 #### Windows (GPO)
2411 ```
2412 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2413 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2414 ```
2415 #### macOS
2416 ```
2417 <dict>
2418 <key>LocalFileLinks</key>
2419 <array>
2420 <string>http://example.org</string>
2421 <string>http://example.edu</string>
2422 </array>
2423 </dict>
2424 ```
2425 #### policies.json
2426 ```
2427 {
2428 "policies": {
2429 "LocalFileLinks": ["http://example.org/",
2430 "http://example.edu/"]
2431 }
2432 }
2433 ```
2434 ### NoDefaultBookmarks
2435 Disable the creation of default bookmarks.
2436
2437 This policy is only effective if the user profile has not been created yet.
2438
2439 **Compatibility:** Firefox 60, Firefox ESR 60\
2440 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2441 **Preferences Affected:** N/A
2442
2443 #### Windows (GPO)
2444 ```
2445 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2446 ```
2447 #### macOS
2448 ```
2449 <dict>
2450 <key>NoDefaultBookmarks</key>
2451 <true/> | <false/>
2452 </dict>
2453 ```
2454 #### policies.json
2455 ```
2456 {
2457 "policies": {
2458 "NoDefaultBookmarks": true | false
2459 }
2460 }
2461 ```
2462 ### NetworkPrediction
2463 Enable or disable network prediction (DNS prefetching).
2464
2465 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2466 **CCK2 Equivalent:** N/A\
2467 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2468
2469 #### Windows (GPO)
2470 ```
2471 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2472 ```
2473 #### macOS
2474 ```
2475 <dict>
2476 <key>NetworkPrediction</key>
2477 <true/> | <false/>
2478 </dict>
2479 ```
2480 #### policies.json
2481 ```
2482 {
2483 "policies": {
2484 "NetworkPrediction": true | false
2485 }
2486 ```
2487 ### NewTabPage
2488 Enable or disable the New Tab page.
2489
2490 **Compatibility:** Firefox 68, Firefox ESR 68\
2491 **CCK2 Equivalent:** N/A\
2492 **Preferences Affected:** `browser.newtabpage.enabled`
2493
2494 #### Windows (GPO)
2495 ```
2496 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2497 ```
2498 #### Windows (Intune)
2499 OMA-URI:
2500 ```
2501 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2502 ```
2503 Value (string):
2504 ```
2505 <enabled/> or <disabled/>
2506 ```
2507 #### macOS
2508 ```
2509 <dict>
2510 <key>NewTabPage</key>
2511 <true/> | <false/>
2512 </dict>
2513 ```
2514 #### policies.json
2515 ```
2516 {
2517 "policies": {
2518 "NewTabPage": true | false
2519 }
2520 ```
2521 ### OfferToSaveLogins
2522 Control whether or not Firefox offers to save passwords.
2523
2524 **Compatibility:** Firefox 60, Firefox ESR 60\
2525 **CCK2 Equivalent:** `dontRememberPasswords`\
2526 **Preferences Affected:** `signon.rememberSignons`
2527
2528 #### Windows (GPO)
2529 ```
2530 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2531 ```
2532 #### macOS
2533 ```
2534 <dict>
2535 <key>OfferToSaveLogins</key>
2536 <true/> | <false/>
2537 </dict>
2538 ```
2539 #### policies.json
2540 ```
2541 {
2542 "policies": {
2543 "OfferToSaveLogins": true | false
2544 }
2545 }
2546 ```
2547 ### OfferToSaveLoginsDefault
2548 Sets the default value of signon.rememberSignons without locking it.
2549
2550 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2551 **CCK2 Equivalent:** `dontRememberPasswords`\
2552 **Preferences Affected:** `signon.rememberSignons`
2553
2554 #### Windows (GPO)
2555 ```
2556 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2557 ```
2558 #### macOS
2559 ```
2560 <dict>
2561 <key>OfferToSaveLoginsDefault</key>
2562 <true/> | <false/>
2563 </dict>
2564 ```
2565 #### policies.json
2566 ```
2567 {
2568 "policies": {
2569 "OfferToSaveLoginsDefault": true | false
2570 }
2571 }
2572 ```
2573 ### OverrideFirstRunPage
2574 Override the first run page. If the value is blank, no first run page is displayed.
2575
2576 **Compatibility:** Firefox 60, Firefox ESR 60\
2577 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2578 **Preferences Affected:** `startup.homepage_welcome_url`
2579
2580 #### Windows (GPO)
2581 ```
2582 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2583 ```
2584 #### Windows (Intune)
2585 OMA-URI:
2586 ```
2587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2588 ```
2589 Value (string):
2590 ```
2591 <enabled/>
2592 <data id="OverridePage" value="https://example.com"/>
2593 ```
2594 #### macOS
2595 ```
2596 <dict>
2597 <key>OverrideFirstRunPage</key>
2598 <string>http://example.org</string>
2599 </dict>
2600 ```
2601 #### policies.json
2602 ```
2603 {
2604 "policies": {
2605 "OverrideFirstRunPage": "http://example.org"
2606 }
2607 ```
2608 ### OverridePostUpdatePage
2609 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2610
2611 **Compatibility:** Firefox 60, Firefox ESR 60\
2612 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2613 **Preferences Affected:** `startup.homepage_override_url`
2614
2615 #### Windows (GPO)
2616 ```
2617 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2618 ```
2619 #### macOS
2620 ```
2621 <dict>
2622 <key>OverridePostUpdatePage</key>
2623 <string>http://example.org</string>
2624 </dict>
2625 ```
2626 #### policies.json
2627 ```
2628 {
2629 "policies": {
2630 "OverridePostUpdatePage": "http://example.org"
2631 }
2632 ```
2633 ### PasswordManagerEnabled
2634 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2635
2636 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2637 **CCK2 Equivalent:** N/A\
2638 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2639
2640 #### Windows (GPO)
2641 ```
2642 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2643 ```
2644 #### Windows (Intune)
2645 OMA-URI:
2646 ```
2647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2648 ```
2649 Value (string):
2650 ```
2651 <enabled/> or <disabled/>
2652 ```
2653 #### macOS
2654 ```
2655 <dict>
2656 <key>PasswordManagerEnabled</key>
2657 <true/> | <false/>
2658 </dict>
2659 ```
2660 #### policies.json
2661 ```
2662 {
2663 "policies": {
2664 "PasswordManagerEnabled": true | false
2665 }
2666 }
2667 ```
2668 ### Permissions
2669 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2670
2671 `Allow` is a list of origins where the feature is allowed.
2672
2673 `Block` is a list of origins where the feature is not allowed.
2674
2675 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2676
2677 `Locked` prevents the user from changing preferences for the feature.
2678
2679 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2680 **CCK2 Equivalent:** N/A\
2681 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2682
2683 #### Windows (GPO)
2684 ```
2685 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2686 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2687 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2688 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2689 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2690 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2691 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2692 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2693 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2694 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2695 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2696 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2697 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2698 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2699 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2700 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2701 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2702 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2703 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2704 ```
2705 #### Windows (Intune)
2706 OMA-URI:
2707 ```
2708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
2709 ```
2710 Value (string):
2711 ```
2712 <enabled/> or <disabled/>
2713 ```
2714 OMA-URI:
2715 ```
2716 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
2717 ```
2718 Value (string):
2719 ```
2720 <enabled/> or <disabled/>
2721 ```
2722 OMA-URI:
2723 ```
2724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
2725 ```
2726 Value (string):
2727 ```
2728 <enabled/>
2729 <data id="Permissions" value="1&#xF000;https://example.org"/>
2730 ```
2731 OMA-URI:
2732 ```
2733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
2734 ```
2735 Value (string):
2736 ```
2737 <enabled/> or <disabled/>
2738 ```
2739 OMA-URI:
2740 ```
2741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
2742 ```
2743 Value (string):
2744 ```
2745 <enabled/> or <disabled/>
2746 ```
2747 OMA-URI:
2748 ```
2749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
2750 ```
2751 Value (string):
2752 ```
2753 <enabled/>
2754 <data id="Permissions" value="1&#xF000;https://example.org"/>
2755 ```
2756 #### macOS
2757 ```
2758 <dict>
2759 <key>Permissions</key>
2760 <dict>
2761 <key>Camera</key>
2762 <dict>
2763 <key>Allow</key>
2764 <array>
2765 <string>https://example.org</string>
2766 <string>https://example.org:1234</string>
2767 </array>
2768 <key>Block</key>
2769 <array>
2770 <string>https://example.edu</string>
2771 </array>
2772 <key>BlockNewRequests</key>
2773 <true/>
2774 <key>Locked</key>
2775 <true/>
2776 </dict>
2777 <key>Microphone</key>
2778 <dict>
2779 <key>Allow</key>
2780 <array>
2781 <string>https://example.org</string>
2782 </array>
2783 <key>Block</key>
2784 <array>
2785 <string>https://example.edu</string>
2786 </array>
2787 <key>BlockNewRequests</key>
2788 <true/>
2789 <key>Locked</key>
2790 <true/>
2791 </dict>
2792 <key>Location</key>
2793 <dict>
2794 <key>Allow</key>
2795 <array>
2796 <string>https://example.org</string>
2797 </array>
2798 <key>Block</key>
2799 <array>
2800 <string>https://example.edu</string>
2801 </array>
2802 <key>BlockNewRequests</key>
2803 <true/>
2804 <key>Locked</key>
2805 <true/>
2806 </dict>
2807 <key>Notifications</key>
2808 <dict>
2809 <key>Allow</key>
2810 <array>
2811 <string>https://example.org</string>
2812 </array>
2813 <key>Block</key>
2814 <array>
2815 <string>https://example.edu</string>
2816 </array>
2817 <key>BlockNewRequests</key>
2818 <true/>
2819 <key>Locked</key>
2820 <true/>
2821 </dict>
2822 <key>Autoplay</key>
2823 <dict>
2824 <key>Allow</key>
2825 <array>
2826 <string>https://example.org</string>
2827 </array>
2828 <key>Block</key>
2829 <array>
2830 <string>https://example.edu</string>
2831 </array>
2832 </dict>
2833 </dict>
2834 </dict>
2835 ```
2836 #### policies.json
2837 ```
2838 {
2839 "policies": {
2840 "Permissions": {
2841 "Camera": {
2842 "Allow": ["https://example.org","https://example.org:1234"],
2843 "Block": ["https://example.edu"],
2844 "BlockNewRequests": true | false,
2845 "Locked": true | false
2846 },
2847 "Microphone": {
2848 "Allow": ["https://example.org"],
2849 "Block": ["https://example.edu"],
2850 "BlockNewRequests": true | false,
2851 "Locked": true | false
2852 },
2853 "Location": {
2854 "Allow": ["https://example.org"],
2855 "Block": ["https://example.edu"],
2856 "BlockNewRequests": true | false,
2857 "Locked": true | false
2858 },
2859 "Notifications": {
2860 "Allow": ["https://example.org"],
2861 "Block": ["https://example.edu"],
2862 "BlockNewRequests": true | false,
2863 "Locked": true | false
2864 },
2865 "Autoplay": {
2866 "Allow": ["https://example.org"],
2867 "Block": ["https://example.edu"]
2868 }
2869 }
2870 }
2871 }
2872 ```
2873 ### PopupBlocking
2874 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2875
2876 `Allow` is a list of origins where popup-windows are allowed.
2877
2878 `Default` determines whether or not pop-up windows are allowed by default.
2879
2880 `Locked` prevents the user from changing pop-up preferences.
2881
2882 **Compatibility:** Firefox 60, Firefox ESR 60\
2883 **CCK2 Equivalent:** `permissions.popup`\
2884 **Preferences Affected:** `dom.disable_open_during_load`
2885
2886 #### Windows (GPO)
2887 ```
2888 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2889 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2890 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2891 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2892 ```
2893 #### macOS
2894 ```
2895 <dict>
2896 <key>PopupBlocking</key>
2897 <dict>
2898 <key>Allow</key>
2899 <array>
2900 <string>http://example.org</string>
2901 <string>http://example.edu</string>
2902 </array>
2903 <key>Default</key>
2904 <true/> | <false/>
2905 <key>Locked</key>
2906 <true/> | <false/>
2907 </dict>
2908 </dict>
2909 ```
2910 #### policies.json
2911 ```
2912 {
2913 "policies": {
2914 "PopupBlocking": {
2915 "Allow": ["http://example.org/",
2916 "http://example.edu/"],
2917 "Default": true | false,
2918 "Locked": true | false
2919 }
2920 }
2921 }
2922 ```
2923 ### Preferences
2924 Set and lock certain preferences.
2925
2926 **Compatibility:** See below\
2927 **CCK2 Equivalent:** `preferences`\
2928 **Preferences Affected:** See below
2929
2930 | Preference | Type | Compatibility | Default
2931 | --- | --- | --- | ---
2932 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2933 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2934 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2935 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2936 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2937 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2938 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2939 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2940 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2941 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2942 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2943 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2944 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2945 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2946 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2947 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2948 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2949 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2950 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2951 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2952 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2953 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2954 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2955 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2956 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2957 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2958 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2959 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2960 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2961 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2962 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2963 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2964 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2965 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2966 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2967 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2968 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2969 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2970 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2971 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2972 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2973 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2974 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2975 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2976 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2977 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2978 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2979 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2980 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2981 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2982 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2983 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2984 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2985 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2986 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2987 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2988 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2989 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2990 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2991 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2992 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2993 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2994 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2995 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2996 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2997 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2998 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2999 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3000 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3001 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3002 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3003 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3004 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3005 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3006 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3007 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3008 disabled
3009 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3010 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3011 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3012 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3013 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3014 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3015 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3016 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3017 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3018 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3019 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3020 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3021 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
3022 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3023 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3024 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3025 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3026 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3027 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3028 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3029 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3030 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3031 #### Windows (GPO)
3032 ```
3033 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3034 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3035 ```
3036 #### Windows (Intune)
3037 OMA-URI: (periods are replaced by underscores)
3038 ```
3039 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3040 ```
3041 Value (string):
3042 ```
3043 <enabled/> or <disabled/>
3044 ```
3045 #### macOS
3046 ```
3047 <dict>
3048 <key>Preferences</key>
3049 <dict>
3050 <key>boolean_preference_name</key>
3051 <true/> | <false/>
3052 <key>string_preference_name</key>
3053 <string>string_value</string>
3054 </dict>
3055 </dict>
3056 ```
3057 #### policies.json
3058 ```
3059 {
3060 "policies": {
3061 "Preferences": {
3062 "boolean_preference_name": true | false,
3063 "string_preference_name": "string_value"
3064 }
3065 }
3066 }
3067 ```
3068 ### PromptForDownloadLocation
3069 Ask where to save each file before downloading.
3070
3071 **Compatibility:** Firefox 68, Firefox ESR 68\
3072 **CCK2 Equivalent:** N/A\
3073 **Preferences Affected:** `browser.download.useDownloadDir`
3074
3075 #### Windows (GPO)
3076 ```
3077 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3078 ```
3079 #### macOS
3080 ```
3081 <dict>
3082 <key>PromptForDownloadLocation</key>
3083 <true/> | <false/>
3084 </dict>
3085 ```
3086 #### policies.json
3087 ```
3088 {
3089 "policies": {
3090 "PromptForDownloadLocation": true | false
3091 }
3092 }
3093 ```
3094 ### Proxy
3095 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3096 To specify ports, append them to the hostnames with a colon (:).
3097
3098 `Mode` is the proxy method being used.
3099
3100 `Locked` is whether or not proxy settings can be changed.
3101
3102 `HTTPProxy` is the HTTP proxy server.
3103
3104 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3105
3106 `SSLProxy` is the SSL proxy server.
3107
3108 `FTPProxy` is the FTP proxy server.
3109
3110 `SOCKSProxy` is the SOCKS proxy server
3111
3112 `SOCKSVersion` is the SOCKS version (4 or 5)
3113
3114 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3115
3116 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3117
3118 `AutoLogin` means do not prompt for authentication if password is saved.
3119
3120 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3121
3122 **Compatibility:** Firefox 60, Firefox ESR 60\
3123 **CCK2 Equivalent:** `networkProxy*`\
3124 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3125
3126 #### Windows (GPO)
3127 ```
3128 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3129 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3130 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3131 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3132 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3133 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3134 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3135 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3136 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3137 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3138 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3139 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3140 ```
3141 #### Windows (Intune)
3142 OMA-URI:
3143 ```
3144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3145 ```
3146 Value (string):
3147 ```
3148 <enabled/>
3149 <data id="ProxyLocked" value="true | false"/>
3150 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3151 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3152 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3153 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3154 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3155 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3156 <data id="SOCKSVersion" value="4 | 5"/>
3157 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3158 <data id="Passthrough" value="<local>"/>
3159 <data id="AutoLogin" value="true | false"/>
3160 <data id="UseProxyForDNS" value="true | false"/>
3161 ```
3162 #### macOS
3163 ```
3164 <dict>
3165 <key>Proxy</key>
3166 <dict>
3167 <key>Mode</key>
3168 <string>none | system | manual | autoDetect | autoConfig</string>
3169 <key>Locked</key>
3170 <true> | </false>
3171 <key>HTTPProxy</key>
3172 <string>https://httpproxy.example.com</string>
3173 <key>UseHTTPProxyForAllProtocols</key>
3174 <true> | </false>
3175 <key>SSLProxy</key>
3176 <string>https://sslproxy.example.com</string>
3177 <key>FTPProxy</key>
3178 <string>https://ftpproxy.example.com</string>
3179 <key>SOCKSProxy</key>
3180 <string>https://socksproxy.example.com</string>
3181 <key>SOCKSVersion</key>
3182 <string>4 | 5</string>
3183 <key>Passthrough</key>
3184 <string>&lt;local>&gt;</string>
3185 <key>AutoConfigURL</key>
3186 <string>URL_TO_AUTOCONFIG</string>
3187 <key>AutoLogin</key>
3188 <true> | </false>
3189 <key>UseProxyForDNS</key>
3190 <true> | </false>
3191 </dict>
3192 </dict>
3193 ```
3194 #### policies.json
3195 ```
3196 {
3197 "policies": {
3198 "Proxy": {
3199 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3200 "Locked": [true, false],
3201 "HTTPProxy": "hostname",
3202 "UseHTTPProxyForAllProtocols": [true, false],
3203 "SSLProxy": "hostname",
3204 "FTPProxy": "hostname",
3205 "SOCKSProxy": "hostname",
3206 "SOCKSVersion": 4 | 5
3207 "Passthrough": "<local>",
3208 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3209 "AutoLogin": [true, false],
3210 "UseProxyForDNS": [true, false]
3211 }
3212 }
3213 }
3214 ```
3215 ### RequestedLocales
3216 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3217
3218 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3219
3220 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3221 **CCK2 Equivalent:** N/A\
3222 **Preferences Affected:** N/A
3223 #### Windows (GPO)
3224 ```
3225 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3226 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3227
3228 or
3229
3230 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3231 ```
3232 #### macOS
3233 ```
3234 <dict>
3235 <key>RequestedLocales</key>
3236 <array>
3237 <string>de</string>
3238 <string>en-US</string>
3239 </array>
3240 </dict>
3241
3242 or
3243
3244 <dict>
3245 <key>RequestedLocales</key>
3246 <string>de,en-US</string>
3247 </dict>
3248
3249 ```
3250 #### policies.json
3251 ```
3252 {
3253 "policies": {
3254 "RequestedLocales": ["de", "en-US"]
3255 }
3256 }
3257
3258 or
3259
3260 {
3261 "policies": {
3262 "RequestedLocales": "de,en-US"
3263 }
3264 }
3265 ```
3266 <a name="SanitizeOnShutdown"></a>
3267
3268 ### SanitizeOnShutdown (Selective)
3269 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3270
3271 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3272
3273 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3274 **CCK2 Equivalent:** N/A\
3275 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3276 #### Windows (GPO)
3277 ```
3278 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3279 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3280 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3281 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3282 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3283 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3284 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3285 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3286 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3287 ```
3288 #### Windows (Intune)
3289 OMA-URI:
3290 ```
3291 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3292 ```
3293 Value (string):
3294 ```
3295 <enabled/> or <disabled/>
3296 ```
3297 #### macOS
3298 ```
3299 <dict>
3300 <key>SanitizeOnShutdown</key>
3301 <dict>
3302 <key>Cache</key>
3303 <true/> | <false/>
3304 <key>Cookies</key>
3305 <true/> | <false/>
3306 <key>Downloads</key>
3307 <true/> | <false/>
3308 <key>FormData</key>
3309 <true/> | <false/>
3310 <key>History</key>
3311 <true/> | <false/>
3312 <key>Sessions</key>
3313 <true/> | <false/>
3314 <key>SiteSettings</key>
3315 <true/> | <false/>
3316 <key>OfflineApps</key>
3317 <true/> | <false/>
3318 <key>Locked</key>
3319 <true/> | <false/>
3320 </dict>
3321 </dict>
3322 ```
3323 #### policies.json
3324 ```
3325 {
3326 "policies": {
3327 "SanitizeOnShutdown": {
3328 "Cache": true | false,
3329 "Cookies": true | false,
3330 "Downloads": true | false,
3331 "FormData": true | false,
3332 "History": true | false,
3333 "Sessions": true | false,
3334 "SiteSettings": true | false,
3335 "OfflineApps": true | false,
3336 "Locked": true | false
3337 }
3338 }
3339 }
3340 ```
3341 ### SanitizeOnShutdown (All)
3342 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3343
3344 **Compatibility:** Firefox 60, Firefox ESR 60\
3345 **CCK2 Equivalent:** N/A\
3346 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3347 #### Windows (GPO)
3348 ```
3349 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3350 ```
3351 #### Windows (Intune)
3352 OMA-URI:
3353 ```
3354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3355 ```
3356 Value (string):
3357 ```
3358 <enabled/> or <disabled/>
3359 ```
3360 #### macOS
3361 ```
3362 <dict>
3363 <key>SanitizeOnShutdown</key>
3364 <true/> | <false/>
3365 </dict>
3366 ```
3367 #### policies.json
3368 ```
3369 {
3370 "policies": {
3371 "SanitizeOnShutdown": true | false
3372 }
3373 }
3374 ```
3375 ### SearchBar
3376 Set whether or not search bar is displayed.
3377
3378 **Compatibility:** Firefox 60, Firefox ESR 60\
3379 **CCK2 Equivalent:** `showSearchBar`\
3380 **Preferences Affected:** N/A
3381
3382 #### Windows (GPO)
3383 ```
3384 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3385 ```
3386 #### macOS
3387 ```
3388 <dict>
3389 <key>SearchBar</key>
3390 <string>unified | separate</string>
3391 </dict>
3392 ```
3393
3394 #### policies.json
3395 ```
3396 {
3397 "policies": {
3398 "SearchBar": "unified" | "separate"
3399 }
3400 }
3401 ```
3402 <a name="SearchEngines"></a>
3403
3404 ### SearchEngines (This policy is only available on the ESR.)
3405
3406 ### SearchEngines | Default
3407
3408 Set the default search engine. This policy is only available on the ESR.
3409
3410 **Compatibility:** Firefox ESR 60\
3411 **CCK2 Equivalent:** `defaultSearchEngine`\
3412 **Preferences Affected:** N/A
3413
3414 #### Windows (GPO)
3415 ```
3416 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3417 ```
3418 #### macOS
3419 ```
3420 <dict>
3421 <key>SearchEngines</key>
3422 <dict>
3423 <key>Default</key>
3424 <string>NAME_OF_SEARCH_ENGINE</string>
3425 </dict>
3426 </dict>
3427 ```
3428 #### policies.json
3429 ```
3430 {
3431 "policies": {
3432 "SearchEngines": {
3433 "Default": "NAME_OF_SEARCH_ENGINE"
3434 }
3435 }
3436 }
3437 ```
3438 ### SearchEngines | PreventInstalls
3439
3440 Prevent installing search engines from webpages.
3441
3442 **Compatibility:** Firefox ESR 60\
3443 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3444 **Preferences Affected:** N/A
3445
3446 #### Windows (GPO)
3447 ```
3448 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3449 ```
3450 #### Windows (Intune)
3451 OMA-URI:
3452 ```
3453 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3454 ```
3455 Value (string):
3456 ```
3457 <enabled/> or <disabled/>
3458 ```
3459 #### macOS
3460 ```
3461 <dict>
3462 <key>SearchEngines</key>
3463 <dict>
3464 <key>PreventInstalls</key>
3465 <true/> | <false/>
3466 </dict>
3467 </dict>
3468 ```
3469 #### policies.json
3470 ```
3471 {
3472 "policies": {
3473 "SearchEngines": {
3474 "PreventInstalls": true | false
3475 }
3476 }
3477 }
3478 ```
3479 ### SearchEngines | Remove
3480
3481 Hide built-in search engines. This policy is only available on the ESR.
3482
3483 **Compatibility:** Firefox ESR 60.2\
3484 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3485 **Preferences Affected:** N/A
3486
3487 #### Windows (GPO)
3488 ```
3489 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3490 ```
3491 #### macOS
3492 ```
3493 <dict>
3494 <key>SearchEngines</key>
3495 <dict>
3496 <key>Remove</key>
3497 <array>
3498 <string>NAME_OF_SEARCH_ENGINE</string>
3499 </array>
3500 </dict>
3501 </dict>
3502 ```
3503 #### policies.json
3504 ```
3505 {
3506 "policies": {
3507 "SearchEngines": {
3508 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3509 }
3510 }
3511 }
3512 ```
3513 ### SearchEngines | Add
3514
3515 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3516
3517 `Name` is the name of the search engine.
3518
3519 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3520
3521 `Method` is either GET or POST
3522
3523 `IconURL` is a URL for the icon to use.
3524
3525 `Alias` is a keyword to use for the engine.
3526
3527 `Description` is a description of the search engine.
3528
3529 `PostData` is the POST data as name value pairs separated by &.
3530
3531 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3532
3533 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3534 **CCK2 Equivalent:** `searchplugins`\
3535 **Preferences Affected:** N/A
3536
3537 #### Windows (GPO)
3538 ```
3539 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3540 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3541 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3542 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3543 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3544 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3545 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3546 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3547 ```
3548
3549 #### macOS
3550 ```
3551 <dict>
3552 <key>SearchEngines</key>
3553 <dict>
3554 <key>Add</key>
3555 <array>
3556 <dict>
3557 <key>Name</key>
3558 <string>Example1</string>
3559 <key>URLTemplate</key>
3560 <string>https://www.example.org/q={searchTerms}</string>
3561 <key>Method</key>
3562 <string>GET | POST </string>
3563 <key>IconURL</key>
3564 <string>https://www.example.org/favicon.ico</string>
3565 <key>Alias</key>
3566 <string>example</string>
3567 <key>Description</key>
3568 <string>Example Description</string>
3569 <key>SuggestURLTemplate</key>
3570 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3571 <key>PostData</key>
3572 <string>name=value&q={searchTerms}</string>
3573 </dict>
3574 <array>
3575 </dict>
3576 </dict>
3577 ```
3578 #### policies.json
3579 ```
3580 {
3581 "policies": {
3582 "SearchEngines": {
3583 "Add": [
3584 {
3585 "Name": "Example1",
3586 "URLTemplate": "https://www.example.org/q={searchTerms}",
3587 "Method": "GET" | "POST",
3588 "IconURL": "https://www.example.org/favicon.ico",
3589 "Alias": "example",
3590 "Description": "Description",
3591 "PostData": "name=value&q={searchTerms}",
3592 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3593 }
3594 ]
3595 }
3596 }
3597 }
3598 ```
3599 ### SearchSuggestEnabled
3600
3601 Enable search suggestions.
3602
3603 **Compatibility:** Firefox 68, Firefox ESR 68\
3604 **CCK2 Equivalent:** N/A\
3605 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3606
3607 #### Windows (GPO)
3608 ```
3609 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3610 ```
3611 #### macOS
3612 ```
3613 <dict>
3614 <key>SearchSuggestEnabled</key>
3615 <true/> | <false/>
3616 </dict>
3617 ```
3618 #### policies.json
3619 ```
3620 {
3621 "policies": {
3622 "SearchSuggestEnabled": true | false
3623 }
3624 }
3625 ```
3626 ### SecurityDevices
3627
3628 Install PKCS #11 modules.
3629
3630 **Compatibility:** Firefox 64, Firefox ESR 60.4\
3631 **CCK2 Equivalent:** `certs.devices`\
3632 **Preferences Affected:** N/A
3633
3634 #### Windows (GPO)
3635 ```
3636 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
3637 ```
3638 #### macOS
3639 ```
3640 <dict>
3641 <key>SecurityDevices</key>
3642 <dict>
3643 <key>NAME_OF_DEVICE</key>
3644 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
3645 </dict>
3646 </dict>
3647 ```
3648
3649 #### policies.json
3650 ```
3651 {
3652 "policies": {
3653 "SecurityDevices": {
3654 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
3655 }
3656 }
3657 }
3658 ```
3659 ### SSLVersionMax
3660
3661 Set and lock the maximum version of TLS.
3662
3663 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3664 **CCK2 Equivalent:** N/A\
3665 **Preferences Affected:** `security.tls.version.max`
3666
3667 #### Windows (GPO)
3668 ```
3669 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3670 ```
3671 #### macOS
3672 ```
3673 <dict>
3674 <key>SSLVersionMax</key>
3675 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3676 </dict>
3677 ```
3678
3679 #### policies.json
3680 ```
3681 {
3682 "policies": {
3683 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3684 }
3685 }
3686 ```
3687 ### SSLVersionMin
3688
3689 Set and lock the minimum version of TLS.
3690
3691 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3692 **CCK2 Equivalent:** N/A\
3693 **Preferences Affected:** `security.tls.version.min`
3694
3695 #### Windows (GPO)
3696 ```
3697 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3698 ```
3699 #### Windows (Intune)
3700 OMA-URI:
3701 ```
3702 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
3703 ```
3704 Value (string):
3705 ```
3706 <enabled/>
3707 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
3708 ```
3709 #### macOS
3710 ```
3711 <dict>
3712 <key>SSLVersionMin</key>
3713 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3714 </dict>
3715 ```
3716
3717 #### policies.json
3718 ```
3719 {
3720 "policies": {
3721 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3722 }
3723 }
3724 ```
3725 ### SupportMenu
3726 Add a menuitem to the help menu for specifying support information.
3727
3728 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3729 **CCK2 Equivalent:** helpMenu\
3730 **Preferences Affected:** N/A
3731
3732 #### Windows (GPO)
3733 ```
3734 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3735 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3736 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3737 ```
3738 #### macOS
3739 ```
3740 <dict>
3741 <key>SupportMenu</key>
3742 <dict>
3743 <key>Title</key>
3744 <string>SupportMenu</string>
3745 <key>URL</key>
3746 <string>http://example.com/support</string>
3747 <key>AccessKey</key>
3748 <string>S</string>
3749 </dict>
3750 </dict>
3751 ```
3752 #### policies.json
3753 ```
3754 {
3755 "policies": {
3756 "SupportMenu": {
3757 "Title": "Support Menu",
3758 "URL": "http://example.com/support",
3759 "AccessKey": "S"
3760 }
3761 }
3762 }
3763 ```
3764 ### UserMessaging
3765
3766 Prevent installing search engines from webpages.
3767
3768 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3769
3770 `ExtensionRecommendations` Don't recommend extensions.
3771
3772 `FeatureRecommendations` Don't recommend browser features.
3773
3774 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3775
3776 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3777 **CCK2 Equivalent:** N/A\
3778 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3779
3780 #### Windows (GPO)
3781 ```
3782 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3783 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3784 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3785 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3786 ```
3787 #### macOS
3788 ```
3789 <dict>
3790 <key>UserMessaging</key>
3791 <dict>
3792 <key>WhatsNew</key>
3793 <true/> | <false/>
3794 <key>ExtensionRecommendations</key>
3795 <true/> | <false/>
3796 <key>FeatureRecommendations</key>
3797 <true/> | <false/>
3798 <key>UrlbarInterventions</key>
3799 <true/> | <false/>
3800 </dict>
3801 </dict>
3802 ```
3803 #### policies.json
3804 ```
3805 {
3806 "policies": {
3807 "UserMessaging": {
3808 "WhatsNew": true | false,
3809 "ExtensionRecommendations": true | false,
3810 "FeatureRecommendations": true | false,
3811 "UrlbarInterventions": true | false
3812 }
3813 }
3814 }
3815 ```
3816 ### WebsiteFilter
3817 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3818
3819 **Compatibility:** Firefox 60, Firefox ESR 60\
3820 **CCK2 Equivalent:** N/A\
3821 **Preferences Affected:** N/A
3822
3823 #### Windows (GPO)
3824 ```
3825 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3826 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3827 ```
3828 #### macOS
3829 ```
3830 <dict>
3831 <key>WebsiteFilter</key>
3832 <dict>
3833 <key>Block</key>
3834 <array>
3835 <string><all_urls></string>
3836 </array>
3837 <key>Exceptions</key>
3838 <array>
3839 <string>http://example.org/*</string>
3840 </array>
3841 </dict>
3842
3843 </dict>
3844 ```
3845 #### policies.json
3846 ```
3847 {
3848 "policies": {
3849 "WebsiteFilter": {
3850 "Block": ["<all_urls>"],
3851 "Exceptions": ["http://example.org/*"]
3852 }
3853 }
3854 }
3855 ```

patrick-canterino.de