]> git.p6c8.net - policy-templates.git/blob - README.md
e0af1d4b1d531c7f1aa9e88d0964f78763d90a49
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Official policy documentation has been moved to https://mozilla.github.io/policy-templates/.
6
7 I'm maintaining things in the README.md until we can update links in Firefox.
8
9 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
10
11 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
12
13 ```
14 {
15 "policies": {
16 "Authentication": {
17 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
18 }
19 "Authentication_Comment": "These domains are required for us"
20 }
21 }
22 ```
23
24 | Policy Name | Description
25 | --- | --- |
26 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
27 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
28 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
29 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
30 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
31 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
32 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
33 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
34 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
35 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
36 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
37 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
38 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
39 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
40 | **[`Certificates`](#certificates)** |
41 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
42 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
43 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
44 | **[`Cookies`](#cookies)** | Configure cookie preferences.
45 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
46 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
47 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
48 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
49 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
50 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
51 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
52 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
53 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
54 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
55 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
56 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
57 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
58 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
59 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
60 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
61 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
62 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
63 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
64 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
65 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
66 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
67 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
68 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
69 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
70 | **[`DisplayBookmarksToolbar (Deprecated)`](#displaybookmarkstoolbar-deprecated)** | Set the initial state of the bookmarks toolbar.
71 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
72 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
73 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
74 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
75 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
76 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
77 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
78 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
79 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
80 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
81 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
82 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
83 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
84 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
85 | **[`Handlers`](#handlers)** | Configure default application handlers.
86 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
87 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
88 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
89 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
90 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
91 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
92 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
93 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
94 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
95 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
96 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
97 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
98 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
99 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
100 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
101 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
102 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
103 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
104 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
105 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
106 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
107 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
108 | **[`Preferences`](#preferences)** | Set and lock preferences.
109 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
110 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
111 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
112 | **[`Proxy`](#proxy)** | Configure proxy settings.
113 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
114 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
115 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
116 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
117 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
118 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
119 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
120 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
121 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
122 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
123 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
124 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
125 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
126 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
127 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
128 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
129 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
130 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
131 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
132 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
133
134 ### 3rdparty
135
136 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
137
138 For GPO and Intune, the extension developer should provide an ADMX file.
139
140 **Compatibility:** Firefox 68\
141 **CCK2 Equivalent:** N/A\
142 **Preferences Affected:** N/A
143
144 #### macOS
145 ```
146 <dict>
147 <key>3rdparty</key>
148 <dict>
149 <key>Extensions</key>
150 <dict>
151 <key>uBlock0@raymondhill.net</key>
152 <dict>
153 <key>adminSettings</key>
154 <dict>
155 <key>selectedFilterLists</key>
156 <array>
157 <string>ublock-privacy</string>
158 <string>ublock-badware</string>
159 <string>ublock-filters</string>
160 <string>user-filters</string>
161 </array>
162 </dict>
163 </dict>
164 </dict>
165 </dict>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "3rdparty": {
173 "Extensions": {
174 "uBlock0@raymondhill.net": {
175 "adminSettings": {
176 "selectedFilterLists": [
177 "ublock-privacy",
178 "ublock-badware",
179 "ublock-filters",
180 "user-filters"
181 ]
182 }
183 }
184 }
185 }
186 }
187 }
188 ```
189
190 ### AllowedDomainsForApps
191
192 Define domains allowed to access Google Workspace.
193
194 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
195
196 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
197
198 **Compatibility:** Firefox 89, Firefox ESR 78.11\
199 **CCK2 Equivalent:** N/A\
200 **Preferences Affected:** N/A
201
202 #### Windows (GPO)
203 ```
204 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
205 ```
206 #### Windows (Intune)
207 OMA-URI:
208 ```
209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
210 ```
211 Value (string):
212 ```
213 <enabled/>
214 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
215 ```
216 #### macOS
217 ```
218 <dict>
219 <key>AllowedDomainsForApps</key>
220 <string>managedfirefox.com,example.com</string>
221 </dict>
222 ```
223 #### policies.json
224 ```
225 {
226 "policies": {
227 "AllowedDomainsForApps": "managedfirefox.com,example.com"
228 }
229 }
230 ```
231 ### AppAutoUpdate
232
233 Enable or disable **automatic** application update.
234
235 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
236
237 If set to false, application updates are downloaded but the user can choose when to install the update.
238
239 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
240
241 **Compatibility:** Firefox 75, Firefox ESR 68.7\
242 **CCK2 Equivalent:** N/A\
243 **Preferences Affected:** `app.update.auto`
244
245 #### Windows (GPO)
246 ```
247 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
248 ```
249 #### Windows (Intune)
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>AppAutoUpdate</key>
262 <true/> | <false/>
263 </dict>
264 ```
265 #### policies.json
266 ```
267 {
268 "policies": {
269 "AppAutoUpdate": true | false
270 }
271 }
272 ```
273 ### AppUpdatePin
274
275 Prevent Firefox from being updated beyond the specified version.
276
277 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
278
279 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
280
281 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
282
283 **Compatibility:** Firefox 102,\
284 **CCK2 Equivalent:** N/A\
285 **Preferences Affected:** N/A
286
287 #### Windows (GPO)
288 ```
289 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
290 ```
291 #### Windows (Intune)
292 OMA-URI:
293 ```
294 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
295 ```
296 Value (string):
297 ```
298 <enabled/>
299 <data id="AppUpdatePin" value="106."/>
300 ```
301 #### macOS
302 ```
303 <dict>
304 <key>AppUpdatePin</key>
305 <string>106.</string>
306 </dict>
307 ```
308 #### policies.json
309 ```
310 {
311 "policies": {
312 "AppUpdatePin": "106."
313 }
314 }
315 ```
316 ### AppUpdateURL
317
318 Change the URL for application update if you are providing Firefox updates from a custom update server.
319
320 **Compatibility:** Firefox 62, Firefox ESR 60.2\
321 **CCK2 Equivalent:** N/A\
322 **Preferences Affected:** `app.update.url`
323
324 #### Windows (GPO)
325 ```
326 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
327 ```
328 #### Windows (Intune)
329 OMA-URI:
330 ```
331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
332 ```
333 Value (string):
334 ```
335 <enabled/>
336 <data id="AppUpdateURL" value="https://yoursite.com"/>
337 ```
338 #### macOS
339 ```
340 <dict>
341 <key>AppUpdateURL</key>
342 <string>https://yoursite.com</string>
343 </dict>
344 ```
345 #### policies.json
346 ```
347 {
348 "policies": {
349 "AppUpdateURL": "https://yoursite.com"
350 }
351 }
352 ```
353 ### Authentication
354
355 Configure sites that support integrated authentication.
356
357 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
358
359 `PrivateBrowsing` enables integrated authentication in private browsing.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
362 **CCK2 Equivalent:** N/A\
363 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
368 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
369 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
370 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
371 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
372 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
373 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
374 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
375 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
376 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
377 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
378 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
379 ```
380 #### Windows (Intune)
381 OMA-URI:
382 ```
383 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
384 ```
385 Value (string):
386 ```
387 <enabled/>
388 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
389 ```
390 OMA-URI:
391 ```
392 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
393 ```
394 Value (string):
395 ```
396 <enabled/>
397 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
398 ```
399 OMA-URI:
400 ```
401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
402 ```
403 Value (string):
404 ```
405 <enabled/>
406 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
407 ```
408 OMA-URI:
409 ```
410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
411 ```
412 Value (string):
413 ```
414 <enabled/>
415 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
416 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
417 ```
418 OMA-URI:
419 ```
420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
421 ```
422 Value (string):
423 ```
424 <enabled/> or <disabled/>
425 ```
426 OMA-URI:
427 ```
428 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
429 ```
430 Value (string):
431 ```
432 <enabled/> or <disabled/>
433 ```
434 #### macOS
435 ```
436 <dict>
437 <key>Authentication</key>
438 <dict>
439 <key>SPNEGO</key>
440 <array>
441 <string>mydomain.com</string>
442 <string>https://myotherdomain.com</string>
443 </array>
444 <key>Delegated</key>
445 <array>
446 <string>mydomain.com</string>
447 <string>https://myotherdomain.com</string>
448 </array>
449 <key>NTLM</key>
450 <array>
451 <string>mydomain.com</string>
452 <string>https://myotherdomain.com</string>
453 </array>
454 <key>AllowNonFQDN</key>
455 <dict>
456 <key>SPNEGO</key>
457 <true/> | <false/>
458 <key>NTLM</key>
459 <true/> | <false/>
460 </dict>
461 <key>AllowProxies</key>
462 <dict>
463 <key>SPNEGO</key>
464 <true/> | <false/>
465 <key>NTLM</key>
466 <true/> | <false/>
467 </dict>
468 <key>Locked</key>
469 <true/> | <false/>
470 <key>PrivateBrowsing</key>
471 <true/> | <false/>
472 </dict>
473 </dict>
474 ```
475 #### policies.json
476 ```
477 {
478 "policies": {
479 "Authentication": {
480 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
481 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
482 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
483 "AllowNonFQDN": {
484 "SPNEGO": true | false,
485 "NTLM": true | false
486 },
487 "AllowProxies": {
488 "SPNEGO": true | false,
489 "NTLM": true | false
490 },
491 "Locked": true | false,
492 "PrivateBrowsing": true | false
493 }
494 }
495 }
496 ```
497 ### AutoLaunchProtocolsFromOrigins
498 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
499
500 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
501
502 The schema is:
503 ```
504 {
505 "items": {
506 "properties": {
507 "allowed_origins": {
508 "items": {
509 "type": "string"
510 },
511 "type": "array"
512 },
513 "protocol": {
514 "type": "string"
515 }
516 },
517 "required": [
518 "protocol",
519 "allowed_origins"
520 ],
521 "type": "object"
522 },
523 "type": "array"
524 }
525 ```
526 **Compatibility:** Firefox 90, Firefox ESR 78.12\
527 **CCK2 Equivalent:** N/A\
528 **Preferences Affected:** N/A
529
530 #### Windows (GPO)
531 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
532 ```
533 [
534 {
535 "protocol": "zoommtg",
536 "allowed_origins": [
537 "https://somesite.zoom.us"
538 ]
539 }
540 ]
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
546 ```
547 Value (string):
548 ```
549 <enabled/>
550 <data id="JSON" value='
551 [
552 {
553 "protocol": "zoommtg",
554 "allowed_origins": [
555 "https://somesite.zoom.us"
556 ]
557 }
558 ]'/>
559 ```
560 #### macOS
561 ```
562 <dict>
563 <key>AutoLaunchProtocolsFromOrigins</key>
564 <array>
565 <dict>
566 <key>protocol</key>
567 <string>zoommtg</string>
568 <key>allowed_origins</key>
569 <array>
570 <string>https://somesite.zoom.us</string>
571 </array>
572 </dict>
573 </array>
574 </dict>
575 ```
576 #### policies.json
577 ```
578 {
579 "policies": {
580 "AutoLaunchProtocolsFromOrigins": [{
581 "protocol": "zoommtg",
582 "allowed_origins": [
583 "https://somesite.zoom.us"
584 ]
585 }]
586 }
587 }
588 ```
589 ### BackgroundAppUpdate
590
591 Enable or disable **automatic** application update **in the background**, when the application is not running.
592
593 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
594
595 If set to false, the application will not try to install updates when the application is not running.
596
597 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
598
599 **Compatibility:** Firefox 90 (Windows only)\
600 **CCK2 Equivalent:** N/A\
601 **Preferences Affected:** `app.update.background.enabled`
602
603 #### Windows (GPO)
604 ```
605 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
606 ```
607 #### Windows (Intune)
608 OMA-URI:
609 ```
610 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
611 ```
612 Value (string):
613 ```
614 <enabled/> or <disabled/>
615 ```
616 #### macOS
617 ```
618 <dict>
619 <key>BackgroundAppUpdate</key>
620 <true/> | <false/>
621 </dict>
622 ```
623 #### policies.json
624 ```
625 {
626 "policies": {
627 "BackgroundAppUpdate": true | false
628 }
629 }
630 ```
631 ### BlockAboutAddons
632
633 Block access to the Add-ons Manager (about:addons).
634
635 **Compatibility:** Firefox 60, Firefox ESR 60\
636 **CCK2 Equivalent:** `disableAddonsManager`\
637 **Preferences Affected:** N/A
638
639 #### Windows (GPO)
640 ```
641 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
642 ```
643 #### Windows (Intune)
644 OMA-URI:
645 ```
646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
647 ```
648 Value (string):
649 ```
650 <enabled/> or <disabled/>
651 ```
652 #### macOS
653 ```
654 <dict>
655 <key>BlockAboutAddons</key>
656 <true/> | <false/>
657 </dict>
658 ```
659 #### policies.json
660 ```
661 {
662 "policies": {
663 "BlockAboutAddons": true | false
664 }
665 }
666 ```
667 ### BlockAboutConfig
668
669 Block access to about:config.
670
671 **Compatibility:** Firefox 60, Firefox ESR 60\
672 **CCK2 Equivalent:** `disableAboutConfig`\
673 **Preferences Affected:** N/A
674
675 #### Windows (GPO)
676 ```
677 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
678 ```
679 #### Windows (Intune)
680 OMA-URI:
681 ```
682 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
683 ```
684 Value (string):
685 ```
686 <enabled/> or <disabled/>
687 ```
688 #### macOS
689 ```
690 <dict>
691 <key>BlockAboutConfig</key>
692 <true/> | <false/>
693 </dict>
694 ```
695 #### policies.json
696 ```
697 {
698 "policies": {
699 "BlockAboutConfig": true | false
700 }
701 }
702 ```
703 ### BlockAboutProfiles
704
705 Block access to About Profiles (about:profiles).
706
707 **Compatibility:** Firefox 60, Firefox ESR 60\
708 **CCK2 Equivalent:** `disableAboutProfiles`\
709 **Preferences Affected:** N/A
710
711 #### Windows (GPO)
712 ```
713 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
714 ```
715 #### Windows (Intune)
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
719 ```
720 Value (string):
721 ```
722 <enabled/> or <disabled/>
723 ```
724 #### macOS
725 ```
726 <dict>
727 <key>BlockAboutProfiles</key>
728 <true/> | <false/>
729 </dict>
730 ```
731 #### policies.json
732 ```
733 {
734 "policies": {
735 "BlockAboutProfiles": true | false
736 }
737 }
738 ```
739 ### BlockAboutSupport
740
741 Block access to Troubleshooting Information (about:support).
742
743 **Compatibility:** Firefox 60, Firefox ESR 60\
744 **CCK2 Equivalent:** `disableAboutSupport`\
745 **Preferences Affected:** N/A
746
747 #### Windows (GPO)
748 ```
749 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
750 ```
751 #### Windows (Intune)
752 OMA-URI:
753 ```
754 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
755 ```
756 Value (string):
757 ```
758 <enabled/> or <disabled/>
759 ```
760 #### macOS
761 ```
762 <dict>
763 <key>BlockAboutSupport</key>
764 <true/> | <false/>
765 </dict>
766 ```
767 #### policies.json
768 ```
769 {
770 "policies": {
771 "BlockAboutSupport": true | false
772 }
773 }
774 ```
775 ### Bookmarks
776
777 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
778
779 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
780
781 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
782
783 **Compatibility:** Firefox 60, Firefox ESR 60\
784 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
785 **Preferences Affected:** N/A
786
787 #### Windows (GPO)
788 ```
789 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
790 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
791 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
792 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
793 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
794
795 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
796 ```
797 []
798 ```
799
800 ```
801 #### Windows (Intune)
802 OMA-URI:
803 ```
804 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
805 ```
806 Value (string):
807 ```
808 <enabled/>
809 <data id="BookmarkTitle" value="Example"/>
810 <data id="BookmarkURL" value="https://example.com"/>
811 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
812 <data id="BookmarkPlacement" value="toolbar | menu"/>
813 <data id="BookmarkFolder" value="FolderName"/>
814 ```
815 OMA-URI:
816 ```
817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
818 ```
819 Value (string):
820 ```
821 <enabled/>
822 <data id="JSON" value='[]'/>
823 ```
824 #### macOS
825 ```
826 <dict>
827 <key>Bookmarks</key>
828 <array>
829 <dict>
830 <key>Title</key>
831 <string>Example</string>
832 <key>URL</key>
833 <string>https://example.com</string>
834 <key>Favicon</key>
835 <string>https://example.com/favicon.ico</string>
836 <key>Placement</key>
837 <string>toolbar | menu</string>
838 <key>Folder</key>
839 <string>FolderName</string>
840 </dict>
841 </array>
842 </dict>
843 ```
844 #### policies.json
845 ```
846 {
847 "policies": {
848 "Bookmarks": [
849 {
850 "Title": "Example",
851 "URL": "https://example.com",
852 "Favicon": "https://example.com/favicon.ico",
853 "Placement": "toolbar" | "menu",
854 "Folder": "FolderName"
855 }
856 ]
857 }
858 }
859 ```
860 ### CaptivePortal
861 Enable or disable the detection of captive portals.
862
863 **Compatibility:** Firefox 67, Firefox ESR 60.7\
864 **CCK2 Equivalent:** N/A\
865 **Preferences Affected:** `network.captive-portal-service.enabled`
866
867 #### Windows (GPO)
868 ```
869 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
870 ```
871 #### Windows (Intune)
872 OMA-URI:
873 ```
874 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
875 ```
876 Value (string):
877 ```
878 <enabled/> or <disabled/>
879 ```
880 #### macOS
881 ```
882 <dict>
883 <key>CaptivePortal</key>
884 <true/> | <false/>
885 </dict>
886 ```
887 #### policies.json
888 ```
889 {
890 "policies": {
891 "CaptivePortal": true | false
892 }
893 }
894 ```
895 ### Certificates
896
897 ### Certificates | ImportEnterpriseRoots
898
899 Trust certificates that have been added to the operating system certificate store by a user or administrator.
900
901 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
902
903 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
904
905 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
906 **CCK2 Equivalent:** N/A\
907 **Preferences Affected:** `security.enterprise_roots.enabled`
908
909 #### Windows (GPO)
910 ```
911 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
912 ```
913 #### Windows (Intune)
914 OMA-URI:
915 ```
916 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
917 ```
918 Value (string):
919 ```
920 <enabled/> or <disabled/>
921 ```
922 #### macOS
923 ```
924 <dict>
925 <key>Certificates</key>
926 <dict>
927 <key>ImportEnterpriseRoots</key>
928 <true/> | <false/>
929 </dict>
930 </dict>
931 ```
932 #### policies.json
933 ```
934 {
935 "policies": {
936 "Certificates": {
937 "ImportEnterpriseRoots": true | false
938 }
939 }
940 }
941 ```
942 ### Certificates | Install
943
944 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
945
946 - Windows
947 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
948 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
949 - macOS
950 - /Library/Application Support/Mozilla/Certificates
951 - ~/Library/Application Support/Mozilla/Certificates
952 - Linux
953 - /usr/lib/mozilla/certificates
954 - /usr/lib64/mozilla/certificates
955 - ~/.mozilla/certificates
956
957 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
958
959 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
960
961 Certificates are installed using the trust string `CT,CT,`.
962
963 Binary (DER) and ASCII (PEM) certificates are both supported.
964
965 **Compatibility:** Firefox 64, Firefox ESR 64\
966 **CCK2 Equivalent:** `certs.ca`\
967 **Preferences Affected:** N/A
968
969 #### Windows (GPO)
970 ```
971 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
972 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
973 ```
974 #### Windows (Intune)
975 OMA-URI:
976 ```
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
978 ```
979 Value (string):
980 ```
981 <enabled/>
982 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
983 ```
984 #### macOS
985 ```
986 <dict>
987 <key>Certificates</key>
988 <dict>
989 <key>Install</key>
990 <array>
991 <string>cert1.der</string>
992 <string>/Users/username/cert2.pem</string>
993 </array>
994 </dict>
995 </dict>
996 ```
997 #### policies.json
998 ```
999 {
1000 "policies": {
1001 "Certificates": {
1002 "Install": ["cert1.der", "/home/username/cert2.pem"]
1003 }
1004 }
1005 }
1006 ```
1007 ### Containers
1008 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1009
1010 Currently you can set the initial set of containers.
1011
1012 For each container, you can specify the name, icon, and color.
1013
1014 | Name | Description |
1015 | --- | --- |
1016 | `name`| Name of container
1017 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1018 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1019
1020 **Compatibility:** Firefox 113\
1021 **CCK2 Equivalent:** N/A\
1022 **Preferences Affected:** N/A
1023
1024 #### Windows (GPO)
1025 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1026 ```
1027 {
1028 "Default": [
1029 {
1030 "name": "My container",
1031 "icon": "pet",
1032 "color": "turquoise"
1033 }
1034 ]
1035 }
1036 ```
1037 #### Windows (Intune)
1038 OMA-URI:
1039 ```
1040 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1041 ```
1042 Value (string):
1043 ```
1044 <enabled/>
1045 <data id="JSON" value='
1046 {
1047 "Default": [
1048 {
1049 "name": "My container",
1050 "icon": "pet",
1051 "color": "turquoise"
1052 }
1053 ]
1054 }
1055 '/>
1056 ```
1057 #### macOS
1058 ```
1059 <dict>
1060 <key>Default</key>
1061 <dict>
1062 <key>Containers</key>
1063 <array>
1064 <dict>
1065 <key>name</key>
1066 <string>My container</string>
1067 <key>icon</key>
1068 <string>pet</string>
1069 <key>color</key>
1070 <string>turquoise</string>
1071 </dict>
1072 </array>
1073 </dict>
1074 </dict>
1075 ```
1076 #### policies.json
1077 ```
1078 {
1079 "policies": {
1080 "Containers": {
1081 "Default": [
1082 {
1083 "name": "My container",
1084 "icon": "pet",
1085 "color": "turquoise"
1086 }
1087 ]
1088 }
1089 }
1090 }
1091 ```
1092 ### Cookies
1093 Configure cookie preferences.
1094
1095 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1096
1097 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1098
1099 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1100
1101 `Behavior` sets the default behavior for cookies based on the values below.
1102
1103 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1104
1105 | Value | Description
1106 | --- | --- |
1107 | accept | Accept all cookies
1108 | reject-foreign | Reject third party cookies
1109 | reject | Reject all cookies
1110 | limit-foreign | Reject third party cookies for sites you haven't visited
1111 | reject-tracker | Reject cookies for known trackers (default)
1112 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1113
1114 `Default` (Deprecated) determines whether cookies are accepted at all.
1115
1116 `AcceptThirdParty` (Deprecated) determines how third-party cookies are handled.
1117
1118 `ExpireAtSessionEnd` determines when cookies expire.
1119
1120 `RejectTracker` (Deprecated) only rejects cookies for trackers.
1121
1122 `Locked` prevents the user from changing cookie preferences.
1123
1124 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1125 **CCK2 Equivalent:** N/A\
1126 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1127
1128 #### Windows (GPO)
1129 ```
1130 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1131 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1132 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1133 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
1134 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
1135 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
1136 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
1137 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1138 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1139 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1140 ```
1141 #### Windows (Intune)
1142 OMA-URI:
1143 ```
1144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1145 ```
1146 Value (string):
1147 ```
1148 <enabled/>
1149 <data id="Permissions" value="1&#xF000;https://example.com"/>
1150 ```
1151 OMA-URI:
1152 ```
1153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1154 ```
1155 Value (string):
1156 ```
1157 <enabled/>
1158 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1159 ```
1160 OMA-URI:
1161 ```
1162 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1163 ```
1164 Value (string):
1165 ```
1166 <enabled/>
1167 <data id="Permissions" value="1&#xF000;https://example.org"/>
1168 ```
1169 OMA-URI:
1170 ```
1171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1172 ```
1173 Value (string):
1174 ```
1175 <enabled/> or <disabled/>
1176 ```
1177 OMA-URI:
1178 ```
1179 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1180 ```
1181 Value (string):
1182 ```
1183 <enabled/>
1184 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1185 ```
1186 OMA-URI:
1187 ```
1188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1189 ```
1190 Value (string):
1191 ```
1192 <enabled/> or <disabled/>
1193 ```
1194 OMA-URI:
1195 ```
1196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1197 ```
1198 Value (string):
1199 ```
1200 <enabled/> or <disabled/>
1201 ```
1202 OMA-URI:
1203 ```
1204 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1205 ```
1206 Value (string):
1207 ```
1208 <enabled/> or <disabled/>
1209 ```
1210 OMA-URI:
1211 ```
1212 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1213 ```
1214 Value (string):
1215 ```
1216 <enabled/>
1217 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1218 ```
1219 OMA-URI:
1220 ```
1221 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1222 ```
1223 Value (string):
1224 ```
1225 <enabled/>
1226 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1227 ```
1228 #### macOS
1229 ```
1230 <dict>
1231 <key>Cookies</key>
1232 <dict>
1233 <key>Allow</key>
1234 <array>
1235 <string>http://example.com</string>
1236 </array>
1237 <key>AllowSession</key>
1238 <array>
1239 <string>http://example.edu</string>
1240 </array>
1241 <key>Block</key>
1242 <array>
1243 <string>http://example.org</string>
1244 </array>
1245 <key>Default</key>
1246 <true/> | <false/>
1247 <key>AcceptThirdParty</key>
1248 <string>always | never | from-visited</string>
1249 <key>ExpireAtSessionEnd</key>
1250 <true/> | <false/>
1251 <key>RejectTracker</key>
1252 <true/> | <false/>
1253 <key>Locked</key>
1254 <true/> | <false/>
1255 <key>Behavior</key>
1256 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1257 <key>BehaviorPrivateBrowsing</key>
1258 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1259 </dict>
1260 </dict>
1261 ```
1262 #### policies.json
1263 ```
1264 {
1265 "policies": {
1266 "Cookies": {
1267 "Allow": ["http://example.org/"],
1268 "AllowSession": ["http://example.edu/"],
1269 "Block": ["http://example.edu/"],
1270 "Default": true | false,
1271 "AcceptThirdParty": "always" | "never" | "from-visited",
1272 "ExpireAtSessionEnd": true | false,
1273 "RejectTracker": true | false,
1274 "Locked": true | false,
1275 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1276 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1277 }
1278 }
1279 }
1280 ```
1281 ### DefaultDownloadDirectory
1282 Set the default download directory.
1283
1284 You can use ${home} for the native home directory.
1285
1286 **Compatibility:** Firefox 68, Firefox ESR 68\
1287 **CCK2 Equivalent:** N/A\
1288 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1293 ```
1294 #### Windows (Intune)
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/>
1302 <data id="Preferences_String" value="${home}\Downloads"/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DefaultDownloadDirectory</key>
1308 <string>${home}/Downloads</string>
1309 </dict>
1310 ```
1311 #### policies.json (macOS and Linux)
1312 ```
1313 {
1314 "policies": {
1315 "DefaultDownloadDirectory": "${home}/Downloads"
1316 }
1317 }
1318 ```
1319 #### policies.json (Windows)
1320 ```
1321 {
1322 "policies": {
1323 "DefaultDownloadDirectory": "${home}\\Downloads"
1324 }
1325 }
1326 ```
1327 ### DisableAppUpdate
1328 Turn off application updates within Firefox.
1329
1330 **Compatibility:** Firefox 60, Firefox ESR 60\
1331 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1332 **Preferences Affected:** N/A
1333
1334 #### Windows (GPO)
1335 ```
1336 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1337 ```
1338 #### Windows (Intune)
1339 OMA-URI:
1340 ```
1341 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1342 ```
1343 Value (string):
1344 ```
1345 <enabled/> or <disabled/>
1346 ```
1347 #### macOS
1348 ```
1349 <dict>
1350 <key>DisableAppUpdate</key>
1351 <true/> | <false/>
1352 </dict>
1353 ```
1354 #### policies.json
1355 ```
1356 {
1357 "policies": {
1358 "DisableAppUpdate": true | false
1359 }
1360 }
1361 ```
1362 ### DisableBuiltinPDFViewer
1363 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1364
1365 **Compatibility:** Firefox 60, Firefox ESR 60\
1366 **CCK2 Equivalent:** `disablePDFjs`\
1367 **Preferences Affected:** `pdfjs.disabled`
1368
1369 #### Windows (GPO)
1370 ```
1371 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1372 ```
1373 #### Windows (Intune)
1374 OMA-URI:
1375 ```
1376 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1377 ```
1378 Value (string):
1379 ```
1380 <enabled/> or <disabled/>
1381 ```
1382 #### macOS
1383 ```
1384 <dict>
1385 <key>DisableBuiltinPDFViewer</key>
1386 <true/> | <false/>
1387 </dict>
1388 ```
1389 #### policies.json
1390 ```
1391 {
1392 "policies": {
1393 "DisableBuiltinPDFViewer": true | false
1394 }
1395 }
1396 ```
1397 ### DisabledCiphers
1398 Disable specific cryptographic ciphers, listed below.
1399
1400 ```
1401 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1402 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1403 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1404 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1405 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1406 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1407 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1408 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1409 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1410 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1411 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1412 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1413 TLS_RSA_WITH_AES_128_GCM_SHA256
1414 TLS_RSA_WITH_AES_256_GCM_SHA384
1415 TLS_RSA_WITH_AES_128_CBC_SHA
1416 TLS_RSA_WITH_AES_256_CBC_SHA
1417 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1418 ```
1419
1420 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1421
1422 ---
1423 **Note:**
1424
1425 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1426
1427 ---
1428 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1429 **CCK2 Equivalent:** N/A\
1430 **Preferences Affected:** N/A
1431
1432 #### Windows (GPO)
1433 ```
1434 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1435 ```
1436 #### Windows (Intune)
1437 OMA-URI:
1438 ```
1439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1440
1441 ```
1442 Value (string):
1443 ```
1444 <enabled/> or <disabled/>
1445 ```
1446 #### macOS
1447 ```
1448 <dict>
1449 <key>DisabledCiphers</key>
1450 <dict>
1451 <key>CIPHER_NAME</key>
1452 <true/> | <false/>
1453 </dict>
1454 </dict>
1455 ```
1456 #### policies.json
1457 ```
1458 {
1459 "policies": {
1460 "DisabledCiphers": {
1461 "CIPHER_NAME": true | false,
1462 }
1463 }
1464 }
1465 ```
1466 ### DisableDefaultBrowserAgent
1467 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1468
1469 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1470
1471 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1472 **CCK2 Equivalent:** N/A\
1473 **Preferences Affected:** N/A
1474
1475 #### Windows (GPO)
1476 ```
1477 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1478 ```
1479 #### Windows (Intune)
1480 OMA-URI:
1481 ```
1482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1483 ```
1484 Value (string):
1485 ```
1486 <enabled/> or <disabled/>
1487 ```
1488 #### policies.json
1489 ```
1490 {
1491 "policies": {
1492 "DisableDefaultBrowserAgent": true | false
1493 }
1494 }
1495 ```
1496 ### DisableDeveloperTools
1497 Remove access to all developer tools.
1498
1499 **Compatibility:** Firefox 60, Firefox ESR 60\
1500 **CCK2 Equivalent:** `removeDeveloperTools`\
1501 **Preferences Affected:** `devtools.policy.disabled`
1502
1503 #### Windows (GPO)
1504 ```
1505 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1506 ```
1507 #### Windows (Intune)
1508 OMA-URI:
1509 ```
1510 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1511 ```
1512 Value (string):
1513 ```
1514 <enabled/> or <disabled/>
1515 ```
1516 #### macOS
1517 ```
1518 <dict>
1519 <key>DisableDeveloperTools</key>
1520 <true/> | <false/>
1521 </dict>
1522 ```
1523 #### policies.json
1524 ```
1525 {
1526 "policies": {
1527 "DisableDeveloperTools": true | false
1528 }
1529 }
1530 ```
1531 ### DisableFeedbackCommands
1532 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1533
1534 **Compatibility:** Firefox 60, Firefox ESR 60\
1535 **CCK2 Equivalent:** N/A\
1536 **Preferences Affected:** N/A
1537
1538 #### Windows (GPO)
1539 ```
1540 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1541 ```
1542 #### Windows (Intune)
1543 OMA-URI:
1544 ```
1545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1546 ```
1547 Value (string):
1548 ```
1549 <enabled/> or <disabled/>
1550 ```
1551 #### macOS
1552 ```
1553 <dict>
1554 <key>DisableFeedbackCommands</key>
1555 <true/> | <false/>
1556 </dict>
1557 ```
1558 #### policies.json
1559 ```
1560 {
1561 "policies": {
1562 "DisableFeedbackCommands": true | false
1563 }
1564 }
1565 ```
1566 ### DisableFirefoxAccounts
1567 Disable Firefox Accounts integration (Sync).
1568
1569 **Compatibility:** Firefox 60, Firefox ESR 60\
1570 **CCK2 Equivalent:** `disableSync`\
1571 **Preferences Affected:** `identity.fxaccounts.enabled`
1572
1573 #### Windows (GPO)
1574 ```
1575 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1576 ```
1577 #### Windows (Intune)
1578 OMA-URI:
1579 ```
1580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1581 ```
1582 Value (string):
1583 ```
1584 <enabled/> or <disabled/>
1585 ```
1586 #### macOS
1587 ```
1588 <dict>
1589 <key>DisableFirefoxAccounts</key>
1590 <true/> | <false/>
1591 </dict>
1592 ```
1593 #### policies.json
1594 ```
1595 {
1596 "policies": {
1597 "DisableFirefoxAccounts": true | false
1598 }
1599 }
1600 ```
1601 ### DisableFirefoxScreenshots
1602 Remove access to Firefox Screenshots.
1603
1604 **Compatibility:** Firefox 60, Firefox ESR 60\
1605 **CCK2 Equivalent:** N/A\
1606 **Preferences Affected:** `extensions.screenshots.disabled`
1607
1608 #### Windows (GPO)
1609 ```
1610 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1611 ```
1612 #### Windows (Intune)
1613 OMA-URI:
1614 ```
1615 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1616 ```
1617 Value (string):
1618 ```
1619 <enabled/> or <disabled/>
1620 ```
1621 #### macOS
1622 ```
1623 <dict>
1624 <key>DisableFirefoxScreenshots</key>
1625 <true/> | <false/>
1626 </dict>
1627 ```
1628 #### policies.json
1629 ```
1630 {
1631 "policies": {
1632 "DisableFirefoxScreenshots": true | false
1633 }
1634 }
1635 ```
1636 ### DisableFirefoxStudies
1637 Disable Firefox studies (Shield).
1638
1639 **Compatibility:** Firefox 60, Firefox ESR 60\
1640 **CCK2 Equivalent:** N/A\
1641 **Preferences Affected:** N/A
1642
1643 #### Windows (GPO)
1644 ```
1645 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1646 ```
1647 #### Windows (Intune)
1648 OMA-URI:
1649 ```
1650 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1651 ```
1652 Value (string):
1653 ```
1654 <enabled/> or <disabled/>
1655 ```
1656 #### macOS
1657 ```
1658 <dict>
1659 <key>DisableFirefoxStudies</key>
1660 <true/> | <false/>
1661 </dict>
1662 ```
1663 #### policies.json
1664 ```
1665 {
1666 "policies": {
1667 "DisableFirefoxStudies": true | false
1668 }
1669 }
1670 ```
1671 ### DisableForgetButton
1672 Disable the "Forget" button.
1673
1674 **Compatibility:** Firefox 60, Firefox ESR 60\
1675 **CCK2 Equivalent:** `disableForget`\
1676 **Preferences Affected:** N/A
1677
1678 #### Windows (GPO)
1679 ```
1680 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1681 ```
1682 #### Windows (Intune)
1683 OMA-URI:
1684 ```
1685 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1686 ```
1687 Value (string):
1688 ```
1689 <enabled/> or <disabled/>
1690 ```
1691 #### macOS
1692 ```
1693 <dict>
1694 <key>DisableForgetButton</key>
1695 <true/> | <false/>
1696 </dict>
1697 ```
1698 #### policies.json
1699 ```
1700 {
1701 "policies": {
1702 "DisableForgetButton": true | false
1703 }
1704 }
1705 ```
1706 ### DisableFormHistory
1707 Turn off saving information on web forms and the search bar.
1708
1709 **Compatibility:** Firefox 60, Firefox ESR 60\
1710 **CCK2 Equivalent:** `disableFormFill`\
1711 **Preferences Affected:** `browser.formfill.enable`
1712
1713 #### Windows (GPO)
1714 ```
1715 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1716 ```
1717 #### Windows (Intune)
1718 OMA-URI:
1719 ```
1720 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1721 ```
1722 Value (string):
1723 ```
1724 <enabled/> or <disabled/>
1725 ```
1726 #### macOS
1727 ```
1728 <dict>
1729 <key>DisableFormHistory</key>
1730 <true/> | <false/>
1731 </dict>
1732 ```
1733 #### policies.json
1734 ```
1735 {
1736 "policies": {
1737 "DisableFormHistory": true | false
1738 }
1739 }
1740 ```
1741 ### DisableMasterPasswordCreation
1742 Remove the master password functionality.
1743
1744 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1745
1746 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1747
1748 **Compatibility:** Firefox 60, Firefox ESR 60\
1749 **CCK2 Equivalent:** `noMasterPassword`\
1750 **Preferences Affected:** N/A
1751
1752 #### Windows (GPO)
1753 ```
1754 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1755 ```
1756 #### Windows (Intune)
1757 OMA-URI:
1758 ```
1759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1760 ```
1761 Value (string):
1762 ```
1763 <enabled/> or <disabled/>
1764 ```
1765 #### macOS
1766 ```
1767 <dict>
1768 <key>DisableMasterPasswordCreation</key>
1769 <true/> | <false/>
1770 </dict>
1771 ```
1772 #### policies.json
1773 ```
1774 {
1775 "policies": {
1776 "DisableMasterPasswordCreation": true | false
1777 }
1778 }
1779 ```
1780 ### DisablePasswordReveal
1781 Do not allow passwords to be shown in saved logins
1782
1783 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1784 **CCK2 Equivalent:** N/A
1785 **Preferences Affected:** N/A
1786
1787 #### Windows (GPO)
1788 ```
1789 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1790 ```
1791 #### Windows (Intune)
1792 OMA-URI:
1793 ```
1794 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1795 ```
1796 Value (string):
1797 ```
1798 <enabled/> or <disabled/>
1799 ```
1800 #### macOS
1801 ```
1802 <dict>
1803 <key>DisablePasswordReveal</key>
1804 <true/> | <false/>
1805 </dict>
1806 ```
1807 #### policies.json
1808 ```
1809 {
1810 "policies": {
1811 "DisablePasswordReveal": true | false
1812 }
1813 }
1814 ```
1815 ### DisablePocket
1816 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1817
1818 **Compatibility:** Firefox 60, Firefox ESR 60\
1819 **CCK2 Equivalent:** `disablePocket`\
1820 **Preferences Affected:** `extensions.pocket.enabled`
1821
1822 #### Windows (GPO)
1823 ```
1824 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1825 ```
1826 #### Windows (Intune)
1827 OMA-URI:
1828 ```
1829 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1830 ```
1831 Value (string):
1832 ```
1833 <enabled/> or <disabled/>
1834 ```
1835 #### macOS
1836 ```
1837 <dict>
1838 <key>DisablePocket</key>
1839 <true/> | <false/>
1840 </dict>
1841 ```
1842 #### policies.json
1843 ```
1844 {
1845 "policies": {
1846 "DisablePocket": true | false
1847 }
1848 }
1849 ```
1850 ### DisablePrivateBrowsing
1851 Remove access to private browsing.
1852
1853 **Compatibility:** Firefox 60, Firefox ESR 60\
1854 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1855 **Preferences Affected:** N/A
1856
1857 #### Windows (GPO)
1858 ```
1859 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1860 ```
1861 #### Windows (Intune)
1862 OMA-URI:
1863 ```
1864 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1865 ```
1866 Value (string):
1867 ```
1868 <enabled/> or <disabled/>
1869 ```
1870 #### macOS
1871 ```
1872 <dict>
1873 <key>DisablePrivateBrowsing</key>
1874 <true/> | <false/>
1875 </dict>
1876 ```
1877 #### policies.json
1878 ```
1879 {
1880 "policies": {
1881 "DisablePrivateBrowsing": true | false
1882 }
1883 }
1884 ```
1885 ### DisableProfileImport
1886 Disables the "Import data from another browser" option in the bookmarks window.
1887
1888 **Compatibility:** Firefox 60, Firefox ESR 60\
1889 **CCK2 Equivalent:** N/A\
1890 **Preferences Affected:** N/A
1891
1892 #### Windows (GPO)
1893 ```
1894 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1895 ```
1896 #### Windows (Intune)
1897 OMA-URI:
1898 ```
1899 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1900 ```
1901 Value (string):
1902 ```
1903 <enabled/> or <disabled/>
1904 ```
1905 #### macOS
1906 ```
1907 <dict>
1908 <key>DisableProfileImport</key>
1909 <true/> | <false/>
1910 </dict>
1911 ```
1912 #### policies.json
1913 ```
1914 {
1915 "policies": {
1916 "DisableProfileImport": true | false
1917 }
1918 }
1919 ```
1920 ### DisableProfileRefresh
1921 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1922
1923 **Compatibility:** Firefox 60, Firefox ESR 60\
1924 **CCK2 Equivalent:** `disableResetFirefox`\
1925 **Preferences Affected:** `browser.disableResetPrompt`
1926
1927 #### Windows (GPO)
1928 ```
1929 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1930 ```
1931 #### Windows (Intune)
1932 OMA-URI:
1933 ```
1934 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1935 ```
1936 Value (string):
1937 ```
1938 <enabled/> or <disabled/>
1939 ```
1940 #### macOS
1941 ```
1942 <dict>
1943 <key>DisableProfileRefresh</key>
1944 <true/> | <false/>
1945 </dict>
1946 ```
1947 #### policies.json
1948 ```
1949 {
1950 "policies": {
1951 "DisableProfileRefresh": true | false
1952 }
1953 }
1954 ```
1955 ### DisableSafeMode
1956 Disable safe mode within the browser.
1957
1958 On Windows, this disables safe mode via the command line as well.
1959
1960 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1961 **CCK2 Equivalent:** `disableSafeMode`\
1962 **Preferences Affected:** N/A
1963
1964 #### Windows (GPO)
1965 ```
1966 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1967 ```
1968 #### Windows (Intune)
1969 OMA-URI:
1970 ```
1971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1972 ```
1973 Value (string):
1974 ```
1975 <enabled/> or <disabled/>
1976 ```
1977 #### macOS
1978 ```
1979 <dict>
1980 <key>DisableSafeMode</key>
1981 <true/> | <false/>
1982 </dict>
1983 ```
1984 #### policies.json
1985 ```
1986 {
1987 "policies": {
1988 "DisableSafeMode": true | false
1989 }
1990 }
1991 ```
1992 ### DisableSecurityBypass
1993 Prevent the user from bypassing security in certain cases.
1994
1995 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1996
1997 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1998
1999 **Compatibility:** Firefox 60, Firefox ESR 60\
2000 **CCK2 Equivalent:** N/A\
2001 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
2002
2003 #### Windows (GPO)
2004 ```
2005 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
2006 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
2007 ```
2008 #### Windows (Intune)
2009 OMA-URI:
2010 ```
2011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2012 ```
2013 Value (string):
2014 ```
2015 <enabled/> or <disabled/>
2016 ```
2017 OMA-URI:
2018 ```
2019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2020 ```
2021 Value (string):
2022 ```
2023 <enabled/> or <disabled/>
2024 ```
2025
2026 #### macOS
2027 ```
2028 <dict>
2029 <key>DisableSecurityBypass</key>
2030 <dict>
2031 <key>InvalidCertificate</key>
2032 <true/> | <false/>
2033 <key>SafeBrowsing</key>
2034 <true/> | <false/>
2035 </dict>
2036 </dict>
2037 ```
2038 #### policies.json
2039 ```
2040 {
2041 "policies": {
2042 "DisableSecurityBypass": {
2043 "InvalidCertificate": true | false,
2044 "SafeBrowsing": true | false
2045 }
2046 }
2047 }
2048 ```
2049 ### DisableSetDesktopBackground
2050 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2051
2052 **Compatibility:** Firefox 60, Firefox ESR 60\
2053 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2054 **Preferences Affected:** N/A
2055
2056 #### Windows (GPO)
2057 ```
2058 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2059 ```
2060 #### Windows (Intune)
2061 OMA-URI:
2062 ```
2063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2064 ```
2065 Value (string):
2066 ```
2067 <enabled/> or <disabled/>
2068 ```
2069 #### macOS
2070 ```
2071 <dict>
2072 <key>DisableSetDesktopBackground</key>
2073 <true/> | <false/>
2074 </dict>
2075 ```
2076 #### policies.json
2077 ```
2078 {
2079 "policies": {
2080 "DisableSetDesktopBackground": true | false
2081 }
2082 }
2083 ```
2084 ### DisableSystemAddonUpdate
2085 Prevent system add-ons from being installed or updated.
2086
2087 **Compatibility:** Firefox 60, Firefox ESR 60\
2088 **CCK2 Equivalent:** N/A\
2089 **Preferences Affected:** N/A
2090
2091 #### Windows (GPO)
2092 ```
2093 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2094 ```
2095 #### Windows (Intune)
2096 OMA-URI:
2097 ```
2098 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2099 ```
2100 Value (string):
2101 ```
2102 <enabled/> or <disabled/>
2103 ```
2104 #### macOS
2105 ```
2106 <dict>
2107 <key>DisableSystemAddonUpdate</key>
2108 <true/> | <false/>
2109 </dict>
2110 ```
2111 #### policies.json
2112 ```
2113 {
2114 "policies": {
2115 "DisableSystemAddonUpdate": true | false
2116 }
2117 }
2118 ```
2119 ### DisableTelemetry
2120 Prevent the upload of telemetry data.
2121
2122 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2123
2124 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2125
2126 **Compatibility:** Firefox 60, Firefox ESR 60\
2127 **CCK2 Equivalent:** `disableTelemetry`\
2128 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2129
2130 #### Windows (GPO)
2131 ```
2132 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2133 ```
2134 #### Windows (Intune)
2135 OMA-URI:
2136 ```
2137 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2138 ```
2139 Value (string):
2140 ```
2141 <enabled/> or <disabled/>
2142 ```
2143 #### macOS
2144 ```
2145 <dict>
2146 <key>DisableTelemetry</key>
2147 <true/> | <false/>
2148 </dict>
2149 ```
2150 #### policies.json
2151 ```
2152 {
2153 "policies": {
2154 "DisableTelemetry": true | false
2155 }
2156 }
2157 ```
2158 ### DisableThirdPartyModuleBlocking
2159 Do not allow blocking third-party modules from the `about:third-party` page.
2160
2161 This policy only works on Windows through GPO (not policies.json).
2162
2163 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2164 **CCK2 Equivalent:** N/A\
2165 **Preferences Affected:** N/A
2166
2167 #### Windows (GPO)
2168 ```
2169 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2170 ```
2171 #### Windows (Intune)
2172 OMA-URI:
2173 ```
2174 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2175 ```
2176 Value (string):
2177 ```
2178 <enabled/> or <disabled/>
2179 ```
2180 ### DisplayBookmarksToolbar
2181 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2182
2183 `always` means the bookmarks toolbar is always shown.
2184
2185 `never` means the bookmarks toolbar is not shown.
2186
2187 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2188
2189 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2190 **CCK2 Equivalent:** N/A\
2191 **Preferences Affected:** N/A
2192
2193 #### Windows (GPO)
2194 ```
2195 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2196 ```
2197 #### Windows (Intune)
2198 OMA-URI:
2199 ```
2200 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2201 ```
2202 Value (string):
2203 ```
2204 <enabled/>
2205 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2206 ```
2207 #### macOS
2208 ```
2209 <dict>
2210 <key>DisplayBookmarksToolbar</key>
2211 <string>always | never | newtab</string>
2212 </dict>
2213 ```
2214 #### policies.json
2215 ```
2216 {
2217 "policies": {
2218 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2219 }
2220 }
2221 ```
2222 ### DisplayBookmarksToolbar (Deprecated)
2223 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
2224
2225 **Compatibility:** Firefox 60, Firefox ESR 60\
2226 **CCK2 Equivalent:** `displayBookmarksToolbar`\
2227 **Preferences Affected:** N/A
2228
2229 #### Windows (GPO)
2230 ```
2231 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
2232 ```
2233 #### Windows (Intune)
2234 OMA-URI:
2235 ```
2236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
2237 ```
2238 Value (string):
2239 ```
2240 <enabled/> or <disabled/>
2241 ```
2242 #### macOS
2243 ```
2244 <dict>
2245 <key>DisplayBookmarksToolbar</key>
2246 <true/> | <false/>
2247 </dict>
2248 ```
2249 #### policies.json
2250 ```
2251 {
2252 "policies": {
2253 "DisplayBookmarksToolbar": true | false
2254 }
2255 }
2256 ```
2257 ### DisplayMenuBar
2258 Set the state of the menubar.
2259
2260 `always` means the menubar is shown and cannot be hidden.
2261
2262 `never` means the menubar is hidden and cannot be shown.
2263
2264 `default-on` means the menubar is on by default but can be hidden.
2265
2266 `default-off` means the menubar is off by default but can be shown.
2267
2268 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2269 **CCK2 Equivalent:** `displayMenuBar`\
2270 **Preferences Affected:** N/A
2271
2272 #### Windows (GPO)
2273 ```
2274 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2275 ```
2276 #### Windows (Intune)
2277 OMA-URI:
2278 ```
2279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2280 ```
2281 Value (string):
2282 ```
2283 <enabled/>
2284 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2285 ```
2286 #### macOS
2287 ```
2288 <dict>
2289 <key>DisplayMenuBar</key>
2290 <string>always | never | default-on | default-off</string>
2291 </dict>
2292 ```
2293 #### policies.json
2294 ```
2295 {
2296 "policies": {
2297 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2298 }
2299 }
2300 ```
2301 ### DisplayMenuBar (Deprecated)
2302 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2303
2304 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2305 **CCK2 Equivalent:** `displayMenuBar`\
2306 **Preferences Affected:** N/A
2307
2308 #### Windows (GPO)
2309 ```
2310 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2311 ```
2312 #### macOS
2313 ```
2314 <dict>
2315 <key>DisplayMenuBar</key>
2316 <true/> | <false/>
2317 </dict>
2318 ```
2319 #### policies.json
2320 ```
2321 {
2322 "policies": {
2323 "DisplayMenuBar": true | false
2324 }
2325 }
2326 ```
2327 ### DNSOverHTTPS
2328 Configure DNS over HTTPS.
2329
2330 `Enabled` determines whether DNS over HTTPS is enabled
2331
2332 `ProviderURL` is a URL to another provider.
2333
2334 `Locked` prevents the user from changing DNS over HTTPS preferences.
2335
2336 `ExcludedDomains` excludes domains from DNS over HTTPS.
2337
2338 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2339 **CCK2 Equivalent:** N/A\
2340 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2341
2342 #### Windows (GPO)
2343 ```
2344 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2345 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2346 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2347 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2348 ```
2349 #### Windows (Intune)
2350 OMA-URI:
2351 ```
2352 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2353 ```
2354 Value (string):
2355 ```
2356 <enabled/> or <disabled/>
2357 ```
2358 OMA-URI:
2359 ```
2360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2361 ```
2362 Value (string):
2363 ```
2364 <enabled/>
2365 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2366 ```
2367 OMA-URI:
2368 ```
2369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2370 ```
2371 Value (string):
2372 ```
2373 <enabled/> or <disabled/>
2374 ```
2375 OMA-URI:
2376 ```
2377 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2378 ```
2379 Value (string):
2380 ```
2381 <enabled/>
2382 <data id="List" value="1&#xF000;example.com"/>
2383 ```
2384 #### macOS
2385 ```
2386 <dict>
2387 <key>DNSOverHTTPS</key>
2388 <dict>
2389 <key>Enabled</key>
2390 <true/> | <false/>
2391 <key>ProviderURL</key>
2392 <string>URL_TO_ALTERNATE_PROVIDER</string>
2393 <key>Locked</key>
2394 <true/> | <false/>
2395 <key>ExcludedDomains</key>
2396 <array>
2397 <string>example.com</string>
2398 </array>
2399 </dict>
2400 </dict>
2401 ```
2402 #### policies.json
2403 ```
2404 {
2405 "policies": {
2406 "DNSOverHTTPS": {
2407 "Enabled": true | false,
2408 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2409 "Locked": true | false,
2410 "ExcludedDomains": ["example.com"]
2411 }
2412 }
2413 }
2414 ```
2415 ### DontCheckDefaultBrowser
2416 Don't check if Firefox is the default browser at startup.
2417
2418 **Compatibility:** Firefox 60, Firefox ESR 60\
2419 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2420 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2421
2422 #### Windows (GPO)
2423 ```
2424 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2425 ```
2426 #### Windows (Intune)
2427 OMA-URI:
2428 ```
2429 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2430 ```
2431 Value (string):
2432 ```
2433 <enabled/> or <disabled/>
2434 ```
2435 #### macOS
2436 ```
2437 <dict>
2438 <key>DontCheckDefaultBrowser</key>
2439 <true/> | <false/>
2440 </dict>
2441 ```
2442 #### policies.json
2443 ```
2444 {
2445 "policies": {
2446 "DontCheckDefaultBrowser": true | false
2447 }
2448 }
2449 ```
2450 ### DownloadDirectory
2451 Set and lock the download directory.
2452
2453 You can use ${home} for the native home directory.
2454
2455 **Compatibility:** Firefox 68, Firefox ESR 68\
2456 **CCK2 Equivalent:** N/A\
2457 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2458
2459 #### Windows (GPO)
2460 ```
2461 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2462 ```
2463 #### Windows (Intune)
2464 OMA-URI:
2465 ```
2466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2467 ```
2468 Value (string):
2469 ```
2470 <enabled/>
2471 <data id="Preferences_String" value="${home}\Downloads"/>
2472 ```
2473 #### macOS
2474 ```
2475 <dict>
2476 <key>DownloadDirectory</key>
2477 <string>${home}/Downloads</string>
2478 </dict>
2479 ```
2480 #### policies.json (macOS and Linux)
2481 ```
2482 {
2483 "policies": {
2484 "DownloadDirectory": "${home}/Downloads"
2485 }
2486 ```
2487 #### policies.json (Windows)
2488 ```
2489 {
2490 "policies": {
2491 "DownloadDirectory": "${home}\\Downloads"
2492 }
2493 ```
2494 ### EnableTrackingProtection
2495 Configure tracking protection.
2496
2497 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2498
2499 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2500
2501 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2502
2503 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2504
2505 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2506
2507 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2508
2509 `Exceptions` are origins for which tracking protection is not enabled.
2510
2511 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2512 **CCK2 Equivalent:** N/A\
2513 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2514
2515 #### Windows (GPO)
2516 ```
2517 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2518 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2519 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2520 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2521 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2522 ```
2523 #### Windows (Intune)
2524 OMA-URI:
2525 ```
2526 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2527 ```
2528 Value (string):
2529 ```
2530 <enabled/> or <disabled/>
2531 ```
2532 OMA-URI:
2533 ```
2534 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2535 ```
2536 Value (string):
2537 ```
2538 <enabled/> or <disabled/>
2539 ```
2540 OMA-URI:
2541 ```
2542 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2543 ```
2544 Value (string):
2545 ```
2546 <enabled/> or <disabled/>
2547 ```
2548 OMA-URI:
2549 ```
2550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2551 ```
2552 Value (string):
2553 ```
2554 <enabled/>
2555 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2556 ```
2557 OMA-URI:
2558 ```
2559 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2560 ```
2561 Value (string):
2562 ```
2563 <enabled/> or <disabled/>
2564 ```
2565 #### macOS
2566 ```
2567 <dict>
2568 <key>EnableTrackingProtection</key>
2569 <dict>
2570 <key>Value</key>
2571 <true/> | <false/>
2572 <key>Locked</key>
2573 <true/> | <false/>
2574 <key>Cryptomining</key>
2575 <true/> | <false/>
2576 <key>Fingerprinting</key>
2577 <true/> | <false/>
2578 <key>Exceptions</key>
2579 <array>
2580 <string>https://example.com</string>
2581 </array>
2582 </dict>
2583 </dict>
2584 ```
2585 #### policies.json
2586 ```
2587 {
2588 "policies": {
2589 "EnableTrackingProtection": {
2590 "Value": true | false,
2591 "Locked": true | false,
2592 "Cryptomining": true | false,
2593 "Fingerprinting": true | false,
2594 "Exceptions": ["https://example.com"]
2595 }
2596 }
2597 }
2598 ```
2599 ### EncryptedMediaExtensions
2600 Enable or disable Encrypted Media Extensions and optionally lock it.
2601
2602 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2603
2604 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2605
2606 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2607 **CCK2 Equivalent:** N/A\
2608 **Preferences Affected:** `media.eme.enabled`
2609
2610 #### Windows (GPO)
2611 ```
2612 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2613 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2614 ```
2615 #### Windows (Intune)
2616 OMA-URI:
2617 ```
2618 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2619 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2620 ```
2621 Value (string):
2622 ```
2623 <enabled/>or <disabled/>
2624 ```
2625 #### macOS
2626 ```
2627 <dict>
2628 <key>EncryptedMediaExtensions</key>
2629 <dict>
2630 <key>Enabled</key>
2631 <true/> | <false/>
2632 <key>Locked</key>
2633 <true/> | <false/>
2634 </dict>
2635 </dict>
2636 ```
2637 #### policies.json
2638 ```
2639 {
2640 "policies": {
2641 "EncryptedMediaExtensions": {
2642 "Enabled": true | false,
2643 "Locked": true | false
2644 }
2645 }
2646 }
2647 ```
2648 ### EnterprisePoliciesEnabled
2649 Enable policy support on macOS.
2650
2651 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2652 **CCK2 Equivalent:** N/A\
2653 **Preferences Affected:** N/A
2654
2655 #### macOS
2656 ```
2657 <dict>
2658 <key>EnterprisePoliciesEnabled</key>
2659 <true/>
2660 </dict>
2661 ```
2662 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2663
2664 Disable warnings based on file extension for specific file types on domains.
2665
2666 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2667
2668 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2669
2670 **Compatibility:** Firefox 102\
2671 **CCK2 Equivalent:** N/A\
2672 **Preferences Affected:** N/A
2673
2674 #### Windows (GPO)
2675 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2676 ```
2677 [
2678 {
2679 "file_extension": "jnlp",
2680 "domains": ["example.com"]
2681 }
2682 ]
2683 ```
2684 #### Windows (Intune)
2685 OMA-URI:
2686 ```
2687 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2688 ```
2689 Value (string):
2690 ```
2691 <enabled/>
2692 <data id="JSON" value='
2693 [
2694 {
2695 "file_extension": "jnlp",
2696 "domains": ["example.com"]
2697 }
2698 ]
2699 '/>
2700 ```
2701 #### macOS
2702 ```
2703 <dict>
2704 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2705 <array>
2706 <dict>
2707 <key>file_extension</key>
2708 <string>jnlp</string>
2709 <key>domains</key>
2710 <array>
2711 <string>example.com</string>
2712 </array>
2713 </dict>
2714 </array>
2715 </dict>
2716 ```
2717 #### policies.json
2718 ```
2719 {
2720 "policies": {
2721 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2722 "file_extension": "jnlp",
2723 "domains": ["example.com"]
2724 }]
2725 }
2726 }
2727 ```
2728 ### Extensions
2729 Control the installation, uninstallation and locking of extensions.
2730
2731 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2732
2733 `Install` is a list of URLs or native paths for extensions to be installed.
2734
2735 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2736
2737 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2738
2739 **Compatibility:** Firefox 60, Firefox ESR 60\
2740 **CCK2 Equivalent:** `addons`\
2741 **Preferences Affected:** N/A
2742
2743 #### Windows (GPO)
2744 ```
2745 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2746 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2747 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2748 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2749 ```
2750 #### Windows (Intune)
2751 OMA-URI:
2752 ```
2753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2754 ```
2755 Value (string):
2756 ```
2757 <enabled/>
2758 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2759 ```
2760 OMA-URI:
2761 ```
2762 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2763 ```
2764 Value (string):
2765 ```
2766 <enabled/>
2767 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2768 ```
2769 OMA-URI:
2770 ```
2771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2772 ```
2773 Value (string):
2774 ```
2775 <enabled/>
2776 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2777 ```
2778 #### macOS
2779 ```
2780 <dict>
2781 <key>Extensions</key>
2782 <dict>
2783 <key>Install</key>
2784 <array>
2785 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2786 <string>//path/to/xpi</string>
2787 </array>
2788 <key>Uninstall</key>
2789 <array>
2790 <string>bad_addon_id@mozilla.org</string>
2791 </array>
2792 <key>Locked</key>
2793 <array>
2794 <string>addon_id@mozilla.org</string>
2795 </array>
2796 </dict>
2797 </dict>
2798 ```
2799 #### policies.json
2800 ```
2801 {
2802 "policies": {
2803 "Extensions": {
2804 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2805 "Uninstall": ["bad_addon_id@mozilla.org"],
2806 "Locked": ["addon_id@mozilla.org"]
2807 }
2808 }
2809 }
2810 ```
2811 ### ExtensionSettings
2812 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2813
2814 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2815
2816 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2817
2818 The configuration for each extension is another dictionary that can contain the fields documented below.
2819
2820 | Name | Description |
2821 | --- | --- |
2822 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2823 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2824 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2825 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2826 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2827 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2828 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2829 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2830 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2831 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2832 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2833
2834 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2835 **CCK2 Equivalent:** N/A\
2836 **Preferences Affected:** N/A
2837
2838 #### Windows (GPO)
2839 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2840 ```
2841 {
2842 "*": {
2843 "blocked_install_message": "Custom error message.",
2844 "install_sources": ["https://yourwebsite.com/*"],
2845 "installation_mode": "blocked",
2846 "allowed_types": ["extension"]
2847 },
2848 "uBlock0@raymondhill.net": {
2849 "installation_mode": "force_installed",
2850 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2851 },
2852 "https-everywhere@eff.org": {
2853 "installation_mode": "allowed"
2854 }
2855 }
2856 ```
2857 #### Windows (Intune)
2858 OMA-URI:
2859 ```
2860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2861 ```
2862 Value (string):
2863 ```
2864 <enabled/>
2865 <data id="ExtensionSettings" value='
2866 {
2867 "*": {
2868 "blocked_install_message": "Custom error message.",
2869 "install_sources": ["https://yourwebsite.com/*"],
2870 "installation_mode": "blocked",
2871 "allowed_types": ["extension"]
2872 },
2873 "uBlock0@raymondhill.net": {
2874 "installation_mode": "force_installed",
2875 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2876 },
2877 "https-everywhere@eff.org": {
2878 "installation_mode": "allowed"
2879 }
2880 }'/>
2881 ```
2882 #### macOS
2883 ```
2884 <dict>
2885 <key>ExtensionSettings</key>
2886 <dict>
2887 <key>*</key>
2888 <dict>
2889 <key>blocked_install_message</key>
2890 <string>Custom error message.</string>
2891 <key>install_sources</key>
2892 <array>
2893 <string>"https://yourwebsite.com/*"</string>
2894 </array>
2895 <key>installation_mode</key>
2896 <string>blocked</string>
2897 <key>allowed_types</key>
2898 <array>
2899 <string>extension</string>
2900 </array>
2901 </dict>
2902 <key>uBlock0@raymondhill.net</key>
2903 <dict>
2904 <key>installation_mode</key>
2905 <string>force_installed</string>
2906 <key>install_url</key>
2907 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2908 </dict>
2909 <key>https-everywhere@eff.org</key>
2910 <dict>
2911 <key>installation_mode</key>
2912 <string>allowed</string>
2913 </dict>
2914 </dict>
2915 </dict>
2916 ```
2917 #### policies.json
2918 ```
2919 {
2920 "policies": {
2921 "ExtensionSettings": {
2922 "*": {
2923 "blocked_install_message": "Custom error message.",
2924 "install_sources": ["https://yourwebsite.com/*"],
2925 "installation_mode": "blocked",
2926 "allowed_types": ["extension"]
2927 },
2928 "uBlock0@raymondhill.net": {
2929 "installation_mode": "force_installed",
2930 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2931 },
2932 "https-everywhere@eff.org": {
2933 "installation_mode": "allowed"
2934 }
2935 }
2936 }
2937 }
2938 ```
2939 ### ExtensionUpdate
2940 Control extension updates.
2941
2942 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2943 **CCK2 Equivalent:** N/A\
2944 **Preferences Affected:** `extensions.update.enabled`
2945
2946 #### Windows (GPO)
2947 ```
2948 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2949 ```
2950 #### Windows (Intune)
2951 OMA-URI:
2952 ```
2953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2954 ```
2955 Value (string):
2956 ```
2957 <enabled/> or <disabled/>
2958 ```
2959 #### macOS
2960 ```
2961 <dict>
2962 <key>ExtensionUpdate</key>
2963 <true/> | <false/>
2964 </dict>
2965 ```
2966 #### policies.json
2967 ```
2968 {
2969 "policies": {
2970 "ExtensionUpdate": true | false
2971 }
2972 }
2973 ```
2974 ### FirefoxHome
2975 Customize the Firefox Home page.
2976
2977 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2978 **CCK2 Equivalent:** N/A\
2979 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2980
2981 #### Windows (GPO)
2982 ```
2983 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2984 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2985 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2986 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2987 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2988 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2989 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2990 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2991 ```
2992 #### Windows (Intune)
2993 OMA-URI:
2994 ```
2995 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2996 ```
2997 Value (string):
2998 ```
2999 <enabled/>
3000 <data id="FirefoxHome_Search" value="true | false"/>
3001 <data id="FirefoxHome_TopSites" value="true | false"/>
3002 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
3003 <data id="FirefoxHome_Highlights" value="true | false"/>
3004 <data id="FirefoxHome_Pocket" value="true | false"/>
3005 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
3006 <data id="FirefoxHome_Snippets" value="true | false"/>
3007 <data id="FirefoxHome_Locked" value="true | false"/>
3008 ```
3009 #### macOS
3010 ```
3011 <dict>
3012 <key>FirefoxHome</key>
3013 <dict>
3014 <key>Search</key>
3015 <true/> | <false/>
3016 <key>TopSites</key>
3017 <true/> | <false/>
3018 <key>SponsoredTopSites</key>
3019 <true/> | <false/>
3020 <key>Highlights</key>
3021 <true/> | <false/>
3022 <key>Pocket</key>
3023 <true/> | <false/>
3024 <key>SponsoredPocket</key>
3025 <true/> | <false/>
3026 <key>Snippets</key>
3027 <true/> | <false/>
3028 <key>Locked</key>
3029 <true/> | <false/>
3030 </dict>
3031 </dict>
3032 ```
3033 #### policies.json
3034 ```
3035 {
3036 "policies": {
3037 "FirefoxHome": {
3038 "Search": true | false,
3039 "TopSites": true | false,
3040 "SponsoredTopSites": true | false,
3041 "Highlights": true | false,
3042 "Pocket": true | false,
3043 "SponsoredPocket": true | false,
3044 "Snippets": true | false,
3045 "Locked": true | false
3046 }
3047 }
3048 }
3049 ```
3050 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3051 Whether to always go through the DNS server before sending a single word search string to a search engine.
3052
3053 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3054
3055 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3056
3057 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3058
3059 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3060
3061 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3062
3063 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3064 **CCK2 Equivalent:** `N/A`\
3065 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3066
3067 #### Windows (GPO)
3068 ```
3069 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3070 ```
3071 #### Windows (Intune)
3072 OMA-URI:
3073 ```
3074 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3075 ```
3076 Value (string):
3077 ```
3078 <enabled/> or <disabled/>
3079 ```
3080 #### macOS
3081 ```
3082 <dict>
3083 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3084 <true/> | <false/>
3085 </dict>
3086 ```
3087 #### policies.json
3088 ```
3089 {
3090 "policies": {
3091 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3092 }
3093 }
3094 ```
3095 ### Handlers
3096 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3097
3098 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3099
3100 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3101
3102 | Name | Description |
3103 | --- | --- |
3104 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3105 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3106 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3107 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3108 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3109 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3110
3111 **Compatibility:** Firefox 78, Firefox ESR 78\
3112 **CCK2 Equivalent:** N/A\
3113 **Preferences Affected:** N/A
3114
3115 #### Windows (GPO)
3116 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3117 ```
3118 {
3119 "mimeTypes": {
3120 "application/msword": {
3121 "action": "useSystemDefault",
3122 "ask": true | false
3123 }
3124 },
3125 "schemes": {
3126 "mailto": {
3127 "action": "useHelperApp",
3128 "ask": true | false,
3129 "handlers": [{
3130 "name": "Gmail",
3131 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3132 }]
3133 }
3134 },
3135 "extensions": {
3136 "pdf": {
3137 "action": "useHelperApp",
3138 "ask": true | false,
3139 "handlers": [{
3140 "name": "Adobe Acrobat",
3141 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3142 }]
3143 }
3144 }
3145 }
3146 ```
3147 #### Windows (Intune)
3148 OMA-URI:
3149 ```
3150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3151 ```
3152 Value (string):
3153 ```
3154 <enabled/>
3155 <data id="Handlers" value='
3156 {
3157 "mimeTypes": {
3158 "application/msword": {
3159 "action": "useSystemDefault",
3160 "ask": true | false
3161 }
3162 },
3163 "schemes": {
3164 "mailto": {
3165 "action": "useHelperApp",
3166 "ask": true | false,
3167 "handlers": [{
3168 "name": "Gmail",
3169 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3170 }]
3171 }
3172 },
3173 "extensions": {
3174 "pdf": {
3175 "action": "useHelperApp",
3176 "ask": true | false,
3177 "handlers": [{
3178 "name": "Adobe Acrobat",
3179 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3180 }]
3181 }
3182 }
3183 }
3184 '/>
3185 ```
3186 #### macOS
3187 ```
3188 <dict>
3189 <key>Handlers</key>
3190 <dict>
3191 <key>mimeTypes</key>
3192 <dict>
3193 <key>application/msword</key>
3194 <dict>
3195 <key>action</key>
3196 <string>useSystemDefault</string>
3197 <key>ask</key>
3198 <true/> | <false/>
3199 </dict>
3200 </dict>
3201 <key>schemes</key>
3202 <dict>
3203 <key>mailto</key>
3204 <dict>
3205 <key>action</key>
3206 <string>useHelperApp</string>
3207 <key>ask</key>
3208 <true/> | <false/>
3209 <key>handlers</key>
3210 <array>
3211 <dict>
3212 <key>name</key>
3213 <string>Gmail</string>
3214 <key>uriTemplate</key>
3215 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3216 </dict>
3217 </array>
3218 </dict>
3219 </dict>
3220 <key>extensions</key>
3221 <dict>
3222 <key>pdf</key>
3223 <dict>
3224 <key>action</key>
3225 <string>useHelperApp</string>
3226 <key>ask</key>
3227 <true/> | <false/>
3228 <key>handlers</key>
3229 <array>
3230 <dict>
3231 <key>name</key>
3232 <string>Adobe Acrobat</string>
3233 <key>path</key>
3234 <string>/System/Applications/Preview.app</string>
3235 </dict>
3236 </array>
3237 </dict>
3238 </dict>
3239 </dict>
3240 </dict>
3241 ```
3242 #### policies.json
3243 ```
3244 {
3245 "policies": {
3246 "Handlers": {
3247 "mimeTypes": {
3248 "application/msword": {
3249 "action": "useSystemDefault",
3250 "ask": false
3251 }
3252 },
3253 "schemes": {
3254 "mailto": {
3255 "action": "useHelperApp",
3256 "ask": true | false,
3257 "handlers": [{
3258 "name": "Gmail",
3259 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3260 }]
3261 }
3262 },
3263 "extensions": {
3264 "pdf": {
3265 "action": "useHelperApp",
3266 "ask": true | false,
3267 "handlers": [{
3268 "name": "Adobe Acrobat",
3269 "path": "/usr/bin/acroread"
3270 }]
3271 }
3272 }
3273 }
3274 }
3275 }
3276 ```
3277 ### HardwareAcceleration
3278 Control hardware acceleration.
3279
3280 **Compatibility:** Firefox 60, Firefox ESR 60\
3281 **CCK2 Equivalent:** N/A\
3282 **Preferences Affected:** `layers.acceleration.disabled`
3283
3284 #### Windows (GPO)
3285 ```
3286 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3287 ```
3288 #### Windows (Intune)
3289 OMA-URI:
3290 ```
3291 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3292 ```
3293 Value (string):
3294 ```
3295 <enabled/> or <disabled/>
3296 ```
3297 #### macOS
3298 ```
3299 <dict>
3300 <key>HardwareAcceleration</key>
3301 <true/> | <false/>
3302 </dict>
3303 ```
3304 #### policies.json
3305 ```
3306 {
3307 "policies": {
3308 "HardwareAcceleration": true | false
3309 }
3310 }
3311 ```
3312 ### Homepage
3313 Configure the default homepage and how Firefox starts.
3314
3315 `URL` is the default homepage.
3316
3317 `Locked` prevents the user from changing homepage preferences.
3318
3319 `Additional` allows for more than one homepage.
3320
3321 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3322
3323 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3324
3325 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3326 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3327 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3328
3329 #### Windows (GPO)
3330 ```
3331 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3332 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3333 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3334 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3335 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3336 ```
3337 #### Windows (Intune)
3338 OMA-URI:
3339 ```
3340 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3341 ```
3342 Value (string):
3343 ```
3344 <enabled/>
3345
3346 <data id="HomepageURL" value="https://example.com"/>
3347 <data id="HomepageLocked" value="true | false"/>
3348 ```
3349 OMA-URI:
3350 ```
3351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3352 ```
3353 Value (string):
3354 ```
3355 <enabled/>
3356
3357 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3358 ```
3359 OMA-URI:
3360 ```
3361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3362 ```
3363 Value (string):
3364 ```
3365 <enabled/>
3366
3367 <data id="StartPage" value="none | homepage | previous-session"/>
3368 ```
3369 #### macOS
3370 ```
3371 <dict>
3372 <key>Homepage</key>
3373 <dict>
3374 <key>URL</key>
3375 <string>http://example.com</string>
3376 <key>Locked</key>
3377 <true/> | <false/>
3378 <key>Additional</key>
3379 <array>
3380 <string>http://example.org</string>
3381 <string>http://example.edu</string>
3382 </array>
3383 <key>StartPage</key>
3384 <string>none | homepage | previous-session | homepage-locked</string>
3385 </dict>
3386 </dict>
3387 ```
3388 #### policies.json
3389 ```
3390 {
3391 "policies": {
3392 "Homepage": {
3393 "URL": "http://example.com/",
3394 "Locked": true | false,
3395 "Additional": ["http://example.org/",
3396 "http://example.edu/"],
3397 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3398 }
3399 }
3400 }
3401 ```
3402 ### InstallAddonsPermission
3403 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3404
3405 `Allow` is a list of origins where extension installs are allowed.
3406
3407 `Default` determines whether or not extension installs are allowed by default.
3408
3409 **Compatibility:** Firefox 60, Firefox ESR 60\
3410 **CCK2 Equivalent:** `permissions.install`\
3411 **Preferences Affected:** `xpinstall.enabled`
3412
3413 #### Windows (GPO)
3414 ```
3415 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3416 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3417 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3418 ```
3419 #### Windows (Intune)
3420 OMA-URI:
3421 ```
3422 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3423 ```
3424 Value (string):
3425 ```
3426 <enabled/>
3427 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3428 ```
3429 OMA-URI:
3430 ```
3431 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3432 ```
3433 Value (string):
3434 ```
3435 <enabled/>
3436 ```
3437 #### macOS
3438 ```
3439 <dict>
3440 <key>InstallAddonsPermission</key>
3441 <dict>
3442 <key>Allow</key>
3443 <array>
3444 <string>http://example.org</string>
3445 <string>http://example.edu</string>
3446 </array>
3447 <key>Default</key>
3448 <true/> | <false/>
3449 </dict>
3450 </dict>
3451 ```
3452 #### policies.json
3453 ```
3454 {
3455 "policies": {
3456 "InstallAddonsPermission": {
3457 "Allow": ["http://example.org/",
3458 "http://example.edu/"],
3459 "Default": true | false
3460 }
3461 }
3462 }
3463 ```
3464 ### LegacyProfiles
3465 Disable the feature enforcing a separate profile for each installation.
3466
3467 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3468
3469 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3470
3471 This policy only work on Windows via GPO (not policies.json).
3472
3473 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3474 **CCK2 Equivalent:** N/A\
3475 **Preferences Affected:** N/A
3476
3477 #### Windows (GPO)
3478 ```
3479 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3480 ```
3481 #### Windows (Intune)
3482 OMA-URI:
3483 ```
3484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3485 ```
3486 Value (string):
3487 ```
3488 <enabled/> or <disabled/>
3489 ```
3490 ### LegacySameSiteCookieBehaviorEnabled
3491 Enable default legacy SameSite cookie behavior setting.
3492
3493 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3494
3495 **Compatibility:** Firefox 96\
3496 **CCK2 Equivalent:** N/A\
3497 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3498
3499 #### Windows (GPO)
3500 ```
3501 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3502 ```
3503 #### Windows (Intune)
3504 OMA-URI:
3505 ```
3506 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3507 ```
3508 Value (string):
3509 ```
3510 <enabled/> or <disabled/>
3511 ```
3512 #### macOS
3513 ```
3514 <dict>
3515 <key>LegacySameSiteCookieBehaviorEnabled</key>
3516 <true/> | <false/>
3517 </dict>
3518 ```
3519 #### policies.json
3520 ```
3521 {
3522 "policies": {
3523 "LegacySameSiteCookieBehaviorEnabled": true | false
3524 }
3525 ```
3526 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3527 Revert to legacy SameSite behavior for cookies on specified sites.
3528
3529 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3530
3531 **Compatibility:** Firefox 96\
3532 **CCK2 Equivalent:** N/A\
3533 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3534
3535 #### Windows (GPO)
3536 ```
3537 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3538 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3539 ```
3540 #### Windows (Intune)
3541 OMA-URI:
3542 ```
3543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3544 ```
3545 Value (string):
3546 ```
3547 <enabled/>
3548 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3549 ```
3550 #### macOS
3551 ```
3552 <dict>
3553 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3554 <array>
3555 <string>example.org</string>
3556 <string>example.edu</string>
3557 </array>
3558 </dict>
3559 ```
3560 #### policies.json
3561 ```
3562 {
3563 "policies": {
3564 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3565 "example.edu"]
3566 }
3567 }
3568 ```
3569 ### LocalFileLinks
3570 Enable linking to local files by origin.
3571
3572 **Compatibility:** Firefox 68, Firefox ESR 68\
3573 **CCK2 Equivalent:** N/A\
3574 **Preferences Affected:** `capability.policy.localfilelinks.*`
3575
3576 #### Windows (GPO)
3577 ```
3578 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3579 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3580 ```
3581 #### Windows (Intune)
3582 OMA-URI:
3583 ```
3584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3585 ```
3586 Value (string):
3587 ```
3588 <enabled/>
3589 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3590 ```
3591 #### macOS
3592 ```
3593 <dict>
3594 <key>LocalFileLinks</key>
3595 <array>
3596 <string>http://example.org</string>
3597 <string>http://example.edu</string>
3598 </array>
3599 </dict>
3600 ```
3601 #### policies.json
3602 ```
3603 {
3604 "policies": {
3605 "LocalFileLinks": ["http://example.org/",
3606 "http://example.edu/"]
3607 }
3608 }
3609 ```
3610 ### ManagedBookmarks
3611 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3612
3613 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3614
3615 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3616 ```
3617 {
3618 "items": {
3619 "id": "BookmarkType",
3620 "properties": {
3621 "children": {
3622 "items": {
3623 "$ref": "BookmarkType"
3624 },
3625 "type": "array"
3626 },
3627 "name": {
3628 "type": "string"
3629 },
3630 "toplevel_name": {
3631 "type": "string"
3632 },
3633 "url": {
3634 "type": "string"
3635 }
3636 },
3637 "type": "object"
3638 },
3639 "type": "array"
3640 }
3641 ```
3642 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3643 **CCK2 Equivalent:** N/A\
3644 **Preferences Affected:** N/A
3645
3646 #### Windows (GPO)
3647 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3648 ```
3649 [
3650 {
3651 "toplevel_name": "My managed bookmarks folder"
3652 },
3653 {
3654 "url": "example.com",
3655 "name": "Example"
3656 },
3657 {
3658 "name": "Mozilla links",
3659 "children": [
3660 {
3661 "url": "https://mozilla.org",
3662 "name": "Mozilla.org"
3663 },
3664 {
3665 "url": "https://support.mozilla.org/",
3666 "name": "SUMO"
3667 }
3668 ]
3669 }
3670 ]
3671 ```
3672 #### Windows (Intune)
3673 OMA-URI:
3674 ```
3675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3676 ```
3677 Value (string):
3678 ```
3679 <enabled/>
3680 <data id="JSON" value='
3681 [
3682 {
3683 "toplevel_name": "My managed bookmarks folder"
3684 },
3685 {
3686 "url": "example.com",
3687 "name": "Example"
3688 },
3689 {
3690 "name": "Mozilla links",
3691 "children": [
3692 {
3693 "url": "https://mozilla.org",
3694 "name": "Mozilla.org"
3695 },
3696 {
3697 "url": "https://support.mozilla.org/",
3698 "name": "SUMO"
3699 }
3700 ]
3701 }
3702 ]'/>
3703 ```
3704 #### macOS
3705 ```
3706 <dict>
3707 <key>ManagedBookmarks</key>
3708 <array>
3709 <dict>
3710 <key>toplevel_name</key>
3711 <string>My managed bookmarks folder</string>
3712 <dict>
3713 <key>url</key>
3714 <string>example.com</string>
3715 <key>name</key>
3716 <string>Example</string>
3717 </dict>
3718 <dict>
3719 <key>name</key>
3720 <string>Mozilla links</string>
3721 <key>children</key>
3722 <array>
3723 <dict>
3724 <key>url</key>
3725 <string>https://mozilla.org</string>
3726 <key>name</key>
3727 <string>Mozilla</string>
3728 </dict>
3729 <dict>
3730 <key>url</key>
3731 <string>https://support.mozilla.org/</string>
3732 <key>name</key>
3733 <string>SUMO</string>
3734 </dict>
3735 </array>
3736 </dict>
3737 </array>
3738 </dict>
3739 ```
3740 #### policies.json
3741 ```
3742 {
3743 "policies": {
3744 "ManagedBookmarks": [
3745 {
3746 "toplevel_name": "My managed bookmarks folder"
3747 },
3748 {
3749 "url": "example.com",
3750 "name": "Example"
3751 },
3752 {
3753 "name": "Mozilla links",
3754 "children": [
3755 {
3756 "url": "https://mozilla.org",
3757 "name": "Mozilla.org"
3758 },
3759 {
3760 "url": "https://support.mozilla.org/",
3761 "name": "SUMO"
3762 }
3763 ]
3764 }
3765 ]
3766 }
3767 }
3768 ```
3769 ### ManualAppUpdateOnly
3770
3771 Switch to manual updates only.
3772
3773 If this policy is enabled:
3774 1. The user will never be prompted to install updates
3775 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3776 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3777
3778 This policy is primarily intended for advanced end users, not for enterprises.
3779
3780 **Compatibility:** Firefox 87\
3781 **CCK2 Equivalent:** N/A\
3782 **Preferences Affected:** N/A
3783
3784 #### policies.json
3785 ```
3786 {
3787 "policies": {
3788 "ManualAppUpdateOnly": true | false
3789 }
3790 }
3791 ```
3792 ### NetworkPrediction
3793 Enable or disable network prediction (DNS prefetching).
3794
3795 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3796 **CCK2 Equivalent:** N/A\
3797 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3798
3799 #### Windows (GPO)
3800 ```
3801 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3802 ```
3803 #### Windows (Intune)
3804 OMA-URI:
3805 ```
3806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3807 ```
3808 Value (string):
3809 ```
3810 <enabled/> or <disabled/>
3811 ```
3812 #### macOS
3813 ```
3814 <dict>
3815 <key>NetworkPrediction</key>
3816 <true/> | <false/>
3817 </dict>
3818 ```
3819 #### policies.json
3820 ```
3821 {
3822 "policies": {
3823 "NetworkPrediction": true | false
3824 }
3825 ```
3826 ### NewTabPage
3827 Enable or disable the New Tab page.
3828
3829 **Compatibility:** Firefox 68, Firefox ESR 68\
3830 **CCK2 Equivalent:** N/A\
3831 **Preferences Affected:** `browser.newtabpage.enabled`
3832
3833 #### Windows (GPO)
3834 ```
3835 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3836 ```
3837 #### Windows (Intune)
3838 OMA-URI:
3839 ```
3840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3841 ```
3842 Value (string):
3843 ```
3844 <enabled/> or <disabled/>
3845 ```
3846 #### macOS
3847 ```
3848 <dict>
3849 <key>NewTabPage</key>
3850 <true/> | <false/>
3851 </dict>
3852 ```
3853 #### policies.json
3854 ```
3855 {
3856 "policies": {
3857 "NewTabPage": true | false
3858 }
3859 ```
3860 ### NoDefaultBookmarks
3861 Disable the creation of default bookmarks.
3862
3863 This policy is only effective if the user profile has not been created yet.
3864
3865 **Compatibility:** Firefox 60, Firefox ESR 60\
3866 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3867 **Preferences Affected:** N/A
3868
3869 #### Windows (GPO)
3870 ```
3871 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3872 ```
3873 #### Windows (Intune)
3874 OMA-URI:
3875 ```
3876 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3877 ```
3878 Value (string):
3879 ```
3880 <enabled/> or <disabled/>
3881 ```
3882 #### macOS
3883 ```
3884 <dict>
3885 <key>NoDefaultBookmarks</key>
3886 <true/> | <false/>
3887 </dict>
3888 ```
3889 #### policies.json
3890 ```
3891 {
3892 "policies": {
3893 "NoDefaultBookmarks": true | false
3894 }
3895 }
3896 ```
3897 ### OfferToSaveLogins
3898 Control whether or not Firefox offers to save passwords.
3899
3900 **Compatibility:** Firefox 60, Firefox ESR 60\
3901 **CCK2 Equivalent:** `dontRememberPasswords`\
3902 **Preferences Affected:** `signon.rememberSignons`
3903
3904 #### Windows (GPO)
3905 ```
3906 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3907 ```
3908 #### Windows (Intune)
3909 OMA-URI:
3910 ```
3911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3912 ```
3913 Value (string):
3914 ```
3915 <enabled/> or <disabled/>
3916 ```
3917 #### macOS
3918 ```
3919 <dict>
3920 <key>OfferToSaveLogins</key>
3921 <true/> | <false/>
3922 </dict>
3923 ```
3924 #### policies.json
3925 ```
3926 {
3927 "policies": {
3928 "OfferToSaveLogins": true | false
3929 }
3930 }
3931 ```
3932 ### OfferToSaveLoginsDefault
3933 Sets the default value of signon.rememberSignons without locking it.
3934
3935 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3936 **CCK2 Equivalent:** `dontRememberPasswords`\
3937 **Preferences Affected:** `signon.rememberSignons`
3938
3939 #### Windows (GPO)
3940 ```
3941 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3942 ```
3943 #### Windows (Intune)
3944 OMA-URI:
3945 ```
3946 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3947 ```
3948 Value (string):
3949 ```
3950 <enabled/> or <disabled/>
3951 ```
3952 #### macOS
3953 ```
3954 <dict>
3955 <key>OfferToSaveLoginsDefault</key>
3956 <true/> | <false/>
3957 </dict>
3958 ```
3959 #### policies.json
3960 ```
3961 {
3962 "policies": {
3963 "OfferToSaveLoginsDefault": true | false
3964 }
3965 }
3966 ```
3967 ### OverrideFirstRunPage
3968 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3969
3970 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3971
3972 **Compatibility:** Firefox 60, Firefox ESR 60\
3973 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3974 **Preferences Affected:** `startup.homepage_welcome_url`
3975
3976 #### Windows (GPO)
3977 ```
3978 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3979 ```
3980 #### Windows (Intune)
3981 OMA-URI:
3982 ```
3983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3984 ```
3985 Value (string):
3986 ```
3987 <enabled/>
3988 <data id="OverridePage" value="https://example.com"/>
3989 ```
3990 #### macOS
3991 ```
3992 <dict>
3993 <key>OverrideFirstRunPage</key>
3994 <string>http://example.org</string>
3995 </dict>
3996 ```
3997 #### policies.json
3998 ```
3999 {
4000 "policies": {
4001 "OverrideFirstRunPage": "http://example.org"
4002 }
4003 }
4004 ```
4005 ### OverridePostUpdatePage
4006 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
4007
4008 **Compatibility:** Firefox 60, Firefox ESR 60\
4009 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4010 **Preferences Affected:** `startup.homepage_override_url`
4011
4012 #### Windows (GPO)
4013 ```
4014 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4015 ```
4016 #### Windows (Intune)
4017 OMA-URI:
4018 ```
4019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4020 ```
4021 Value (string):
4022 ```
4023 <enabled/>
4024 <data id="OverridePage" value="https://example.com"/>
4025 ```
4026 #### macOS
4027 ```
4028 <dict>
4029 <key>OverridePostUpdatePage</key>
4030 <string>http://example.org</string>
4031 </dict>
4032 ```
4033 #### policies.json
4034 ```
4035 {
4036 "policies": {
4037 "OverridePostUpdatePage": "http://example.org"
4038 }
4039 }
4040 ```
4041 ### PasswordManagerEnabled
4042 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4043
4044 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4045 **CCK2 Equivalent:** N/A\
4046 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4047
4048 #### Windows (GPO)
4049 ```
4050 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4051 ```
4052 #### Windows (Intune)
4053 OMA-URI:
4054 ```
4055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4056 ```
4057 Value (string):
4058 ```
4059 <enabled/> or <disabled/>
4060 ```
4061 #### macOS
4062 ```
4063 <dict>
4064 <key>PasswordManagerEnabled</key>
4065 <true/> | <false/>
4066 </dict>
4067 ```
4068 #### policies.json
4069 ```
4070 {
4071 "policies": {
4072 "PasswordManagerEnabled": true | false
4073 }
4074 }
4075 ```
4076 ### PasswordManagerExceptions
4077 Prevent Firefox from saving passwords for specific sites.
4078
4079 The sites are specified as a list of origins.
4080
4081 **Compatibility:** Firefox 101\
4082 **CCK2 Equivalent:** N/A\
4083 **Preferences Affected:** N/A
4084
4085 #### Windows (GPO)
4086 ```
4087 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4088 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4089 ```
4090 #### Windows (Intune)
4091 OMA-URI:
4092 ```
4093 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4094 ```
4095 Value (string):
4096 ```
4097 <enabled/>
4098 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4099 ```
4100 #### macOS
4101 ```
4102 <dict>
4103 <key>PasswordManagerExceptions</key>
4104 <array>
4105 <string>https://example.org</string>
4106 <string>https://example.edu</string>
4107 </array>
4108 </dict>
4109 ```
4110 #### policies.json
4111 ```
4112 {
4113 "policies": {
4114 "PasswordManagerExceptions": ["https://example.org",
4115 "https://example.edu"]
4116 }
4117 }
4118 ```
4119
4120 ### PDFjs
4121 Disable or configure PDF.js, the built-in PDF viewer.
4122
4123 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4124
4125 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4126
4127 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4128
4129 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4130 **CCK2 Equivalent:** N/A\
4131 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
4132
4133 #### Windows (GPO)
4134 ```
4135 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4136 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4137 ```
4138 #### Windows (Intune)
4139 OMA-URI:
4140 ```
4141 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4143 ```
4144 Value (string):
4145 ```
4146 <enabled/>or <disabled/>
4147 ```
4148 #### macOS
4149 ```
4150 <dict>
4151 <key>PDFjs</key>
4152 <dict>
4153 <key>Enabled</key>
4154 <true/> | <false/>
4155 <key>EnablePermissions</key>
4156 <true/> | <false/>
4157 </dict>
4158 </dict>
4159 ```
4160 #### policies.json
4161 ```
4162 {
4163 "policies": {
4164 "PDFjs": {
4165 "Enabled": true | false,
4166 "EnablePermissions": true | false
4167 }
4168 }
4169 }
4170 ```
4171 ### Permissions
4172 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4173
4174 `Allow` is a list of origins where the feature is allowed.
4175
4176 `Block` is a list of origins where the feature is not allowed.
4177
4178 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4179
4180 `Locked` prevents the user from changing preferences for the feature.
4181
4182 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4183
4184 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4185 **CCK2 Equivalent:** N/A\
4186 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4187
4188 #### Windows (GPO)
4189 ```
4190 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4191 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4192 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4193 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4194 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4195 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4196 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4197 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4198 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4199 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4200 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4201 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4202 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4203 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4204 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4205 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4206 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4207 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4208 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4209 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4210 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4211 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4212 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4213 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4214 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4215 ```
4216 #### Windows (Intune)
4217 OMA-URI:
4218 ```
4219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4220 ```
4221 Value (string):
4222 ```
4223 <enabled/> or <disabled/>
4224 ```
4225 OMA-URI:
4226 ```
4227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4228 ```
4229 Value (string):
4230 ```
4231 <enabled/> or <disabled/>
4232 ```
4233 OMA-URI:
4234 ```
4235 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4236 ```
4237 Value (string):
4238 ```
4239 <enabled/>
4240 <data id="Permissions" value="1&#xF000;https://example.org"/>
4241 ```
4242 OMA-URI:
4243 ```
4244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4245 ```
4246 Value (string):
4247 ```
4248 <enabled/> or <disabled/>
4249 ```
4250 OMA-URI:
4251 ```
4252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4253 ```
4254 Value (string):
4255 ```
4256 <enabled/> or <disabled/>
4257 ```
4258 OMA-URI:
4259 ```
4260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4261 ```
4262 Value (string):
4263 ```
4264 <enabled/>
4265 <data id="Permissions" value="1&#xF000;https://example.org"/>
4266 ```
4267 OMA-URI:
4268 ```
4269 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4270 ```
4271 Value (string):
4272 ```
4273 <enabled/>
4274 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4275 ```
4276 OMA-URI:
4277 ```
4278 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4279 ```
4280 Value (string):
4281 ```
4282 <enabled/>
4283 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4284 ```
4285 OMA-URI:
4286 ```
4287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4288 ```
4289 Value (string):
4290 ```
4291 <enabled/> or <disabled/>
4292 ```
4293 OMA-URI:
4294 ```
4295 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4296 ```
4297 Value (string):
4298 ```
4299 <enabled/>
4300 <data id="Permissions" value="1&#xF000;https://example.org"/>
4301 ```
4302 OMA-URI:
4303 ```
4304 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4305 ```
4306 Value (string):
4307 ```
4308 <enabled/>
4309 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4310 ```
4311 OMA-URI:
4312 ```
4313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4314 ```
4315 Value (string):
4316 ```
4317 <enabled/> or <disabled/>
4318 ```
4319 OMA-URI:
4320 ```
4321 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4322 ```
4323 Value (string):
4324 ```
4325 <enabled/> or <disabled/>
4326 ```
4327 #### macOS
4328 ```
4329 <dict>
4330 <key>Permissions</key>
4331 <dict>
4332 <key>Camera</key>
4333 <dict>
4334 <key>Allow</key>
4335 <array>
4336 <string>https://example.org</string>
4337 <string>https://example.org:1234</string>
4338 </array>
4339 <key>Block</key>
4340 <array>
4341 <string>https://example.edu</string>
4342 </array>
4343 <key>BlockNewRequests</key>
4344 <true/> | <false/>
4345 <key>Locked</key>
4346 <true/> | <false/>
4347 </dict>
4348 <key>Microphone</key>
4349 <dict>
4350 <key>Allow</key>
4351 <array>
4352 <string>https://example.org</string>
4353 </array>
4354 <key>Block</key>
4355 <array>
4356 <string>https://example.edu</string>
4357 </array>
4358 <key>BlockNewRequests</key>
4359 <true/> | <false/>
4360 <key>Locked</key>
4361 <true/> | <false/>
4362 </dict>
4363 <key>Location</key>
4364 <dict>
4365 <key>Allow</key>
4366 <array>
4367 <string>https://example.org</string>
4368 </array>
4369 <key>Block</key>
4370 <array>
4371 <string>https://example.edu</string>
4372 </array>
4373 <key>BlockNewRequests</key>
4374 <true/> | <false/>
4375 <key>Locked</key>
4376 <true/> | <false/>
4377 </dict>
4378 <key>Notifications</key>
4379 <dict>
4380 <key>Allow</key>
4381 <array>
4382 <string>https://example.org</string>
4383 </array>
4384 <key>Block</key>
4385 <array>
4386 <string>https://example.edu</string>
4387 </array>
4388 <key>BlockNewRequests</key>
4389 <true/>
4390 <key>Locked</key>
4391 <true/>
4392 </dict>
4393 <key>Autoplay</key>
4394 <dict>
4395 <key>Allow</key>
4396 <array>
4397 <string>https://example.org</string>
4398 </array>
4399 <key>Block</key>
4400 <array>
4401 <string>https://example.edu</string>
4402 </array>
4403 <key>Default</key>
4404 <string>allow-audio-video | block-audio | block-audio-video</string>
4405 <key>Locked</key>
4406 <true/> | <false/>
4407 </dict>
4408 </dict>
4409 </dict>
4410 ```
4411 #### policies.json
4412 ```
4413 {
4414 "policies": {
4415 "Permissions": {
4416 "Camera": {
4417 "Allow": ["https://example.org","https://example.org:1234"],
4418 "Block": ["https://example.edu"],
4419 "BlockNewRequests": true | false,
4420 "Locked": true | false
4421 },
4422 "Microphone": {
4423 "Allow": ["https://example.org"],
4424 "Block": ["https://example.edu"],
4425 "BlockNewRequests": true | false,
4426 "Locked": true | false
4427 },
4428 "Location": {
4429 "Allow": ["https://example.org"],
4430 "Block": ["https://example.edu"],
4431 "BlockNewRequests": true | false,
4432 "Locked": true | false
4433 },
4434 "Notifications": {
4435 "Allow": ["https://example.org"],
4436 "Block": ["https://example.edu"],
4437 "BlockNewRequests": true | false,
4438 "Locked": true | false
4439 },
4440 "Autoplay": {
4441 "Allow": ["https://example.org"],
4442 "Block": ["https://example.edu"],
4443 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4444 "Locked": true | false
4445 }
4446 }
4447 }
4448 }
4449 ```
4450 ### PictureInPicture
4451
4452 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4453
4454 **Compatibility:** Firefox 78, Firefox ESR 78\
4455 **CCK2 Equivalent:** N/A\
4456 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4457
4458 #### Windows (GPO)
4459 ```
4460 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4461 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4462
4463 ```
4464 #### Windows (Intune)
4465 OMA-URI:
4466 ```
4467 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4468 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4469 ```
4470 Value (string):
4471 ```
4472 <enabled/> or <disabled/>
4473 ```
4474 #### macOS
4475 ```
4476 <dict>
4477 <key>PictureInPicture</key>
4478 <dict>
4479 <key>Enabled</key>
4480 <true/> | <false/>
4481 <key>Locked</key>
4482 <true/> | <false/>
4483 </dict>
4484 </dict>
4485 ```
4486 #### policies.json
4487 ```
4488 {
4489 "policies": {
4490 "PictureInPicture": {
4491 "Enabled": true | false,
4492 "Locked": true | false
4493 }
4494 }
4495 }
4496 ```
4497 ### PopupBlocking
4498 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4499
4500 `Allow` is a list of origins where popup-windows are allowed.
4501
4502 `Default` determines whether or not pop-up windows are allowed by default.
4503
4504 `Locked` prevents the user from changing pop-up preferences.
4505
4506 **Compatibility:** Firefox 60, Firefox ESR 60\
4507 **CCK2 Equivalent:** `permissions.popup`\
4508 **Preferences Affected:** `dom.disable_open_during_load`
4509
4510 #### Windows (GPO)
4511 ```
4512 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4513 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4514 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4515 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4516 ```
4517 #### Windows (Intune)
4518 OMA-URI:
4519 ```
4520 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4521 ```
4522 Value (string):
4523 ```
4524 <enabled/>
4525 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4526 ```
4527 OMA-URI:
4528 ```
4529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4530 ```
4531 Value (string):
4532 ```
4533 <enabled/> or <disabled/>
4534 ```
4535 OMA-URI:
4536 ```
4537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4538 ```
4539 Value (string):
4540 ```
4541 <enabled/> or <disabled/>
4542 ```
4543 #### macOS
4544 ```
4545 <dict>
4546 <key>PopupBlocking</key>
4547 <dict>
4548 <key>Allow</key>
4549 <array>
4550 <string>http://example.org</string>
4551 <string>http://example.edu</string>
4552 </array>
4553 <key>Default</key>
4554 <true/> | <false/>
4555 <key>Locked</key>
4556 <true/> | <false/>
4557 </dict>
4558 </dict>
4559 ```
4560 #### policies.json
4561 ```
4562 {
4563 "policies": {
4564 "PopupBlocking": {
4565 "Allow": ["http://example.org/",
4566 "http://example.edu/"],
4567 "Default": true | false,
4568 "Locked": true | false
4569 }
4570 }
4571 }
4572 ```
4573 ### Preferences
4574 Set and lock preferences.
4575
4576 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4577
4578 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4579
4580 Preferences that start with the following prefixes are supported:
4581 ```
4582 accessibility.
4583 app.update.* (Firefox 86, Firefox 78.8)
4584 browser.
4585 datareporting.policy.
4586 dom.
4587 extensions.
4588 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4589 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4590 geo.
4591 gfx.
4592 intl.
4593 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4594 layers.
4595 layout.
4596 media.
4597 network.
4598 pdfjs. (Firefox 84, Firefox ESR 78.6)
4599 places.
4600 print.
4601 signon. (Firefox 83, Firefox ESR 78.5)
4602 spellchecker. (Firefox 84, Firefox ESR 78.6)
4603 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4604 ui.
4605 widget.
4606 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4607 ```
4608 as well as the following security preferences:
4609
4610 | Preference | Type | Default
4611 | --- | --- | --- |
4612 | security.default_personal_cert | string | Ask Every Time
4613 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4614 | security.insecure_connection_text.enabled | bool | false
4615 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4616 | security.insecure_connection_text.pbmode.enabled | bool | false
4617 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4618 | security.mixed_content.block_active_content | boolean | true
4619 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4620 | security.osclientcerts.autoload | boolean | false
4621 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4622 | security.OCSP.enabled | integer | 1
4623 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates
4624 | security.OCSP.require | boolean | false
4625 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4626 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4627 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS (Firefox 114, Firefox ESR 102.12).
4628 | security.ssl.enable_ocsp_stapling | boolean | true
4629 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4630 | security.ssl.errorReporting.enabled | boolean | true
4631 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4632 | security.tls.enable_0rtt_data | boolean | true
4633 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4634 | security.tls.hello_downgrade_check | boolean | true
4635 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4636 | security.tls.version.enable-deprecated | boolean | false
4637 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4638 | security.warn_submit_secure_to_insecure | boolean | true
4639 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4640
4641 Using the preference as the key, set the `Value` to the corresponding preference value.
4642
4643 `Status` can be "default", "locked", "user" or "clear"
4644
4645 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4646 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4647 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4648 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4649
4650 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4651
4652 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4653
4654 See the examples below for more detail.
4655
4656 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4657
4658 Status
4659 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4660 **CCK2 Equivalent:** `preferences`\
4661 **Preferences Affected:** Many
4662
4663 #### Windows (GPO)
4664 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4665 ```
4666 {
4667 "accessibility.force_disabled": {
4668 "Value": 1,
4669 "Status": "default"
4670 },
4671 "browser.cache.disk.parent_directory": {
4672 "Value": "SOME_NATIVE_PATH",
4673 "Status": "user"
4674 },
4675 "browser.tabs.warnOnClose": {
4676 "Value": false,
4677 "Status": "locked"
4678 }
4679 }
4680 ```
4681 #### Windows (Intune)
4682 OMA-URI:
4683 ```
4684 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4685 ```
4686 Value (string):
4687 ```
4688 <enabled/>
4689 <data id="JSON" value='
4690 {
4691 "accessibility.force_disabled": {
4692 "Value": 1,
4693 "Status": "default"
4694 },
4695 "browser.cache.disk.parent_directory": {
4696 "Value": "SOME_NATIVE_PATH",
4697 "Status": "user"
4698 },
4699 "browser.tabs.warnOnClose": {
4700 "Value": false,
4701 "Status": "locked"
4702 }
4703 }'/>
4704 ```
4705 #### macOS
4706 ```
4707 <dict>
4708 <key>Preferences</key>
4709 <dict>
4710 <key>accessibility.force_disabled</key>
4711 <dict>
4712 <key>Value</key>
4713 <integer>1</integer>
4714 <key>Status</key>
4715 <string>default</string>
4716 </dict>
4717 <key>browser.cache.disk.parent_directory</key>
4718 <dict>
4719 <key>Value</key>
4720 <string>SOME_NATIVE_PATH</string>
4721 <key>Status</key>
4722 <string>user</string>
4723 </dict>
4724 <key>browser.tabs.warnOnClose</key>
4725 <dict>
4726 <key>Value</key>
4727 <false/>
4728 <key>Status</key>
4729 <string>locked</string>
4730 </dict>
4731 </dict>
4732 </dict>
4733 ```
4734 #### policies.json
4735 ```
4736 {
4737 "policies": {
4738 "Preferences": {
4739 "accessibility.force_disabled": {
4740 "Value": 1,
4741 "Status": "default"
4742 },
4743 "browser.cache.disk.parent_directory": {
4744 "Value": "SOME_NATIVE_PATH",
4745 "Status": "user"
4746 },
4747 "browser.tabs.warnOnClose": {
4748 "Value": false,
4749 "Status": "locked"
4750 }
4751 }
4752 }
4753 }
4754 ```
4755 ### Preferences (Deprecated)
4756 Set and lock certain preferences.
4757
4758 **Compatibility:** See below\
4759 **CCK2 Equivalent:** `preferences`\
4760 **Preferences Affected:** See below
4761
4762 | Preference | Type | Compatibility | Default
4763 | --- | --- | --- | --- |
4764 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4765 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4766 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4767 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4768 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4769 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4770 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4771 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4772 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4773 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4774 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4775 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4776 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4777 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4778 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4779 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4780 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4781 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4782 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4783 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4784 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4785 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4786 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4787 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4788 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4789 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4790 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4791 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4792 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4793 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4794 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4795 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4796 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4797 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4798 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4799 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4800 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4801 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4802 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4803 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4804 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4805 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4806 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4807 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4808 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4809 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4810 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4811 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4812 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4813 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4814 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4815 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4816 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4817 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4818 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4819 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4820 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4821 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4822 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4823 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4824 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4825 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4826 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4827 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4828 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4829 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4830 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4831 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4832 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4833 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4834 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4835 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4836 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4837 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4838 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4839 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4840 disabled
4841 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4842 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4843 disabled
4844 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4845 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4846 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4847 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4848 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4849 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4850 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4851 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4852 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4853 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4854 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4855 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4856 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4857 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4858 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4859 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4860 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4861 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4862 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4863 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4864 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4865 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4866
4867 #### Windows (GPO)
4868 ```
4869 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4870 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4871 ```
4872 #### Windows (Intune)
4873 OMA-URI: (periods are replaced by underscores)
4874 ```
4875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4876 ```
4877 Value (string):
4878 ```
4879 <enabled/> or <disabled/>
4880 ```
4881 OMA-URI: (periods are replaced by underscores)
4882 ```
4883 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4884 ```
4885 Value (string):
4886 ```
4887 <enabled/>
4888 <data id="Preferences_String" value="string_value"/>
4889 ```
4890 #### macOS
4891 ```
4892 <dict>
4893 <key>Preferences</key>
4894 <dict>
4895 <key>boolean_preference_name</key>
4896 <true/> | <false/>
4897 <key>string_preference_name</key>
4898 <string>string_value</string>
4899 </dict>
4900 </dict>
4901 ```
4902 #### policies.json
4903 ```
4904 {
4905 "policies": {
4906 "Preferences": {
4907 "boolean_preference_name": true | false,
4908 "string_preference_name": "string_value"
4909 }
4910 }
4911 }
4912 ```
4913 ### PrimaryPassword
4914 Require or prevent using a primary (formerly master) password.
4915
4916 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4917
4918 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4919
4920 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4921 **CCK2 Equivalent:** `noMasterPassword`\
4922 **Preferences Affected:** N/A
4923
4924 #### Windows (GPO)
4925 ```
4926 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4927 ```
4928 #### Windows (Intune)
4929 OMA-URI:
4930 ```
4931 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4932 ```
4933 Value (string):
4934 ```
4935 <enabled/> or <disabled/>
4936 ```
4937 #### macOS
4938 ```
4939 <dict>
4940 <key>PrimaryPassword</key>
4941 <true/> | <false/>
4942 </dict>
4943 ```
4944 #### policies.json
4945 ```
4946 {
4947 "policies": {
4948 "PrimaryPassword": true | false
4949 }
4950 }
4951 ```
4952 ### PromptForDownloadLocation
4953 Ask where to save each file before downloading.
4954
4955 **Compatibility:** Firefox 68, Firefox ESR 68\
4956 **CCK2 Equivalent:** N/A\
4957 **Preferences Affected:** `browser.download.useDownloadDir`
4958
4959 #### Windows (GPO)
4960 ```
4961 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4962 ```
4963 #### Windows (Intune)
4964 OMA-URI:
4965 ```
4966 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4967 ```
4968 Value (string):
4969 ```
4970 <enabled/> or <disabled/>
4971 ```
4972 #### macOS
4973 ```
4974 <dict>
4975 <key>PromptForDownloadLocation</key>
4976 <true/> | <false/>
4977 </dict>
4978 ```
4979 #### policies.json
4980 ```
4981 {
4982 "policies": {
4983 "PromptForDownloadLocation": true | false
4984 }
4985 }
4986 ```
4987 ### Proxy
4988 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4989 To specify ports, append them to the hostnames with a colon (:).
4990
4991 Unless you lock this policy, changes the user already has in place will take effect.
4992
4993 `Mode` is the proxy method being used.
4994
4995 `Locked` is whether or not proxy settings can be changed.
4996
4997 `HTTPProxy` is the HTTP proxy server.
4998
4999 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
5000
5001 `SSLProxy` is the SSL proxy server.
5002
5003 `FTPProxy` is the FTP proxy server.
5004
5005 `SOCKSProxy` is the SOCKS proxy server
5006
5007 `SOCKSVersion` is the SOCKS version (4 or 5)
5008
5009 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
5010
5011 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
5012
5013 `AutoLogin` means do not prompt for authentication if password is saved.
5014
5015 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
5016
5017 **Compatibility:** Firefox 60, Firefox ESR 60\
5018 **CCK2 Equivalent:** `networkProxy*`\
5019 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
5020
5021 #### Windows (GPO)
5022 ```
5023 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
5024 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
5025 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
5026 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
5027 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
5028 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
5029 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
5030 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
5031 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
5032 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
5033 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
5034 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
5035 ```
5036 #### Windows (Intune)
5037 **Note**
5038 These setttings were moved to a category to make them easier to configure via Intune.
5039
5040 OMA-URI:
5041 ```
5042 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
5043 ```
5044 Value (string):
5045 ```
5046 <enabled/> or <disabled/>
5047 ```
5048 OMA-URI:
5049 ```
5050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
5051 ```
5052 Value (string):
5053 ```
5054 <enabled/>
5055 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5056 ```
5057 OMA-URI:
5058 ```
5059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5060 ```
5061 Value (string):
5062 ```
5063 <enabled/>
5064 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5065 ```
5066 OMA-URI:
5067 ```
5068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5069 ```
5070 Value (string):
5071 ```
5072 <enabled/> or <disabled/>
5073 ```
5074 OMA-URI:
5075 ```
5076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5077 ```
5078 Value (string):
5079 ```
5080 <enabled/>
5081 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5082 ```
5083 OMA-URI:
5084 ```
5085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5086 ```
5087 Value (string):
5088 ```
5089 <enabled/>
5090 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5091 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5092 ```
5093 OMA-URI:
5094 ```
5095 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5096 ```
5097 Value (string):
5098 ```
5099 <enabled/>
5100 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5101 ```
5102 OMA-URI:
5103 ```
5104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5105 ```
5106 Value (string):
5107 ```
5108 <enabled/>
5109 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5110 ```
5111 OMA-URI:
5112 ```
5113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5114 ```
5115 Value (string):
5116 ```
5117 <enabled/> or <disabled/>
5118 ```
5119 OMA-URI:
5120 ```
5121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5122 ```
5123 Value (string):
5124 ```
5125 <enabled/> or <disabled/>
5126 ```
5127 OMA-URI (Old way):
5128 ```
5129 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5130 ```
5131 Value (string):
5132 ```
5133 <enabled/>
5134 <data id="ProxyLocked" value="true | false"/>
5135 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5136 <data id="HTTPProxy" value="httpproxy.example.com"/>
5137 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5138 <data id="SSLProxy" value="sslproxy.example.com"/>
5139 <data id="FTPProxy" value="ftpproxy.example.com"/>
5140 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5141 <data id="SOCKSVersion" value="4 | 5"/>
5142 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5143 <data id="Passthrough" value="<local>"/>
5144 <data id="AutoLogin" value="true | false"/>
5145 <data id="UseProxyForDNS" value="true | false"/>
5146 ```
5147 #### macOS
5148 ```
5149 <dict>
5150 <key>Proxy</key>
5151 <dict>
5152 <key>Mode</key>
5153 <string>none | system | manual | autoDetect | autoConfig</string>
5154 <key>Locked</key>
5155 <true> | </false>
5156 <key>HTTPProxy</key>
5157 <string>https://httpproxy.example.com</string>
5158 <key>UseHTTPProxyForAllProtocols</key>
5159 <true> | </false>
5160 <key>SSLProxy</key>
5161 <string>https://sslproxy.example.com</string>
5162 <key>FTPProxy</key>
5163 <string>https://ftpproxy.example.com</string>
5164 <key>SOCKSProxy</key>
5165 <string>https://socksproxy.example.com</string>
5166 <key>SOCKSVersion</key>
5167 <string>4 | 5</string>
5168 <key>Passthrough</key>
5169 <string>&lt;local>&gt;</string>
5170 <key>AutoConfigURL</key>
5171 <string>URL_TO_AUTOCONFIG</string>
5172 <key>AutoLogin</key>
5173 <true> | </false>
5174 <key>UseProxyForDNS</key>
5175 <true> | </false>
5176 </dict>
5177 </dict>
5178 ```
5179 #### policies.json
5180 ```
5181 {
5182 "policies": {
5183 "Proxy": {
5184 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5185 "Locked": true | false,
5186 "HTTPProxy": "hostname",
5187 "UseHTTPProxyForAllProtocols": true | false,
5188 "SSLProxy": "hostname",
5189 "FTPProxy": "hostname",
5190 "SOCKSProxy": "hostname",
5191 "SOCKSVersion": 4 | 5,
5192 "Passthrough": "<local>",
5193 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5194 "AutoLogin": true | false,
5195 "UseProxyForDNS": true | false
5196 }
5197 }
5198 }
5199 ```
5200 ### RequestedLocales
5201 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5202
5203 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5204
5205 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5206 **CCK2 Equivalent:** N/A\
5207 **Preferences Affected:** N/A
5208 #### Windows (GPO)
5209 ```
5210 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5211 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5212
5213 or
5214
5215 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5216 ```
5217 #### Windows (Intune)
5218 OMA-URI:
5219 ```
5220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5221 ```
5222 Value (string):
5223 ```
5224 <enabled/>
5225 <data id="Preferences_String" value="de,en-US"/>
5226 ```
5227 #### macOS
5228 ```
5229 <dict>
5230 <key>RequestedLocales</key>
5231 <array>
5232 <string>de</string>
5233 <string>en-US</string>
5234 </array>
5235 </dict>
5236
5237 or
5238
5239 <dict>
5240 <key>RequestedLocales</key>
5241 <string>de,en-US</string>
5242 </dict>
5243
5244 ```
5245 #### policies.json
5246 ```
5247 {
5248 "policies": {
5249 "RequestedLocales": ["de", "en-US"]
5250 }
5251 }
5252
5253 or
5254
5255 {
5256 "policies": {
5257 "RequestedLocales": "de,en-US"
5258 }
5259 }
5260 ```
5261 <a name="SanitizeOnShutdown"></a>
5262
5263 ### SanitizeOnShutdown (Selective)
5264 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5265
5266 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5267
5268 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5269 **CCK2 Equivalent:** N/A\
5270 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5271 #### Windows (GPO)
5272 ```
5273 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5274 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5275 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5276 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5277 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5278 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5279 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5280 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5281 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5282 ```
5283 #### Windows (Intune)
5284 OMA-URI:
5285 ```
5286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5287 ```
5288 Value (string):
5289 ```
5290 <enabled/> or <disabled/>
5291 ```
5292 OMA-URI:
5293 ```
5294 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5295 ```
5296 Value (string):
5297 ```
5298 <enabled/> or <disabled/>
5299 ```
5300 OMA-URI:
5301 ```
5302 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5303 ```
5304 Value (string):
5305 ```
5306 <enabled/> or <disabled/>
5307 ```
5308 OMA-URI:
5309 ```
5310 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5311 ```
5312 Value (string):
5313 ```
5314 <enabled/> or <disabled/>
5315 ```
5316 OMA-URI:
5317 ```
5318 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5319 ```
5320 Value (string):
5321 ```
5322 <enabled/> or <disabled/>
5323 ```
5324 OMA-URI:
5325 ```
5326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5327 ```
5328 Value (string):
5329 ```
5330 <enabled/> or <disabled/>
5331 ```
5332 OMA-URI:
5333 ```
5334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5335 ```
5336 Value (string):
5337 ```
5338 <enabled/> or <disabled/>
5339 ```
5340 OMA-URI:
5341 ```
5342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5343 ```
5344 Value (string):
5345 ```
5346 <enabled/> or <disabled/>
5347 ```
5348 OMA-URI:
5349 ```
5350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5351 ```
5352 Value (string):
5353 ```
5354 <enabled/> or <disabled/>
5355 ```
5356 #### macOS
5357 ```
5358 <dict>
5359 <key>SanitizeOnShutdown</key>
5360 <dict>
5361 <key>Cache</key>
5362 <true/> | <false/>
5363 <key>Cookies</key>
5364 <true/> | <false/>
5365 <key>Downloads</key>
5366 <true/> | <false/>
5367 <key>FormData</key>
5368 <true/> | <false/>
5369 <key>History</key>
5370 <true/> | <false/>
5371 <key>Sessions</key>
5372 <true/> | <false/>
5373 <key>SiteSettings</key>
5374 <true/> | <false/>
5375 <key>OfflineApps</key>
5376 <true/> | <false/>
5377 <key>Locked</key>
5378 <true/> | <false/>
5379 </dict>
5380 </dict>
5381 ```
5382 #### policies.json
5383 ```
5384 {
5385 "policies": {
5386 "SanitizeOnShutdown": {
5387 "Cache": true | false,
5388 "Cookies": true | false,
5389 "Downloads": true | false,
5390 "FormData": true | false,
5391 "History": true | false,
5392 "Sessions": true | false,
5393 "SiteSettings": true | false,
5394 "OfflineApps": true | false,
5395 "Locked": true | false
5396 }
5397 }
5398 }
5399 ```
5400 ### SanitizeOnShutdown (All)
5401 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5402
5403 **Compatibility:** Firefox 60, Firefox ESR 60\
5404 **CCK2 Equivalent:** N/A\
5405 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5406 #### Windows (GPO)
5407 ```
5408 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5409 ```
5410 #### Windows (Intune)
5411 OMA-URI:
5412 ```
5413 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5414 ```
5415 Value (string):
5416 ```
5417 <enabled/> or <disabled/>
5418 ```
5419 #### macOS
5420 ```
5421 <dict>
5422 <key>SanitizeOnShutdown</key>
5423 <true/> | <false/>
5424 </dict>
5425 ```
5426 #### policies.json
5427 ```
5428 {
5429 "policies": {
5430 "SanitizeOnShutdown": true | false
5431 }
5432 }
5433 ```
5434 ### SearchBar
5435 Set whether or not search bar is displayed.
5436
5437 **Compatibility:** Firefox 60, Firefox ESR 60\
5438 **CCK2 Equivalent:** `showSearchBar`\
5439 **Preferences Affected:** N/A
5440
5441 #### Windows (GPO)
5442 ```
5443 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5444 ```
5445
5446 #### Windows (Intune)
5447 OMA-URI:
5448 ```
5449 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5450 ```
5451 Value (string):
5452 ```
5453 <enabled/>
5454 <data id="SearchBar" value="unified | separate"/>
5455 ```
5456 #### macOS
5457 ```
5458 <dict>
5459 <key>SearchBar</key>
5460 <string>unified | separate</string>
5461 </dict>
5462 ```
5463 #### policies.json
5464 ```
5465 {
5466 "policies": {
5467 "SearchBar": "unified" | "separate"
5468 }
5469 }
5470 ```
5471 <a name="SearchEngines"></a>
5472
5473 ### SearchEngines (This policy is only available on the ESR.)
5474
5475 ### SearchEngines | Add
5476
5477 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5478
5479 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5480
5481 `Name` is the name of the search engine.
5482
5483 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5484
5485 `Method` is either GET or POST
5486
5487 `IconURL` is a URL for the icon to use.
5488
5489 `Alias` is a keyword to use for the engine.
5490
5491 `Description` is a description of the search engine.
5492
5493 `PostData` is the POST data as name value pairs separated by &.
5494
5495 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5496
5497 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5498
5499 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5500 **CCK2 Equivalent:** `searchplugins`\
5501 **Preferences Affected:** N/A
5502
5503 #### Windows (GPO)
5504 ```
5505 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5506 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5507 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5508 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5509 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5510 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5511 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5512 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5513 ```
5514 #### Windows (Intune)
5515 OMA-URI:
5516 ```
5517 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5518 ```
5519 Value (string):
5520 ```
5521 <enabled/>
5522 <data id="SearchEngine_Name" value="Example1"/>
5523 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5524 <data id="SearchEngine_Method" value="GET | POST"/>
5525 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5526 <data id="SearchEngine_Alias" value="example"/>
5527 <data id="SearchEngine_Description" value="Example Description"/>
5528 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5529 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5530 ```
5531 #### macOS
5532 ```
5533 <dict>
5534 <key>SearchEngines</key>
5535 <dict>
5536 <key>Add</key>
5537 <array>
5538 <dict>
5539 <key>Name</key>
5540 <string>Example1</string>
5541 <key>URLTemplate</key>
5542 <string>https://www.example.org/q={searchTerms}</string>
5543 <key>Method</key>
5544 <string>GET | POST </string>
5545 <key>IconURL</key>
5546 <string>https://www.example.org/favicon.ico</string>
5547 <key>Alias</key>
5548 <string>example</string>
5549 <key>Description</key>
5550 <string>Example Description</string>
5551 <key>SuggestURLTemplate</key>
5552 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5553 <key>PostData</key>
5554 <string>name=value&q={searchTerms}</string>
5555 </dict>
5556 <array>
5557 </dict>
5558 </dict>
5559 ```
5560 #### policies.json
5561 ```
5562 {
5563 "policies": {
5564 "SearchEngines": {
5565 "Add": [
5566 {
5567 "Name": "Example1",
5568 "URLTemplate": "https://www.example.org/q={searchTerms}",
5569 "Method": "GET" | "POST",
5570 "IconURL": "https://www.example.org/favicon.ico",
5571 "Alias": "example",
5572 "Description": "Description",
5573 "PostData": "name=value&q={searchTerms}",
5574 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5575 }
5576 ]
5577 }
5578 }
5579 }
5580 ```
5581 ### SearchEngines | Default
5582
5583 Set the default search engine. This policy is only available on the ESR.
5584
5585 **Compatibility:** Firefox ESR 60\
5586 **CCK2 Equivalent:** `defaultSearchEngine`\
5587 **Preferences Affected:** N/A
5588
5589 #### Windows (GPO)
5590 ```
5591 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5592 ```
5593 #### Windows (Intune)
5594 OMA-URI:
5595 ```
5596 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5597 ```
5598 Value (string):
5599 ```
5600 <enabled/>
5601 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5602 ```
5603 #### macOS
5604 ```
5605 <dict>
5606 <key>SearchEngines</key>
5607 <dict>
5608 <key>Default</key>
5609 <string>NAME_OF_SEARCH_ENGINE</string>
5610 </dict>
5611 </dict>
5612 ```
5613 #### policies.json
5614 ```
5615 {
5616 "policies": {
5617 "SearchEngines": {
5618 "Default": "NAME_OF_SEARCH_ENGINE"
5619 }
5620 }
5621 }
5622 ```
5623 ### SearchEngines | PreventInstalls
5624
5625 Prevent installing search engines from webpages.
5626
5627 **Compatibility:** Firefox ESR 60\
5628 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5629 **Preferences Affected:** N/A
5630
5631 #### Windows (GPO)
5632 ```
5633 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5634 ```
5635 #### Windows (Intune)
5636 OMA-URI:
5637 ```
5638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5639 ```
5640 Value (string):
5641 ```
5642 <enabled/> or <disabled/>
5643 ```
5644 #### macOS
5645 ```
5646 <dict>
5647 <key>SearchEngines</key>
5648 <dict>
5649 <key>PreventInstalls</key>
5650 <true/> | <false/>
5651 </dict>
5652 </dict>
5653 ```
5654 #### policies.json
5655 ```
5656 {
5657 "policies": {
5658 "SearchEngines": {
5659 "PreventInstalls": true | false
5660 }
5661 }
5662 }
5663 ```
5664 ### SearchEngines | Remove
5665
5666 Hide built-in search engines. This policy is only available on the ESR.
5667
5668 **Compatibility:** Firefox ESR 60.2\
5669 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5670 **Preferences Affected:** N/A
5671
5672 #### Windows (GPO)
5673 ```
5674 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5675 ```
5676 #### Windows (Intune)
5677 OMA-URI:
5678 ```
5679 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5680 ```
5681 Value (string):
5682 ```
5683 <enabled/>
5684 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5685 ```
5686 #### macOS
5687 ```
5688 <dict>
5689 <key>SearchEngines</key>
5690 <dict>
5691 <key>Remove</key>
5692 <array>
5693 <string>NAME_OF_SEARCH_ENGINE</string>
5694 </array>
5695 </dict>
5696 </dict>
5697 ```
5698 #### policies.json
5699 ```
5700 {
5701 "policies": {
5702 "SearchEngines": {
5703 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5704 }
5705 }
5706 }
5707 ```
5708 ### SearchSuggestEnabled
5709
5710 Enable search suggestions.
5711
5712 **Compatibility:** Firefox 68, Firefox ESR 68\
5713 **CCK2 Equivalent:** N/A\
5714 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5715
5716 #### Windows (GPO)
5717 ```
5718 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5719 ```
5720 #### Windows (Intune)
5721 OMA-URI:
5722 ```
5723 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5724 ```
5725 Value (string):
5726 ```
5727 <enabled/> or <disabled/>
5728 ```
5729 #### macOS
5730 ```
5731 <dict>
5732 <key>SearchSuggestEnabled</key>
5733 <true/> | <false/>
5734 </dict>
5735 ```
5736 #### policies.json
5737 ```
5738 {
5739 "policies": {
5740 "SearchSuggestEnabled": true | false
5741 }
5742 }
5743 ```
5744 ### SecurityDevices
5745
5746 Add or delete PKCS #11 modules.
5747
5748 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5749 **CCK2 Equivalent:** N/A\
5750 **Preferences Affected:** N/A
5751
5752 #### Windows (GPO)
5753 ```
5754 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5755 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5756 ```
5757 #### Windows (Intune)
5758 OMA-URI:
5759 ```
5760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5761 ```
5762 Value (string):
5763 ```
5764 <enabled/>
5765 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5766 ```
5767 OMA-URI:
5768 ```
5769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5770 ```
5771 Value (string):
5772 ```
5773 <enabled/>
5774 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5775 ```
5776 #### macOS
5777 ```
5778 <dict>
5779 <key>SecurityDevices</key>
5780 <dict>
5781 <key>Add<key>
5782 <dict>
5783 <key>NAME_OF_DEVICE_TO_ADD</key>
5784 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5785 </dict>
5786 <key>Delete</add>
5787 <array>
5788 <string>NAME_OF_DEVICE_TO_DELETE</string>
5789 </array>
5790 </dict>
5791 </dict>
5792 ```
5793 #### policies.json
5794 ```
5795 {
5796 "policies": {
5797 "SecurityDevices": {
5798 "Add": {
5799 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5800 },
5801 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5802 }
5803 }
5804 }
5805 ```
5806 ### SecurityDevices (Deprecated)
5807
5808 Install PKCS #11 modules.
5809
5810 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5811 **CCK2 Equivalent:** `certs.devices`\
5812 **Preferences Affected:** N/A
5813
5814 #### Windows (GPO)
5815 ```
5816 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5817 ```
5818 #### Windows (Intune)
5819 OMA-URI:
5820 ```
5821 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5822 ```
5823 Value (string):
5824 ```
5825 <enabled/>
5826 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5827 ```
5828 #### macOS
5829 ```
5830 <dict>
5831 <key>SecurityDevices</key>
5832 <dict>
5833 <key>NAME_OF_DEVICE</key>
5834 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5835 </dict>
5836 </dict>
5837 ```
5838 #### policies.json
5839 ```
5840 {
5841 "policies": {
5842 "SecurityDevices": {
5843 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5844 }
5845 }
5846 }
5847 ```
5848 ### ShowHomeButton
5849 Show the home button on the toolbar.
5850
5851 Future versions of Firefox will not show the home button by default.
5852
5853 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5854 **CCK2 Equivalent:** N/A\
5855 **Preferences Affected:** N/A
5856
5857 #### Windows (GPO)
5858 ```
5859 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5860 ```
5861 #### Windows (Intune)
5862 OMA-URI:
5863 ```
5864 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5865 ```
5866 Value (string):
5867 ```
5868 <enabled/> or <disabled/>
5869 ```
5870 #### macOS
5871 ```
5872 <dict>
5873 <key>ShowHomeButton</key>
5874 <true/> | <false/>
5875 </dict>
5876 ```
5877 #### policies.json
5878 ```
5879 {
5880 "policies": {
5881 "ShowHomeButton": true | false
5882 }
5883 }
5884 ```
5885 ### SSLVersionMax
5886
5887 Set and lock the maximum version of TLS.
5888
5889 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5890 **CCK2 Equivalent:** N/A\
5891 **Preferences Affected:** `security.tls.version.max`
5892
5893 #### Windows (GPO)
5894 ```
5895 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5896 ```
5897 #### Windows (Intune)
5898 OMA-URI:
5899 ```
5900 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5901 ```
5902 Value (string):
5903 ```
5904 <enabled/>
5905 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5906 ```
5907 #### macOS
5908 ```
5909 <dict>
5910 <key>SSLVersionMax</key>
5911 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5912 </dict>
5913 ```
5914
5915 #### policies.json
5916 ```
5917 {
5918 "policies": {
5919 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5920 }
5921 }
5922 ```
5923 ### SSLVersionMin
5924
5925 Set and lock the minimum version of TLS.
5926
5927 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5928 **CCK2 Equivalent:** N/A\
5929 **Preferences Affected:** `security.tls.version.min`
5930
5931 #### Windows (GPO)
5932 ```
5933 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5934 ```
5935 #### Windows (Intune)
5936 OMA-URI:
5937 ```
5938 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5939 ```
5940 Value (string):
5941 ```
5942 <enabled/>
5943 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5944 ```
5945 #### macOS
5946 ```
5947 <dict>
5948 <key>SSLVersionMin</key>
5949 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5950 </dict>
5951 ```
5952
5953 #### policies.json
5954 ```
5955 {
5956 "policies": {
5957 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5958 }
5959 }
5960 ```
5961 ### SupportMenu
5962 Add a menuitem to the help menu for specifying support information.
5963
5964 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5965 **CCK2 Equivalent:** helpMenu\
5966 **Preferences Affected:** N/A
5967
5968 #### Windows (GPO)
5969 ```
5970 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5971 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5972 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5973 ```
5974 #### Windows (Intune)
5975 OMA-URI:
5976 ```
5977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5978 ```
5979 Value (string):
5980 ```
5981 <enabled/>
5982 <data id="SupportMenuTitle" value="Support Menu"/>
5983 <data id="SupportMenuURL" value="http://example.com/support"/>
5984 <data id="SupportMenuAccessKey" value="S"/>
5985 ```
5986 #### macOS
5987 ```
5988 <dict>
5989 <key>SupportMenu</key>
5990 <dict>
5991 <key>Title</key>
5992 <string>SupportMenu</string>
5993 <key>URL</key>
5994 <string>http://example.com/support</string>
5995 <key>AccessKey</key>
5996 <string>S</string>
5997 </dict>
5998 </dict>
5999 ```
6000 #### policies.json
6001 ```
6002 {
6003 "policies": {
6004 "SupportMenu": {
6005 "Title": "Support Menu",
6006 "URL": "http://example.com/support",
6007 "AccessKey": "S"
6008 }
6009 }
6010 }
6011 ```
6012 ### StartDownloadsInTempDirectory
6013 Force downloads to start off in a local, temporary location rather than the default download directory.
6014
6015 **Compatibility:** Firefox 102\
6016 **CCK2 Equivalent:** N/A\
6017 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
6018
6019 #### Windows (GPO)
6020 ```
6021 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
6022 ```
6023 #### Windows (Intune)
6024 OMA-URI:
6025 ```
6026 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
6027 ```
6028 Value (string):
6029 ```
6030 <enabled/> or <disabled/>
6031 ```
6032 #### macOS
6033 ```
6034 <dict>
6035 <key>StartDownloadsInTempDirectory</key>
6036 <true/> | <false/>
6037 </dict>
6038 ```
6039 #### policies.json
6040 ```
6041 {
6042 "policies": {
6043 "StartDownloadsInTempDirectory": true | false
6044 }
6045 ```
6046 ### UserMessaging
6047
6048 Prevent Firefox from messaging the user in certain situations.
6049
6050 `WhatsNew` Remove the "What's New" icon and menuitem.
6051
6052 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
6053
6054 `FeatureRecommendations` If false, don't recommend browser features.
6055
6056 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
6057
6058 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6059
6060 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6061
6062 `Locked` prevents the user from changing user messaging preferences.
6063
6064 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6065 **CCK2 Equivalent:** N/A\
6066 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6067
6068 #### Windows (GPO)
6069 ```
6070 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
6071 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6072 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6073 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6074 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6075 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6076 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6077 ```
6078 #### Windows (Intune)
6079 OMA-URI:
6080 ```
6081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
6082 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6083 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6084 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6088 ```
6089 Value (string):
6090 ```
6091 <enabled/> or <disabled/>
6092 ```
6093 #### macOS
6094 ```
6095 <dict>
6096 <key>UserMessaging</key>
6097 <dict>
6098 <key>WhatsNew</key>
6099 <true/> | <false/>
6100 <key>ExtensionRecommendations</key>
6101 <true/> | <false/>
6102 <key>FeatureRecommendations</key>
6103 <true/> | <false/>
6104 <key>UrlbarInterventions</key>
6105 <true/> | <false/>
6106 <key>SkipOnboarding</key>
6107 <true/> | <false/>
6108 <key>MoreFromMozilla</key>
6109 <true/> | <false/>
6110 <key>Locked</key>
6111 <true/> | <false/>
6112 </dict>
6113 </dict>
6114 ```
6115 #### policies.json
6116 ```
6117 {
6118 "policies": {
6119 "UserMessaging": {
6120 "WhatsNew": true | false,
6121 "ExtensionRecommendations": true | false,
6122 "FeatureRecommendations": true | false,
6123 "UrlbarInterventions": true | false,
6124 "SkipOnboarding": true | false,
6125 "MoreFromMozilla": true | false,
6126 "Locked": true | false
6127 }
6128 }
6129 }
6130 ```
6131 ### UseSystemPrintDialog
6132 Use the system print dialog instead of the print preview window.
6133
6134 **Compatibility:** Firefox 102\
6135 **CCK2 Equivalent:** N/A\
6136 **Preferences Affected:** `print.prefer_system_dialog`
6137
6138 #### Windows (GPO)
6139 ```
6140 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6141 ```
6142 #### Windows (Intune)
6143 OMA-URI:
6144 ```
6145 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6146 ```
6147 Value (string):
6148 ```
6149 <enabled/> or <disabled/>
6150 ```
6151 #### macOS
6152 ```
6153 <dict>
6154 <key>UseSystemPrintDialog</key>
6155 <true/> | <false/>
6156 </dict>
6157 ```
6158 #### policies.json
6159 ```
6160 {
6161 "policies": {
6162 "UseSystemPrintDialog": true | false
6163 }
6164 }
6165 ```
6166 ### WebsiteFilter
6167 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6168 The arrays are limited to 1000 entries each.
6169
6170 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6171
6172 For specific protocols, use `https://*/*` or `http://*/*`.
6173
6174 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6175
6176 **Compatibility:** Firefox 60, Firefox ESR 60\
6177 **CCK2 Equivalent:** N/A\
6178 **Preferences Affected:** N/A
6179
6180 #### Windows (GPO)
6181 ```
6182 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6183 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6184 ```
6185 #### Windows (Intune)
6186 OMA-URI:
6187 ```
6188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6189 ```
6190 Value (string):
6191 ```
6192 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6193 ```
6194 OMA-URI:
6195 ```
6196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6197 ```
6198 Value (string):
6199 ```
6200 <enabled/>
6201 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6202 ```
6203 #### macOS
6204 ```
6205 <dict>
6206 <key>WebsiteFilter</key>
6207 <dict>
6208 <key>Block</key>
6209 <array>
6210 <string><all_urls></string>
6211 </array>
6212 <key>Exceptions</key>
6213 <array>
6214 <string>http://example.org/*</string>
6215 </array>
6216 </dict>
6217
6218 </dict>
6219 ```
6220 #### policies.json
6221 ```
6222 {
6223 "policies": {
6224 "WebsiteFilter": {
6225 "Block": ["<all_urls>"],
6226 "Exceptions": ["http://example.org/*"]
6227 }
6228 }
6229 }
6230 ```
6231 ### WindowsSSO
6232 Allow Windows single sign-on for Microsoft, work, and school accounts.
6233
6234 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6235
6236 **Compatibility:** Firefox 91\
6237 **CCK2 Equivalent:** N/A\
6238 **Preferences Affected:** `network.http.windows-sso.enabled`
6239
6240 #### Windows (GPO)
6241 ```
6242 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6243 ```
6244 #### Windows (Intune)
6245 OMA-URI:
6246 ```
6247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6248 ```
6249 Value (string):
6250 ```
6251 <enabled/> or <disabled/>
6252 ```
6253 #### policies.json
6254 ```
6255 {
6256 "policies": {
6257 "WindowsSSO": true | false
6258 }
6259 }
6260 ```
6261

patrick-canterino.de