]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #529 from mozilla/DisplayMenuBar_Updates
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
42 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
43 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
44 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
45 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
46 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
47 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
48 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
49 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
50 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
51 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
52 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
53 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
54 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
55 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
56 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
57 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
58 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
59 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
60 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
61 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
62 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
63 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
64 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
65 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
66 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
67 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
68 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
69 | **[`Preferences`](#preferences)** | Set and lock some preferences.
70 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
71 | **[`Proxy`](#proxy)** | Configure proxy settings.
72 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
73 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
74 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
75 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
76 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
77 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
78 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
79 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
80 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
81 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
82 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
83 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
84 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
85 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
86 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
87
88 ### AppUpdateURL
89
90 Change the URL for application update.
91
92 **Compatibility:** Firefox 62, Firefox ESR 60.2\
93 **CCK2 Equivalent:** N/A\
94 **Preferences Affected:** `app.update.url`
95
96 #### Windows (GPO)
97 ```
98 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
99 ```
100 #### macOS
101 ```
102 <dict>
103 <key>AppUpdateURL</key>
104 <string>https://yoursite.com</string>
105 </dict>
106 ```
107 #### policies.json
108 ```
109 {
110 "policies": {
111 "AppUpdateURL": "https://yoursite.com"
112 }
113 }
114 ```
115 ### Authentication
116
117 Configure sites that support integrated authentication.
118
119 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
120
121 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
122 **CCK2 Equivalent:** N/A\
123 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
124
125 #### Windows (GPO)
126 ```
127 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
134 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
138 ```
139 #### macOS
140 ```
141 <dict>
142 <key>Authentication</key>
143 <dict>
144 <key>SPNEGO</key>
145 <array>
146 <string>mydomain.com</string>
147 <string>https://myotherdomain.com</string>
148 </array>
149 <key>Delegated</key>
150 <array>
151 <string>mydomain.com</string>
152 <string>https://myotherdomain.com</string>
153 </array>
154 <key>NTLM</key>
155 <array>
156 <string>mydomain.com</string>
157 <string>https://myotherdomain.com</string>
158 </array>
159 <key>AllowNonFQDN</key>
160 <dict>
161 <key>SPNEGO</key>
162 <true/> | <false/>
163 <key>NTLM</key>
164 <true/> | <false/>
165 </dict>
166 <key>AllowProxies</key>
167 <dict>
168 <key>SPNEGO</key>
169 <true/> | <false/>
170 <key>NTLM</key>
171 <true/> | <false/>
172 </dict>
173 <key>Locked</key>
174 <true/> | <false/>
175 </dict>
176 </dict>
177 ```
178 #### policies.json
179 ```
180 {
181 "policies": {
182 "Authentication": {
183 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
184 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
185 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
186 "AllowNonFQDN": {
187 "SPNEGO": true | false,
188 "NTLM": true | false
189 },
190 "AllowProxies": {
191 "SPNEGO": true | false,
192 "NTLM": true | false
193 },
194 "Locked": true | false
195 }
196 }
197 }
198 ```
199 ### BlockAboutAddons
200
201 Block access to the Add-ons Manager (about:addons).
202
203 **Compatibility:** Firefox 60, Firefox ESR 60\
204 **CCK2 Equivalent:** `disableAddonsManager`\
205 **Preferences Affected:** N/A
206
207 #### Windows (GPO)
208 ```
209 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
210 ```
211 #### macOS
212 ```
213 <dict>
214 <key>BlockAboutAddons</key>
215 <true/> | <false/>
216 </dict>
217 ```
218 #### policies.json
219 ```
220 {
221 "policies": {
222 "BlockAboutAddons": true | false
223 }
224 }
225 ```
226 ### BlockAboutConfig
227
228 Block access to about:config.
229
230 **Compatibility:** Firefox 60, Firefox ESR 60\
231 **CCK2 Equivalent:** `disableAboutConfig`\
232 **Preferences Affected:** N/A
233
234 #### Windows (GPO)
235 ```
236 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
237 ```
238 #### macOS
239 ```
240 <dict>
241 <key>BlockAboutConfig</key>
242 <true/> | <false/>
243 </dict>
244 ```
245 #### policies.json
246 ```
247 {
248 "policies": {
249 "BlockAboutConfig": true | false
250 }
251 }
252 ```
253 ### BlockAboutProfiles
254
255 Block access to About Profiles (about:profiles).
256
257 **Compatibility:** Firefox 60, Firefox ESR 60\
258 **CCK2 Equivalent:** `disableAboutProfiles`\
259 **Preferences Affected:** N/A
260
261 #### Windows (GPO)
262 ```
263 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
264 ```
265 #### macOS
266 ```
267 <dict>
268 <key>BlockAboutProfiles</key>
269 <true/> | <false/>
270 </dict>
271 ```
272 #### policies.json
273 ```
274 {
275 "policies": {
276 "BlockAboutProfiles": true | false
277 }
278 }
279 ```
280 ### BlockAboutSupport
281
282 Block access to Troubleshooting Information (about:support).
283
284 **Compatibility:** Firefox 60, Firefox ESR 60\
285 **CCK2 Equivalent:** `disableAboutSupport`\
286 **Preferences Affected:** N/A
287
288 #### Windows (GPO)
289 ```
290 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
291 ```
292 #### macOS
293 ```
294 <dict>
295 <key>BlockAboutSupport</key>
296 <true/> | <false/>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "BlockAboutSupport": true | false
304 }
305 }
306 ```
307 ### Bookmarks
308
309 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
310
311 **Compatibility:** Firefox 60, Firefox ESR 60\
312 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
313 **Preferences Affected:** N/A
314
315 #### Windows (GPO)
316 ```
317 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
318 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
322 ```
323 #### macOS
324 ```
325 <dict>
326 <key>Bookmarks</key>
327 <array>
328 <dict>
329 <key>Title</key>
330 <string>Example</string>
331 <key>URL</key>
332 <string>https://example.com</string>
333 <key>Favicon</key>
334 <string>https://example.com/favicon.ico</string>
335 <key>Placement</key>
336 <string>toolbar | menu</string>
337 <key>Folder</key>
338 <string>FolderName</string>
339 </dict>
340 </array>
341 </dict>
342 ```
343 #### policies.json
344 ```
345 {
346 "policies": {
347 "Bookmarks": [
348 {
349 "Title": "Example",
350 "URL": "https://example.com",
351 "Favicon": "https://example.com/favicon.ico",
352 "Placement": "toolbar" | "menu",
353 "Folder": "FolderName"
354 }
355 ]
356 }
357 }
358 ```
359 ### CaptivePortal
360 Enable or disable the detection of captive portals.
361
362 **Compatibility:** Firefox 67, Firefox ESR 60.7\
363 **CCK2 Equivalent:** N/A\
364 **Preferences Affected:** `network.captive-portal-service.enabled`
365
366 #### Windows (GPO)
367 ```
368 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
369 ```
370 #### macOS
371 ```
372 <dict>
373 <key>CaptivePortal</key>
374 <true/> | <false/>
375 </dict>
376 ```
377 #### policies.json
378 ```
379 {
380 "policies": {
381 "CaptivePortal": true | false
382 }
383 }
384 ```
385 ### Certificates
386
387 ### Certificates | ImportEnterpriseRoots
388
389 Trust certificates that have been added to the operating system certificate store by a user or administrator.
390
391 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
392
393 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
394 **CCK2 Equivalent:** N/A\
395 **Preferences Affected:** `security.enterprise_roots.enabled`
396
397 #### Windows (GPO)
398 ```
399 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
400 ```
401 #### macOS
402 ```
403 <dict>
404 <key>Certificates</key>
405 <dict>
406 <key>ImportEnterpriseRoots</key>
407 <true/> | <false/>
408 </dict>
409 </dict>
410 ```
411 #### policies.json
412 ```
413 {
414 "policies": {
415 "Certificates": {
416 "ImportEnterpriseRoots": true | false
417 }
418 }
419 }
420 ```
421 ### Certificates | Install
422
423 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
424
425 - Windows
426 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
427 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
428 - macOS
429 - /Library/Application Support/Mozilla/Certificates
430 - ~/Library/Application Support/Mozilla/Certificates
431 - Linux
432 - /usr/lib/mozilla/certificates
433 - /usr/lib64/mozilla/certificates
434 - ~/.mozilla/certificates
435
436 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
437
438 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
439
440 Certificates are installed using the trust string `CT,CT,`.
441
442 Binary (DER) and ASCII (PEM) certificates are both supported.
443
444 **Compatibility:** Firefox 64, Firefox ESR 64\
445 **CCK2 Equivalent:** `certs.ca`\
446 **Preferences Affected:** N/A
447
448 #### Windows (GPO)
449 ```
450 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
451 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
452 ```
453 #### macOS
454 ```
455 <dict>
456 <key>Certificates</key>
457 <dict>
458 <key>Install</key>
459 <array>
460 <string>cert1.der</string>
461 <string>/Users/username/cert2.pem</string>
462 </array>
463 </dict>
464 </dict>
465 ```
466 #### policies.json
467 ```
468 {
469 "policies": {
470 "Certificates": {
471 "Install": ["cert1.der", "/home/username/cert2.pem"]
472 }
473 }
474 }
475 ```
476 ### Cookies
477 Configure cookie preferences.
478
479 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
480
481 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
482
483 `Default` determines whether cookies are accepted at all.
484
485 `AcceptThirdParty` determines how third-party cookies are handled.
486
487 `ExpireAtSessionEnd` determines when cookies expire.
488
489 `RejectTracker` only rejects cookies for trackers.
490
491 `Locked` prevents the user from changing cookie preferences.
492
493 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
494 **CCK2 Equivalent:** N/A\
495 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
496
497 #### Windows (GPO)
498 ```
499 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
500 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
501 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
502 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
503 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
504 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
505 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
506 ```
507 #### macOS
508 ```
509 <dict>
510 <key>Cookies</key>
511 <dict>
512 <key>Allow</key>
513 <array>
514 <string>http://example.com</string>
515 </array>
516 <key>Block</key>
517 <array>
518 <string>http://example.org</string>
519 </array>
520 <key>Default</key>
521 <true/> | <false/>
522 <key>AcceptThirdParty</key>
523 <string>always | never | from-visited</string>
524 <key>ExpireAtSessionEnd</key>
525 <true/> | <false/>
526 <key>RejectTracker</key>
527 <true/> | <false/>
528 <key>Locked</key>
529 <true/> | <false/>
530 </dict>
531 </dict>
532 ```
533 #### policies.json
534 ```
535 {
536 "policies": {
537 "Cookies": {
538 "Allow": ["http://example.org/"],
539 "Block": ["http://example.edu/"],
540 "Default": true | false,
541 "AcceptThirdParty": "always" | "never" | "from-visited",
542 "ExpireAtSessionEnd": true | false,
543 "RejectTracker": true | false,
544 "Locked": true | false
545 }
546 }
547 }
548 ```
549 ### DisableSetDesktopBackground
550 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
551
552 **Compatibility:** Firefox 60, Firefox ESR 60\
553 **CCK2 Equivalent:** `removeSetDesktopBackground`\
554 **Preferences Affected:** N/A
555
556 #### Windows (GPO)
557 ```
558 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
559 ```
560
561 #### macOS
562 ```
563 <dict>
564 <key>DisableSetDesktopBackground</key>
565 <true/> | <false/>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "DisableSetDesktopBackground": true | false
573 }
574 }
575 ```
576 ### DisableMasterPasswordCreation
577 Remove the master password functionality.
578
579 **Compatibility:** Firefox 60, Firefox ESR 60\
580 **CCK2 Equivalent:** `noMasterPassword`\
581 **Preferences Affected:** N/A
582
583 #### Windows (GPO)
584 ```
585 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
586 ```
587
588 #### macOS
589 ```
590 <dict>
591 <key>DisableMasterPasswordCreation</key>
592 <true/> | <false/>
593 </dict>
594 ```
595 #### policies.json
596 ```
597 {
598 "policies": {
599 "DisableMasterPasswordCreation": true | false
600 }
601 }
602 ```
603 ### DisableAppUpdate
604 Turn off application updates.
605
606 **Compatibility:** Firefox 60, Firefox ESR 60\
607 **CCK2 Equivalent:** `disableFirefoxUpdates`\
608 **Preferences Affected:** N/A
609
610 #### Windows (GPO)
611 ```
612 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
613 ```
614 #### macOS
615 ```
616 <dict>
617 <key>DisableAppUpdate</key>
618 <true/> | <false/>
619 </dict>
620 ```
621 #### policies.json
622 ```
623 {
624 "policies": {
625 "DisableAppUpdate": true | false
626 }
627 }
628 ```
629 ### DisableBuiltinPDFViewer
630 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
631
632 **Compatibility:** Firefox 60, Firefox ESR 60\
633 **CCK2 Equivalent:** `disablePDFjs`\
634 **Preferences Affected:** `pdfjs.disabled`
635
636 #### Windows (GPO)
637 ```
638 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
639 ```
640
641 #### macOS
642 ```
643 <dict>
644 <key>DisableBuiltinPDFViewer</key>
645 <true/> | <false/>
646 </dict>
647 ```
648 #### policies.json
649 ```
650 {
651 "policies": {
652 "DisableBuiltinPDFViewer": true | false
653 }
654 }
655 ```
656 ### DisableDeveloperTools
657 Remove access to all developer tools.
658
659 **Compatibility:** Firefox 60, Firefox ESR 60\
660 **CCK2 Equivalent:** `removeDeveloperTools`\
661 **Preferences Affected:** `devtools.policy.disabled`
662
663 #### Windows (GPO)
664 ```
665 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
666 ```
667
668 #### macOS
669 ```
670 <dict>
671 <key>DisableDeveloperTools</key>
672 <true/> | <false/>
673 </dict>
674 ```
675 #### policies.json
676 ```
677 {
678 "policies": {
679 "DisableDeveloperTools": true | false
680 }
681 }
682 ```
683 ### DisableFeedbackCommands
684 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
685
686 **Compatibility:** Firefox 60, Firefox ESR 60\
687 **CCK2 Equivalent:** N/A\
688 **Preferences Affected:** N/A
689
690 #### Windows (GPO)
691 ```
692 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
693 ```
694 #### macOS
695 ```
696 <dict>
697 <key>DisableFeedbackCommands</key>
698 <true/> | <false/>
699 </dict>
700 ```
701 #### policies.json
702 ```
703 {
704 "policies": {
705 "DisableFeedbackCommands": true | false
706 }
707 }
708 ```
709 ### DisableFirefoxScreenshots
710 Remove access to Firefox Screenshots.
711
712 **Compatibility:** Firefox 60, Firefox ESR 60\
713 **CCK2 Equivalent:** N/A\
714 **Preferences Affected:** `extensions.screenshots.disabled`
715
716 #### Windows (GPO)
717 ```
718 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
719 ```
720 #### macOS
721 ```
722 <dict>
723 <key>DisableFirefoxScreenshots</key>
724 <true/> | <false/>
725 </dict>
726 ```
727 #### policies.json
728 ```
729 {
730 "policies": {
731 "DisableFirefoxScreenshots": true | false
732 }
733 }
734 ```
735 ### DisableFirefoxAccounts
736 Disable Firefox Accounts integration (Sync).
737
738 **Compatibility:** Firefox 60, Firefox ESR 60\
739 **CCK2 Equivalent:** `disableSync`\
740 **Preferences Affected:** `identity.fxaccounts.enabled`
741
742 #### Windows (GPO)
743 ```
744 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
745 ```
746 #### macOS
747 ```
748 <dict>
749 <key>DisableFirefoxAccounts</key>
750 <true/> | <false/>
751 </dict>
752 ```
753 #### policies.json
754 ```
755 {
756 "policies": {
757 "DisableFirefoxAccounts": true | false
758 }
759 }
760 ```
761 ### DisableFirefoxStudies
762 Disable Firefox studies (Shield).
763
764 **Compatibility:** Firefox 60, Firefox ESR 60\
765 **CCK2 Equivalent:** `disableForget`\
766 **Preferences Affected:** N/A
767
768 #### Windows (GPO)
769 ```
770 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
771 ```
772 #### macOS
773 ```
774 <dict>
775 <key>DisableFirefoxStudies</key>
776 <true/> | <false/>
777 </dict>
778 ```
779 #### policies.json
780 ```
781 {
782 "policies": {
783 "DisableFirefoxStudies": true | false
784 }
785 }
786 ```
787 ### DisableForgetButton
788 Disable the "Forget" button.
789
790 **Compatibility:** Firefox 60, Firefox ESR 60\
791 **CCK2 Equivalent:** `disableForget`\
792 **Preferences Affected:** N/A
793
794 #### Windows (GPO)
795 ```
796 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
797 ```
798 #### macOS
799 ```
800 <dict>
801 <key>DisableForgetButton</key>
802 <true/> | <false/>
803 </dict>
804 ```
805 #### policies.json
806 ```
807 {
808 "policies": {
809 "DisableForgetButton": true | false
810 }
811 }
812 ```
813 ### DisableFormHistory
814 Turn off saving information on web forms and the search bar.
815
816 **Compatibility:** Firefox 60, Firefox ESR 60\
817 **CCK2 Equivalent:** `disableFormFill`\
818 **Preferences Affected:** ` browser.formfill.enable`
819
820 #### Windows (GPO)
821 ```
822 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
823 ```
824 #### macOS
825 ```
826 <dict>
827 <key>DisableFormHistory</key>
828 <true/> | <false/>
829 </dict>
830 ```
831 #### policies.json
832 ```
833 {
834 "policies": {
835 "DisableFormHistory": true | false
836 }
837 }
838 ```
839 ### DisablePasswordReveal
840 Do not allow passwords to be shown in saved logins
841
842 **Compatibility:** Firefox 71, Firefox ESR 68.3\
843 **CCK2 Equivalent:** N/A
844 **Preferences Affected:** N/A
845
846 #### Windows (GPO)
847 ```
848 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
849 ```
850
851 #### macOS
852 ```
853 <dict>
854 <key>DisablePasswordReveal</key>
855 <true/> | <false/>
856 </dict>
857 ```
858 #### policies.json
859 ```
860 {
861 "policies": {
862 "DisablePasswordReveal": true | false
863 }
864 }
865 ```
866 ### DisablePocket
867 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
868
869 **Compatibility:** Firefox 60, Firefox ESR 60\
870 **CCK2 Equivalent:** `disablePocket`\
871 **Preferences Affected:** `extensions.pocket.enabled`
872
873 #### Windows (GPO)
874 ```
875 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
876 ```
877 #### macOS
878 ```
879 <dict>
880 <key>DisablePocket</key>
881 <true/> | <false/>
882 </dict>
883 ```
884 #### policies.json
885 ```
886 {
887 "policies": {
888 "DisablePocket": true | false
889 }
890 }
891 ```
892 ### DisablePrivateBrowsing
893 Remove access to private browsing.
894
895 **Compatibility:** Firefox 60, Firefox ESR 60\
896 **CCK2 Equivalent:** `disablePrivateBrowsing`\
897 **Preferences Affected:** N/A
898
899 #### Windows (GPO)
900 ```
901 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
902 ```
903 #### macOS
904 ```
905 <dict>
906 <key>DisablePrivateBrowsing</key>
907 <true/> | <false/>
908 </dict>
909 ```
910 #### policies.json
911 ```
912 {
913 "policies": {
914 "DisablePrivateBrowsing": true | false
915 }
916 }
917 ```
918 ### DisableProfileImport
919 Disables the "Import data from another browser" option in the bookmarks window.
920
921 **Compatibility:** Firefox 60, Firefox ESR 60\
922 **CCK2 Equivalent:** N/A\
923 **Preferences Affected:** N/A
924
925 #### Windows (GPO)
926 ```
927 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
928 ```
929 #### macOS
930 ```
931 <dict>
932 <key>DisableProfileImport</key>
933 <true/> | <false/>
934 </dict>
935 ```
936 #### policies.json
937 ```
938 {
939 "policies": {
940 "DisableProfileImport": true | false
941 }
942 }
943 ```
944 ### DisableProfileRefresh
945 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
946
947 **Compatibility:** Firefox 60, Firefox ESR 60\
948 **CCK2 Equivalent:** `disableResetFirefox`\
949 **Preferences Affected:** `browser.disableResetPrompt`
950
951 #### Windows (GPO)
952 ```
953 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
954 ```
955 #### macOS
956 ```
957 <dict>
958 <key>DisableProfileRefresh</key>
959 <true/> | <false/>
960 </dict>
961 ```
962 #### policies.json
963 ```
964 {
965 "policies": {
966 "DisableProfileRefresh": true | false
967 }
968 }
969 ```
970 ### DisableSafeMode
971 Disable safe mode within the browser.
972
973 On Windows, this disables safe mode via the command line as well.
974
975 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
976 **CCK2 Equivalent:** `disableSafeMode`\
977 **Preferences Affected:** N/A
978
979 #### Windows (GPO)
980 ```
981 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisableSafeMode</key>
987 <true/> | <false/>
988 </dict>
989 ```
990 #### policies.json
991 ```
992 {
993 "policies": {
994 "DisableSafeMode": true | false
995 }
996 }
997 ```
998 ### DisableSecurityBypass
999 Prevent the user from bypassing security in certain cases.
1000
1001 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1002
1003 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1004
1005 **Compatibility:** Firefox 60, Firefox ESR 60\
1006 **CCK2 Equivalent:** N/A\
1007 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1008
1009 #### Windows (GPO)
1010 ```
1011 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1012 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1013 ```
1014 #### macOS
1015 ```
1016 <dict>
1017 <key>DisableSecurityBypass</key>
1018 <dict>
1019 <key>InvalidCertificate</key>
1020 <true/> | <false/>
1021 <key><SafeBrowsing/key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisableSecurityBypass": {
1031 "InvalidCertificate": true false,
1032 "SafeBrowsing": true false
1033 }
1034 }
1035 }
1036 ```
1037 ### DisableSystemAddonUpdate
1038 Prevent system add-ons from being installed or update.
1039
1040 **Compatibility:** Firefox 60, Firefox ESR 60\
1041 **CCK2 Equivalent:** N/A\
1042 **Preferences Affected:** N/A
1043
1044 #### Windows (GPO)
1045 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1046 ```
1047 #### macOS
1048 ```
1049 <dict>
1050 <key>DisableSystemAddonUpdate</key>
1051 <true/> | <false/>
1052 </dict>
1053 ```
1054 #### policies.json
1055 ```
1056 {
1057 "policies": {
1058 "DisableSystemAddonUpdate": true | false
1059 }
1060 }
1061 ```
1062 ### DisableTelemetry
1063 Prevent the upload of telemetry data.
1064
1065 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1066
1067 **Compatibility:** Firefox 60, Firefox ESR 60\
1068 **CCK2 Equivalent:** `disableTelemetry`\
1069 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1070
1071 #### Windows (GPO)
1072 ```
1073 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisableTelemetry</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### policies.json
1083 ```
1084 {
1085 "policies": {
1086 "DisableTelemetry": true | false
1087 }
1088 }
1089 ```
1090 ### DisplayBookmarksToolbar
1091 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1092
1093 **Compatibility:** Firefox 60, Firefox ESR 60\
1094 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1095 **Preferences Affected:** N/A
1096
1097 #### Windows (GPO)
1098 ```
1099 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1100 ```
1101 #### macOS
1102 ```
1103 <dict>
1104 <key>DisplayBookmarksToolbar</key>
1105 <true/> | <false/>
1106 </dict>
1107 ```
1108 #### policies.json
1109 ```
1110 {
1111 "policies": {
1112 "DisplayBookmarksToolbar": true | false
1113 }
1114 }
1115 ```
1116 ### DisplayMenuBar (Deprecated)
1117 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1118
1119 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1120 **CCK2 Equivalent:** `displayMenuBar`\
1121 **Preferences Affected:** N/A
1122
1123 #### Windows (GPO)
1124 ```
1125 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1126 ```
1127 #### macOS
1128 ```
1129 <dict>
1130 <key>DisplayMenuBar</key>
1131 <true/> | <false/>
1132 </dict>
1133 ```
1134 #### policies.json
1135 ```
1136 {
1137 "policies": {
1138 "DisplayMenuBar": true | false
1139 }
1140 }
1141 ```
1142 ### DisplayMenuBar
1143 Set the state of the menubar.
1144
1145 `always` means the menubar is shown and cannot be hidden.
1146
1147 `never` means the menubar is hidden and cannot be shown.
1148
1149 `default-on` means the menubar is on by default but can be hidden.
1150
1151 `default-off` means the menubar is off by default but can be shown.
1152
1153 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1154 **CCK2 Equivalent:** `displayMenuBar`\
1155 **Preferences Affected:** N/A
1156
1157 #### Windows (GPO)
1158 ```
1159 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1160 ```
1161 #### macOS
1162 ```
1163 <dict>
1164 <key>DisplayMenuBar</key>
1165 <string>always | never | default-on | default-off</string>
1166 </dict>
1167 ```
1168 #### policies.json
1169 ```
1170 {
1171 "policies": {
1172 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1173 }
1174 }
1175 ```
1176 ### DNSOverHTTPS
1177 Configure DNS over HTTPS.
1178
1179 `Enabled` determines whether DNS over HTTPS is enabled
1180
1181 `ProviderURL` is a URL to another provider.
1182
1183 `Locked` prevents the user from changing DNS over HTTPS preferences.
1184
1185 **Compatibility:** Firefox 63, Firefox ESR 68\
1186 **CCK2 Equivalent:** N/A\
1187 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1188
1189 #### Windows (GPO)
1190 ```
1191 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1192 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1193 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1194 ```
1195 #### macOS
1196 ```
1197 <dict>
1198 <key>DNSOverHTTPS</key>
1199 <dict>
1200 <key>Enabled</key>
1201 <true/> | <false/>
1202 <key>ProviderURL</key>
1203 <string>URL_TO_ALTERNATE_PROVIDER</string>
1204 <key>Locked</key>
1205 <true/> | <false/>
1206 </dict>
1207 </dict>
1208 ```
1209 #### policies.json
1210 ```
1211 {
1212 "policies": {
1213 "DNSOverHTTPS": {
1214 "Enabled": true | false,
1215 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1216 "Locked": true | false
1217 }
1218 }
1219 }
1220 ```
1221 ### DontCheckDefaultBrowser
1222 Don't check if Firefox is the default browser at startup.
1223
1224 **Compatibility:** Firefox 60, Firefox ESR 60\
1225 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1226 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1227
1228 #### Windows (GPO)
1229 ```
1230 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1231 ```
1232 #### macOS
1233 ```
1234 <dict>
1235 <key>DontCheckDefaultBrowser</key>
1236 <true/> | <false/>
1237 </dict>
1238 ```
1239 #### policies.json
1240 ```
1241 {
1242 "policies": {
1243 "DontCheckDefaultBrowser": true | false
1244 }
1245 }
1246 ```
1247 ### DefaultDownloadDirectory
1248 Set the default download directory.
1249
1250 You can use ${home} for the native home directory.
1251
1252 **Compatibility:** Firefox 68, Firefox ESR 68\
1253 **CCK2 Equivalent:** N/A\
1254 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1259 ```
1260 #### macOS
1261 ```
1262 <dict>
1263 <key>DefaultDownloadDirectory</key>
1264 <string>${home}/Downloads</string>
1265 </dict>
1266 ```
1267 #### policies.json (macOS and Linux)
1268 ```
1269 {
1270 "policies": {
1271 "DefaultDownloadDirectory": "${home}/Downloads"
1272 }
1273 ```
1274 #### policies.json (Windows)
1275 ```
1276 {
1277 "policies": {
1278 "DefaultDownloadDirectory": "${home}\\Downloads"
1279 }
1280 ```
1281 ### DownloadDirectory
1282 Set and lock the download directory.
1283
1284 You can use ${home} for the native home directory.
1285
1286 **Compatibility:** Firefox 68, Firefox ESR 68\
1287 **CCK2 Equivalent:** N/A\
1288 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1293 ```
1294 #### macOS
1295 ```
1296 <dict>
1297 <key>DownloadDirectory</key>
1298 <string>${home}/Downloads</string>
1299 </dict>
1300 ```
1301 #### policies.json (macOS and Linux)
1302 ```
1303 {
1304 "policies": {
1305 "DownloadDirectory": "${home}/Downloads"
1306 }
1307 ```
1308 #### policies.json (Windows)
1309 ```
1310 {
1311 "policies": {
1312 "DownloadDirectory": "${home}\\Downloads"
1313 }
1314 ```
1315 ### EnableTrackingProtection
1316 Configure tracking protection.
1317
1318 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1319
1320 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1321
1322 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1323
1324 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1325
1326 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1327
1328 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2)\
1329 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1330 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1331
1332 #### Windows (GPO)
1333 ```
1334 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1335 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1336 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1337 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>EnableTrackingProtection</key>
1343 <dict>
1344 <key>Value</key>
1345 <true/> | <false/>
1346 <key><Locked/key>
1347 <true/> | <false/>
1348 <key><Cryptomining/key>
1349 <true/> | <false/>
1350 <key><Fingerprinting/key>
1351 <true/> | <false/>
1352 </dict>
1353 </dict>
1354 ```
1355 #### policies.json
1356 ```
1357 {
1358 "policies": {
1359 "EnableTrackingProtection": {
1360 "Value": [true, false],
1361 "Locked": [true, false],
1362 "Cryptomining": [true, false],
1363 "Fingerprinting": [true, false]
1364 }
1365 }
1366 ```
1367 ### EnterprisePoliciesEnabled
1368 Enable policy support on macOS.
1369
1370 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1371 **CCK2 Equivalent:** N/A\
1372 **Preferences Affected:** N/A
1373
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>EnterprisePoliciesEnabled</key>
1378 <true/>
1379 </dict>
1380 ```
1381 ### Extensions
1382 Control the installation, uninstallation and locking of extensions.
1383
1384 `Install` is a list of URLs or native paths for extensions to be installed.
1385
1386 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1387
1388 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1389
1390 **Compatibility:** Firefox 60, Firefox ESR 60\
1391 **CCK2 Equivalent:** `addons`\
1392 **Preferences Affected:** N/A
1393
1394 #### Windows (GPO)
1395 ```
1396 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1397 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1398 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1399 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1400 ```
1401 #### macOS
1402 ```
1403 <dict>
1404 <key>Extensions</key>
1405 <dict>
1406 <key>Install</key>
1407 <array>
1408 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1409 <string>//path/to/xpi</string>
1410 </array>
1411 <key>Uninstall</key>
1412 <array>
1413 <string>bad_addon_id@mozilla.org</string>
1414 </array>
1415 <key>Locked</key>
1416 <array>
1417 <string>addon_id@mozilla.org</string>
1418 </array>
1419 </dict>
1420 </dict>
1421 ```
1422 #### policies.json
1423 ```
1424 {
1425 "policies": {
1426 "Extensions": {
1427 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1428 "Uninstall": ["bad_addon_id@mozilla.org"],
1429 "Locked": ["addon_id@mozilla.org"]
1430 }
1431 }
1432 }
1433 ```
1434 ### ExtensionSettings
1435 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1436
1437 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1438
1439 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1440
1441 The configuration for each extension is another dictionary that can contain the fields documented below.
1442
1443 | Name | Description |
1444 | --- | --- |
1445 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1446 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1447 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1448 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1449 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1450 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1451 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1452 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1453 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1454
1455 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1456 **CCK2 Equivalent:** N/A\
1457 **Preferences Affected:** N/A
1458
1459 #### Windows (GPO)
1460 ```
1461 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1462 {
1463 "*": {
1464 "blocked_install_message": "Custom error message.",
1465 "install_sources": ["https://addons.mozilla.org/"],
1466 "installation_mode": "blocked",
1467 "allowed_types": ["extension"]
1468 },
1469 "uBlock0@raymondhill.net": {
1470 "installation_mode": "force_installed",
1471 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1472 }
1473 }
1474 ```
1475 #### macOS
1476 ```
1477 <dict>
1478 <key>ExtensionSettings</key>
1479 <dict>
1480 <key>*</key>
1481 <dict>
1482 <key>blocked_install_message</key>
1483 <string>Custom error message.</string>
1484 <key>install_sources</key>
1485 <array>
1486 <string>https://addons.mozilla.org/</string>
1487 </array>
1488 <key>installation_mode</key>
1489 <string>blocked</string>
1490 <key>allowed_types</key>
1491 <array>
1492 <string>extension</string>
1493 </array>
1494 </dict>
1495 <key>uBlock0@raymondhill.net</key>
1496 <dict>
1497 <key>installation_mode</key>
1498 <string>force_installed</string>
1499 <key>install_url</key>
1500 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1501 </dict>
1502 </dict>
1503 </dict>
1504 ```
1505 #### policies.json
1506 ```
1507 {
1508 "policies": {
1509 "ExtensionSettings": {
1510 "*": {
1511 "blocked_install_message": "Custom error message.",
1512 "install_sources": ["https://addons.mozilla.org/"],
1513 "installation_mode": "blocked",
1514 "allowed_types": ["extension"]
1515 },
1516 "uBlock0@raymondhill.net": {
1517 "installation_mode": "force_installed",
1518 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1519 }
1520 }
1521 }
1522 }
1523 ```
1524 ### ExtensionUpdate
1525 Control extension updates.
1526
1527 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1528 **CCK2 Equivalent:** N/A\
1529 **Preferences Affected:** `extensions.update.enabled`
1530
1531 #### Windows (GPO)
1532 ```
1533 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1534 ```
1535 #### macOS
1536 ```
1537 <dict>
1538 <key>ExtensionUpdate</key>
1539 <true/> | <false/>
1540 </dict>
1541 ```
1542 #### policies.json
1543 ```
1544 {
1545 "policies": {
1546 "ExtensionUpdate": true | false
1547 }
1548 }
1549 ```
1550 ### FlashPlugin
1551 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1552
1553 `Allow` is a list of origins where Flash are allowed.
1554
1555 `Block` is a list of origins where Flash is not allowed.
1556
1557 `Default` determines whether or not Flash is allowed by default.
1558
1559 `Locked` prevents the user from changing Flash preferences.
1560
1561 **Compatibility:** Firefox 60, Firefox ESR 60\
1562 **CCK2 Equivalent:** `permissions.plugin`\
1563 **Preferences Affected:** `plugin.state.flash`
1564
1565 #### Windows (GPO)
1566 ```
1567 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1568 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1569 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1570 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1571 ```
1572 #### macOS
1573 ```
1574 <dict>
1575 <key>FlashPlugin</key>
1576 <dict>
1577 <key>Allow</key>
1578 <array>
1579 <string>http://example.org</string>
1580 </array>
1581 <key>Block</key>
1582 <array>
1583 <string>http://example.edu</string>
1584 </array>
1585 <key>Default</key>
1586 <true/> | <false/>
1587 <key>Locked</key>
1588 <true/> | <false/>
1589 </dict>
1590 </dict>
1591 ```
1592 #### policies.json
1593 ```
1594 {
1595 "policies": {
1596 "FlashPlugin": {
1597 "Allow": ["http://example.org/"],
1598 "Block": ["http://example.edu/"],
1599 "Default": true | false,
1600 "Locked": true | false
1601 }
1602 }
1603 }
1604 ```
1605 ### FirefoxHome
1606 Customize the Firefox Home page.
1607
1608 **Compatibility:** Firefox 68, Firefox ESR 68\
1609 **CCK2 Equivalent:** N/A\
1610 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1611
1612 #### Windows (GPO)
1613 ```
1614 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1615 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1616 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1617 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1618 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1619 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1620 ```
1621 #### macOS
1622 ```
1623 <dict>
1624 <key>FirefoxHome</key>
1625 <dict>
1626 <key>Search</key>
1627 <true/> | <false/>
1628 <key>TopSites</key>
1629 <true/> | <false/>
1630 <key>Highlights</key>
1631 <true/> | <false/>
1632 <key>Pocket</key>
1633 <true/> | <false/>
1634 <key>Snippets</key>
1635 <true/> | <false/>
1636 <key>Locked</key>
1637 <true/> | <false/>
1638 </dict>
1639 </dict>
1640 ```
1641 #### policies.json
1642 ```
1643 {
1644 "policies": {
1645 "FirefoxHome": {
1646 "Search": true | false,
1647 "TopSites": true | false,
1648 "Highlights": true | false,
1649 "Pocket": true | false,
1650 "Snippets": true | false,
1651 "Locked": true | false
1652 }
1653 }
1654 }
1655 ```
1656 ### HardwareAcceleration
1657 Control hardware acceleration.
1658
1659 **Compatibility:** Firefox 60, Firefox ESR 60\
1660 **CCK2 Equivalent:** N/A\
1661 **Preferences Affected:** `layers.acceleration.disabled`
1662
1663 #### Windows (GPO)
1664 ```
1665 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1666 ```
1667 #### macOS
1668 ```
1669 <dict>
1670 <key>HardwareAcceleration</key>
1671 <true/> | <false/>
1672 </dict>
1673 ```
1674 #### policies.json
1675 ```
1676 {
1677 "policies": {
1678 "HardwareAcceleration": true | false
1679 }
1680 }
1681 ```
1682 ### Homepage
1683 Configure the default homepage and how Firefox starts.
1684
1685 `URL` is the default homepage.
1686
1687 `Locked` prevents the user from changing homepage preferences.
1688
1689 `Additional` allows for more than one homepage.
1690
1691 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1692
1693 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1694 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1695 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1696
1697 #### Windows (GPO)
1698 ```
1699 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1700 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1701 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1702 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1703 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1704 ```
1705 #### macOS
1706 ```
1707 <dict>
1708 <key>Homepage</key>
1709 <dict>
1710 <key>URL</key>
1711 <string>http://example.com</string>
1712 <key>Locked</key>
1713 <true/> | <false/>
1714 <key>Additional</key>
1715 <array>
1716 <string>http://example.org</string>
1717 <string>http://example.edu</string>
1718 </array>
1719 <key>StartPage</key>
1720 <string>none | homepage | previous-session</string>
1721 </dict>
1722 </dict>
1723 ```
1724 #### policies.json
1725 ```
1726 {
1727 "policies": {
1728 "Homepage": {
1729 "URL": "http://example.com/",
1730 "Locked": true | false,
1731 "Additional": ["http://example.org/",
1732 "http://example.edu/"],
1733 "StartPage": "none" | "homepage" | "previous-session"
1734 }
1735 }
1736 }
1737 ```
1738 ### InstallAddonsPermission
1739 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1740
1741 `Allow` is a list of origins where extension installs are allowed.
1742
1743 `Default` determines whether or not extension installs are allowed by default.
1744
1745 **Compatibility:** Firefox 60, Firefox ESR 60\
1746 **CCK2 Equivalent:** `permissions.install`\
1747 **Preferences Affected:** `xpinstall.enabled`
1748
1749 #### Windows (GPO)
1750 ```
1751 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1752 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1753 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1754 ```
1755 #### macOS
1756 ```
1757 <dict>
1758 <key>InstallAddonsPermission</key>
1759 <dict>
1760 <key>Allow</key>
1761 <array>
1762 <string>http://example.org</string>
1763 <string>http://example.edu</string>
1764 </array>
1765 <key>Default</key>
1766 <true/> | <false/>
1767 </dict>
1768 </dict>
1769 ```
1770 #### policies.json
1771 ```
1772 {
1773 "policies": {
1774 "InstallAddonsPermission": {
1775 "Allow": ["http://example.org/",
1776 "http://example.edu/"],
1777 "Default": true | false
1778 }
1779 }
1780 }
1781 ```
1782 ### LegacyProfiles
1783 Disable the feature enforcing a separate profile for each installation.
1784
1785 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1786
1787 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1788
1789 This policy only work on Windows via GPO (not policies.json).
1790
1791 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1792 **CCK2 Equivalent:** N/A\
1793 **Preferences Affected:** N/A
1794
1795 #### Windows (GPO)
1796 ```
1797 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1798 ```
1799 ### LocalFileLinks
1800 Enable linking to local files by origin.
1801
1802 **Compatibility:** Firefox 68, Firefox ESR 68\
1803 **CCK2 Equivalent:** N/A\
1804 **Preferences Affected:** `capability.policy.localfilelinks.*`
1805
1806 #### Windows (GPO)
1807 ```
1808 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1809 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1810 ```
1811 #### macOS
1812 ```
1813 <dict>
1814 <key>LocalFileLinks</key>
1815 <array>
1816 <string>http://example.org</string>
1817 <string>http://example.edu</string>
1818 </array>
1819 </dict>
1820 ```
1821 #### policies.json
1822 ```
1823 {
1824 "policies": {
1825 "LocalFileLinks": ["http://example.org/",
1826 "http://example.edu/"]
1827 }
1828 }
1829 ```
1830 ### NoDefaultBookmarks
1831 Disable the creation of default bookmarks.
1832
1833 This policy is only effective if the user profile has not been created yet.
1834
1835 **Compatibility:** Firefox 60, Firefox ESR 60\
1836 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1837 **Preferences Affected:** N/A
1838
1839 #### Windows (GPO)
1840 ```
1841 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1842 ```
1843 #### macOS
1844 ```
1845 <dict>
1846 <key>NoDefaultBookmarks</key>
1847 <true/> | <false/>
1848 </dict>
1849 ```
1850 #### policies.json
1851 ```
1852 {
1853 "policies": {
1854 "NoDefaultBookmarks": true | false
1855 }
1856 }
1857 ```
1858 ### NetworkPrediction
1859 Enable or disable network prediction (DNS prefetching).
1860
1861 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1862 **CCK2 Equivalent:** N/A\
1863 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1864
1865 #### Windows (GPO)
1866 ```
1867 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1868 ```
1869 #### macOS
1870 ```
1871 <dict>
1872 <key>NetworkPrediction</key>
1873 <true/> | <false/>
1874 </dict>
1875 ```
1876 #### policies.json
1877 ```
1878 {
1879 "policies": {
1880 "NetworkPrediction": true | false
1881 }
1882 ```
1883 ### NewTabPage
1884 Enable or disable the New Tab page.
1885
1886 **Compatibility:** Firefox 68, Firefox ESR 68\
1887 **CCK2 Equivalent:** N/A\
1888 **Preferences Affected:** `browser.newtabpage.enabled`
1889
1890 #### Windows (GPO)
1891 ```
1892 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1893 ```
1894 #### macOS
1895 ```
1896 <dict>
1897 <key>NewTabPage</key>
1898 <true/> | <false/>
1899 </dict>
1900 ```
1901 #### policies.json
1902 ```
1903 {
1904 "policies": {
1905 "NewTabPage": true | false
1906 }
1907 ```
1908 ### OfferToSaveLogins
1909 Control whether or not Firefox offers to save passwords.
1910
1911 **Compatibility:** Firefox 60, Firefox ESR 60\
1912 **CCK2 Equivalent:** `dontRememberPasswords`\
1913 **Preferences Affected:** `signon.rememberSignons`
1914
1915 #### Windows (GPO)
1916 ```
1917 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1918 ```
1919 #### macOS
1920 ```
1921 <dict>
1922 <key>OfferToSaveLogins</key>
1923 <true/> | <false/>
1924 </dict>
1925 ```
1926 #### policies.json
1927 ```
1928 {
1929 "policies": {
1930 "OfferToSaveLogins": true | false
1931 }
1932 }
1933 ```
1934 ### OfferToSaveLoginsDefault
1935 Sets the default value of signon.rememberSignons without locking it.
1936
1937 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1938 **CCK2 Equivalent:** `dontRememberPasswords`\
1939 **Preferences Affected:** `signon.rememberSignons`
1940
1941 #### Windows (GPO)
1942 ```
1943 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1944 ```
1945 #### macOS
1946 ```
1947 <dict>
1948 <key>OfferToSaveLoginsDefault</key>
1949 <true/> | <false/>
1950 </dict>
1951 ```
1952 #### policies.json
1953 ```
1954 {
1955 "policies": {
1956 "OfferToSaveLoginsDefault": true | false
1957 }
1958 }
1959 ```
1960 ### OverrideFirstRunPage
1961 Override the first run page. If the value is blank, no first run page is displayed.
1962
1963 **Compatibility:** Firefox 60, Firefox ESR 60\
1964 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1965 **Preferences Affected:** `startup.homepage_welcome_url`
1966
1967 #### Windows (GPO)
1968 ```
1969 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1970 ```
1971 #### macOS
1972 ```
1973 <dict>
1974 <key>OverrideFirstRunPage</key>
1975 <string>http://example.org</string>
1976 </dict>
1977 ```
1978 #### policies.json
1979 ```
1980 {
1981 "policies": {
1982 "OverrideFirstRunPage": "http://example.org"
1983 }
1984 ```
1985 ### OverridePostUpdatePage
1986 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1987
1988 **Compatibility:** Firefox 60, Firefox ESR 60\
1989 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1990 **Preferences Affected:** `startup.homepage_override_url`
1991
1992 #### Windows (GPO)
1993 ```
1994 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1995 ```
1996 #### macOS
1997 ```
1998 <dict>
1999 <key>OverridePostUpdatePage</key>
2000 <string>http://example.org</string>
2001 </dict>
2002 ```
2003 #### policies.json
2004 ```
2005 {
2006 "policies": {
2007 "OverridePostUpdatePage": "http://example.org"
2008 }
2009 ```
2010 ### PasswordManagerEnabled
2011 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2012
2013 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2014 **CCK2 Equivalent:** N/A\
2015 **Preferences Affected:** `prefs.privacy.disable_button.view_passwords`
2016
2017 #### Windows (GPO)
2018 ```
2019 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2020 ```
2021 #### macOS
2022 ```
2023 <dict>
2024 <key>PasswordManagerEnabled</key>
2025 <true/> | <false/>
2026 </dict>
2027 ```
2028 #### policies.json
2029 ```
2030 {
2031 "policies": {
2032 "PasswordManagerEnabled": true | false
2033 }
2034 }
2035 ```
2036 ### Permissions
2037 Set permissions associated with camera, microphone, location, and notifications. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2038
2039 `Allow` is a list of origins where the feature is allowed.
2040
2041 `Block` is a list of origins where the feature is not allowed.
2042
2043 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2044
2045 `Locked` prevents the user from changing preferences for the feature.
2046
2047 **Compatibility:** Firefox 62, Firefox ESR 60.2\
2048 **CCK2 Equivalent:** N/A\
2049 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2050
2051 #### Windows (GPO)
2052 ```
2053 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2054 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2055 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2056 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2057 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2058 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2059 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2060 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2061 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2062 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2063 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2064 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2065 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2066 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2067 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2068 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2069 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2070 ```
2071 #### macOS
2072 ```
2073 <dict>
2074 <key>Permissions</key>
2075 <dict>
2076 <key>Camera</key>
2077 <dict>
2078 <key>Allow</key>
2079 <array>
2080 <string>https://example.org</string>
2081 <string>https://example.org:1234</string>
2082 </array>
2083 <key>Block</key>
2084 <array>
2085 <string>https://example.edu</string>
2086 </array>
2087 <key>BlockNewRequests</key>
2088 <true/>
2089 <key>Locked</key>
2090 <true/>
2091 </dict>
2092 <key>Microphone</key>
2093 <dict>
2094 <key>Allow</key>
2095 <array>
2096 <string>https://example.org</string>
2097 </array>
2098 <key>Block</key>
2099 <array>
2100 <string>https://example.edu</string>
2101 </array>
2102 <key>BlockNewRequests</key>
2103 <true/>
2104 <key>Locked</key>
2105 <true/>
2106 </dict>
2107 <key>Location</key>
2108 <dict>
2109 <key>Allow</key>
2110 <array>
2111 <string>https://example.org</string>
2112 </array>
2113 <key>Block</key>
2114 <array>
2115 <string>https://example.edu</string>
2116 </array>
2117 <key>BlockNewRequests</key>
2118 <true/>
2119 <key>Locked</key>
2120 <true/>
2121 </dict>
2122 <key>Notifications</key>
2123 <dict>
2124 <key>Allow</key>
2125 <array>
2126 <string>https://example.org</string>
2127 </array>
2128 <key>Block</key>
2129 <array>
2130 <string>https://example.edu</string>
2131 </array>
2132 <key>BlockNewRequests</key>
2133 <true/>
2134 <key>Locked</key>
2135 <true/>
2136 </dict>
2137 </dict>
2138 </dict>
2139 ```
2140 #### policies.json
2141 ```
2142 {
2143 "policies": {
2144 "Permissions": {
2145 "Camera": {
2146 "Allow": ["https://example.org","https://example.org:1234"],
2147 "Block": ["https://example.edu"],
2148 "BlockNewRequests": true | false,
2149 "Locked": true | false
2150 },
2151 "Microphone": {
2152 "Allow": ["https://example.org"],
2153 "Block": ["https://example.edu"],
2154 "BlockNewRequests": true | false,
2155 "Locked": true | false
2156 },
2157 "Location": {
2158 "Allow": ["https://example.org"],
2159 "Block": ["https://example.edu"],
2160 "BlockNewRequests": true | false,
2161 "Locked": true | false
2162 },
2163 "Notifications": {
2164 "Allow": ["https://example.org"],
2165 "Block": ["https://example.edu"],
2166 "BlockNewRequests": true | false,
2167 "Locked": true | false
2168 }
2169 }
2170 }
2171 }
2172 ```
2173 ### PopupBlocking
2174 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2175
2176 `Allow` is a list of origins where popup-windows are allowed.
2177
2178 `Default` determines whether or not pop-up windows are allowed by default.
2179
2180 `Locked` prevents the user from changing pop-up preferences.
2181
2182 **Compatibility:** Firefox 60, Firefox ESR 60\
2183 **CCK2 Equivalent:** `permissions.popup`\
2184 **Preferences Affected:** `dom.disable_open_during_load`
2185
2186 #### Windows (GPO)
2187 ```
2188 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2189 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2190 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2191 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2192 ```
2193 #### macOS
2194 ```
2195 <dict>
2196 <key>PopupBlocking</key>
2197 <dict>
2198 <key>Allow</key>
2199 <array>
2200 <string>http://example.org</string>
2201 <string>http://example.edu</string>
2202 </array>
2203 <key>Default</key>
2204 <true/> | <false/>
2205 <key>Locked</key>
2206 <true/> | <false/>
2207 </dict>
2208 </dict>
2209 ```
2210 #### policies.json
2211 ```
2212 {
2213 "policies": {
2214 "PopupBlocking": {
2215 "Allow": ["http://example.org/",
2216 "http://example.edu/"],
2217 "Default": true | false,
2218 "Locked": true | false
2219 }
2220 }
2221 }
2222 ```
2223 ### Preferences
2224 Set and lock certain preferences.
2225
2226 **Compatibility:** See below\
2227 **CCK2 Equivalent:** `preferences`\
2228 **Preferences Affected:** See below
2229
2230 | Preference | Type | Compatibility | Default
2231 | --- | --- | --- | ---
2232 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2233 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2234 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2235 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2236 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2237 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2238 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2239 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2240 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2241 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2242 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2243 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2244 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2245 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2246 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2247 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2248 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2249 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2250 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2251 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2252 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2253 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2254 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2255 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2256 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2257 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2258 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2259 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2260 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2261 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2262 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2263 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2264 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2265 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2266 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2267 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2268 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2269 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2270 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2271 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2272 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2273 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2274 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2275 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2276 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2277 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2278 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2279 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2280 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2281 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2282 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2283 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2284 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2285 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2286 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2287 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2288 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2289 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2290 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2291 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2292 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2293 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2294 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2295 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2296 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2297 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2298 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2299 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2300 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2301 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2302 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2303 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2304 disabled
2305 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2306 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2307 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2308 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2309 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2310 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2311 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2312 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2313 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2314 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2315 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2316 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2317 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2318 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2319 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2320 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2321 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2323 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2324 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2325 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2326 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2327 #### Windows (GPO)
2328 ```
2329 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2330 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2331 ```
2332 #### macOS
2333 ```
2334 <dict>
2335 <key>Preferences</key>
2336 <dict>
2337 <key>boolean_preference_name</key>
2338 <true/> | <false/>
2339 <key>string_preference_name</key>
2340 <string>string_value</string>
2341 </dict>
2342 </dict>
2343 ```
2344 #### policies.json
2345 ```
2346 {
2347 "policies": {
2348 "Preferences": {
2349 "boolean_preference_name": true | false,
2350 "string_preference_name": "string_value"
2351 }
2352 }
2353 }
2354 ```
2355 ### PromptForDownloadLocation
2356 Ask where to save each file before downloading.
2357
2358 **Compatibility:** Firefox 68, Firefox ESR 68\
2359 **CCK2 Equivalent:** N/A
2360 **Preferences Affected:** `browser.download.useDownloadDir`
2361
2362 #### Windows (GPO)
2363 ```
2364 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2365 ```
2366 #### macOS
2367 ```
2368 <dict>
2369 <key>PromptForDownloadLocation</key>
2370 <true/> | <false/>
2371 </dict>
2372 ```
2373 #### policies.json
2374 ```
2375 {
2376 "policies": {
2377 "PromptForDownloadLocation": true | false
2378 }
2379 }
2380 ```
2381 ### Proxy
2382 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2383 To specify ports, append them to the hostnames with a colon (:).
2384
2385 `Mode` is the proxy method being used.
2386
2387 `Locked` is whether or not proxy settings can be changed.
2388
2389 `HTTPProxy` is the HTTP proxy server.
2390
2391 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2392
2393 `SSLProxy` is the SSL proxy server.
2394
2395 `FTPProxy` is the FTP proxy server.
2396
2397 `SOCKSProxy` is the SOCKS proxy server
2398
2399 `SOCKSVersion` is the SOCKS version (4 or 5)
2400
2401 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2402
2403 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2404
2405 `AutoLogin` means do not prompt for authentication if password is saved.
2406
2407 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2408
2409 **Compatibility:** Firefox 60, Firefox ESR 60\
2410 **CCK2 Equivalent:** `networkProxy*`\
2411 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2412
2413 #### Windows (GPO)
2414 ```
2415 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2416 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2417 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2418 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2419 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2420 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2421 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2422 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2423 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2424 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2425 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2426 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2427 ```
2428 #### macOS
2429 ```
2430 <dict>
2431 <key>Proxy</key>
2432 <dict>
2433 <key>Mode</key>
2434 <string>none | system | manual | autoDetect | autoConfig</string>
2435 <key>Locked</key>
2436 <true> | </false>
2437 <key>HTTPProxy</key>
2438 <string>https://httpproxy.example.com</string>
2439 <key>UseHTTPProxyForAllProtocols</key>
2440 <true> | </false>
2441 <key>SSLProxy</key>
2442 <string>https://sslproxy.example.com</string>
2443 <key>FTPProxy</key>
2444 <string>https://ftpproxy.example.com</string>
2445 <key>SOCKSProxy</key>
2446 <string>https://socksproxy.example.com</string>
2447 <key>SOCKSVersion</key>
2448 <string>4 | 5</string>
2449 <key>Passthrough</key>
2450 <string>&lt;local>&gt;</string>
2451 <key>AutoConfigURL</key>
2452 <string>URL_TO_AUTOCONFIG</string>
2453 <key>AutoLogin</key>
2454 <true> | </false>
2455 <key>UseProxyForDNS</key>
2456 <true> | </false>
2457 </dict>
2458 </dict>
2459 ```
2460 #### policies.json
2461 ```
2462 {
2463 "policies": {
2464 "Proxy": {
2465 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2466 "Locked": [true, false],
2467 "HTTPProxy": "hostname",
2468 "UseHTTPProxyForAllProtocols": [true, false],
2469 "SSLProxy": "hostname",
2470 "FTPProxy": "hostname",
2471 "SOCKSProxy": "hostname",
2472 "SOCKSVersion": 4 | 5
2473 "Passthrough": "<local>",
2474 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2475 "AutoLogin": [true, false],
2476 "UseProxyForDNS": [true, false]
2477 }
2478 }
2479 }
2480 ```
2481 ### RequestedLocales
2482 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2483
2484 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2485
2486 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2487 **CCK2 Equivalent:** N/A\
2488 **Preferences Affected:** N/A
2489 #### Windows (GPO)
2490 ```
2491 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2492 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2493
2494 or
2495
2496 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2497 ```
2498 #### macOS
2499 ```
2500 <dict>
2501 <key>RequestedLocales</key>
2502 <array>
2503 <string>de</string>
2504 <string>en-US</string>
2505 </array>
2506 </dict>
2507
2508 or
2509
2510 <dict>
2511 <key>RequestedLocales</key>
2512 <string>de,en-US</string>
2513 </dict>
2514
2515 ```
2516 #### policies.json
2517 ```
2518 {
2519 "policies": {
2520 "RequestedLocales": ["de", "en-US"]
2521 }
2522 }
2523
2524 or
2525
2526 {
2527 "policies": {
2528 "RequestedLocales": "de,en-US"
2529 }
2530 }
2531 ```
2532 ### SanitizeOnShutdown (Selective)
2533 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2534
2535 **Compatibility:** Firefox 68, Firefox ESR 68\
2536 **CCK2 Equivalent:** N/A\
2537 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2538 #### Windows (GPO)
2539 ```
2540 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2541 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2542 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2543 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2544 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2545 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2546 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2547 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2548 ```
2549 #### macOS
2550 ```
2551 <dict>
2552 <key>SanitizeOnShutdown</key>
2553 <dict>
2554 <key>Cache</key>
2555 <true/> | <false/>
2556 <key>Cookies</key>
2557 <true/> | <false/>
2558 <key>Downloads</key>
2559 <true/> | <false/>
2560 <key>FormData</key>
2561 <true/> | <false/>
2562 <key>History</key>
2563 <true/> | <false/>
2564 <key>Sessions</key>
2565 <true/> | <false/>
2566 <key>SiteSettings</key>
2567 <true/> | <false/>
2568 <key>OfflineApps</key>
2569 <true/> | <false/>
2570 </dict>
2571 </dict>
2572 ```
2573 #### policies.json
2574 ```
2575 {
2576 "policies": {
2577 "SanitizeOnShutdown": {
2578 "Cache": true | false,
2579 "Cookies": true | false,
2580 "Downloads": true | false,
2581 "FormData": true | false,
2582 "History": true | false,
2583 "Sessions": true | false,
2584 "SiteSettings": true | false,
2585 "OfflineApps": true | false
2586 }
2587 }
2588 }
2589 ```
2590 ### SanitizeOnShutdown (All)
2591 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2592
2593 **Compatibility:** Firefox 60, Firefox ESR 60\
2594 **CCK2 Equivalent:** N/A\
2595 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2596 #### Windows (GPO)
2597 ```
2598 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2599 ```
2600 #### macOS
2601 ```
2602 <dict>
2603 <key>SanitizeOnShutdown</key>
2604 <true/> | <false/>
2605 </dict>
2606 ```
2607 #### policies.json
2608 ```
2609 {
2610 "policies": {
2611 "SanitizeOnShutdown": true | false
2612 }
2613 }
2614 ```
2615 ### SearchBar
2616 Set whether or not search bar is displayed.
2617
2618 **Compatibility:** Firefox 60, Firefox ESR 60\
2619 **CCK2 Equivalent:** `showSearchBar`\
2620 **Preferences Affected:** N/A
2621
2622 #### Windows (GPO)
2623 ```
2624 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2625 ```
2626 #### macOS
2627 ```
2628 <dict>
2629 <key>SearchBar</key>
2630 <string>unified | separate</string>
2631 </dict>
2632 ```
2633
2634 #### policies.json
2635 ```
2636 {
2637 "policies": {
2638 "SearchBar": "unified" | "separate"
2639 }
2640 }
2641 ```
2642
2643
2644
2645
2646
2647 ### SearchEngines (This policy is only available on the ESR.)
2648
2649 ### SearchEngines | Default
2650
2651 Set the default search engine. This policy is only available on the ESR.
2652
2653 **Compatibility:** Firefox ESR 60\
2654 **CCK2 Equivalent:** `defaultSearchEngine`\
2655 **Preferences Affected:** N/A
2656
2657 #### Windows (GPO)
2658 ```
2659 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2660 ```
2661 #### macOS
2662 ```
2663 <dict>
2664 <key>SearchEngines</key>
2665 <dict>
2666 <key>Default</key>
2667 <string>NAME_OF_SEARCH_ENGINE</string>
2668 </dict>
2669 </dict>
2670 ```
2671 #### policies.json
2672 ```
2673 {
2674 "policies": {
2675 "SearchEngines": {
2676 "Default": "NAME_OF_SEARCH_ENGINE"
2677 }
2678 }
2679 }
2680 ```
2681 ### SearchEngines | PreventInstalls
2682
2683 Prevent installing search engines from webpages.
2684
2685 **Compatibility:** Firefox ESR 60\
2686 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2687 **Preferences Affected:** N/A
2688
2689 #### Windows (GPO)
2690 ```
2691 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2692 ```
2693 #### macOS
2694 ```
2695 <dict>
2696 <key>SearchEngines</key>
2697 <dict>
2698 <key>PreventInstalls</key>
2699 <true/> | <false/>
2700 </dict>
2701 </dict>
2702 ```
2703 #### policies.json
2704 ```
2705 {
2706 "policies": {
2707 "SearchEngines": {
2708 "PreventInstalls": true | false
2709 }
2710 }
2711 }
2712 ```
2713 ### SearchEngines | Remove
2714
2715 Hide built-in search engines. This policy is only available on the ESR.
2716
2717 **Compatibility:** Firefox ESR 60.2\
2718 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2719 **Preferences Affected:** N/A
2720
2721 #### Windows (GPO)
2722 ```
2723 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2724 ```
2725 #### macOS
2726 ```
2727 <dict>
2728 <key>SearchEngines</key>
2729 <dict>
2730 <key>Remove</key>
2731 <array>
2732 <string>NAME_OF_SEARCH_ENGINE</string>
2733 </array>
2734 </dict>
2735 </dict>
2736 ```
2737 #### policies.json
2738 ```
2739 {
2740 "policies": {
2741 "SearchEngines": {
2742 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2743 }
2744 }
2745 }
2746 ```
2747 ### SearchEngines | Add
2748
2749 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2750
2751 `Name` is the name of the search engine.
2752
2753 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2754
2755 `Method` is either GET or POST
2756
2757 `IconURL` is a URL for the icon to use.
2758
2759 `Alias` is a keyword to use for the engine.
2760
2761 `Description` is a description of the search engine.
2762
2763 `PostData` is the POST data as name value pairs separated by &.
2764
2765 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2766
2767 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2768 **CCK2 Equivalent:** `searchplugins`\
2769 **Preferences Affected:** N/A
2770
2771 #### Windows (GPO)
2772 ```
2773 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2774 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2775 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2776 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2777 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2778 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2779 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2780 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2781 ```
2782
2783 #### macOS
2784 ```
2785 <dict>
2786 <key>SearchEngines</key>
2787 <dict>
2788 <key>Add</key>
2789 <array>
2790 <dict>
2791 <key>Name</key>
2792 <string>Example1</string>
2793 <key>URLTemplate</key>
2794 <string>https://www.example.org/q={searchTerms}</string>
2795 <key>Method</key>
2796 <string>GET | POST </string>
2797 <key>IconURL</key>
2798 <string>https://www.example.org/favicon.ico</string>
2799 <key>Alias</key>
2800 <string>example</string>
2801 <key>Description</key>
2802 <string>Example Description</string>
2803 <key>SuggestURLTemplate</key>
2804 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2805 <key>PostData</key>
2806 <string>name=value&q={searchTerms}</string>
2807 </dict>
2808 <array>
2809 </dict>
2810 </dict>
2811 ```
2812 #### policies.json
2813 ```
2814 {
2815 "policies": {
2816 "SearchEngines": {
2817 "Add": [
2818 {
2819 "Name": "Example1",
2820 "URLTemplate": "https://www.example.org/q={searchTerms}",
2821 "Method": "GET" | "POST",
2822 "IconURL": "https://www.example.org/favicon.ico",
2823 "Alias": "example",
2824 "Description": "Description",
2825 "PostData": "name=value&q={searchTerms}",
2826 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2827 }
2828 ]
2829 }
2830 }
2831 }
2832 ```
2833 ### SearchSuggestEnabled
2834
2835 Enable search suggestions.
2836
2837 **Compatibility:** Firefox 68, Firefox ESR 68\
2838 **CCK2 Equivalent:** N/A\
2839 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2840
2841 #### Windows (GPO)
2842 ```
2843 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2844 ```
2845 #### macOS
2846 ```
2847 <dict>
2848 <key>SearchSuggestEnabled</key>
2849 <true/> | <false/>
2850 </dict>
2851 ```
2852 #### policies.json
2853 ```
2854 {
2855 "policies": {
2856 "SearchSuggestEnabled": true | false
2857 }
2858 }
2859 ```
2860 ### SecurityDevices
2861
2862 Install PKCS #11 modules.
2863
2864 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2865 **CCK2 Equivalent:** `certs.devices`\
2866 **Preferences Affected:** N/A
2867
2868 #### Windows (GPO)
2869 ```
2870 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2871 ```
2872 #### macOS
2873 ```
2874 <dict>
2875 <key>SecurityDevices</key>
2876 <dict>
2877 <key>NAME_OF_DEVICE</key>
2878 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2879 </dict>
2880 </dict>
2881 ```
2882
2883 #### policies.json
2884 ```
2885 {
2886 "policies": {
2887 "SecurityDevices": {
2888 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2889 }
2890 }
2891 }
2892 ```
2893 ### SSLVersionMax
2894
2895 Set and lock the maximum version of TLS.
2896
2897 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2898 **CCK2 Equivalent:** N/A\
2899 **Preferences Affected:** `security.tls.version.max`
2900
2901 #### Windows (GPO)
2902 ```
2903 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2904 ```
2905 #### macOS
2906 ```
2907 <dict>
2908 <key>SSLVersionMax</key>
2909 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2910 </dict>
2911 ```
2912
2913 #### policies.json
2914 ```
2915 {
2916 "policies": {
2917 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2918 }
2919 }
2920 ```
2921 ### SSLVersionMin
2922
2923 Set and lock the minimum version of TLS.
2924
2925 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2926 **CCK2 Equivalent:** N/A\
2927 **Preferences Affected:** `security.tls.version.min`
2928
2929 #### Windows (GPO)
2930 ```
2931 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2932 ```
2933 #### macOS
2934 ```
2935 <dict>
2936 <key>SSLVersionMin</key>
2937 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2938 </dict>
2939 ```
2940
2941 #### policies.json
2942 ```
2943 {
2944 "policies": {
2945 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2946 }
2947 }
2948 ```
2949 ### SupportMenu
2950 Add a menuitem to the help menu for specifying support information.
2951
2952 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2953 **CCK2 Equivalent:** helpMenu\
2954 **Preferences Affected:** N/A
2955
2956 #### Windows (GPO)
2957 ```
2958 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2959 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2960 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2961 ```
2962 #### macOS
2963 ```
2964 <dict>
2965 <key>SupportMenu</key>
2966 <dict>
2967 <key>Title</key>
2968 <string>SupportMenu</string>
2969 <key>URL</key>
2970 <string>http://example.com/support</string>
2971 <key>AccessKey</key>
2972 <string>S</string>
2973 </dict>
2974 </dict>
2975 ```
2976 #### policies.json
2977 ```
2978 {
2979 "policies": {
2980 "SupportMenu": {
2981 "Title": "Support Menu",
2982 "URL": "http://example.com/support",
2983 "AccessKey": "S"
2984 }
2985 }
2986 }
2987 ```
2988 ### WebsiteFilter
2989 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2990
2991 **Compatibility:** Firefox 60, Firefox ESR 60\
2992 **CCK2 Equivalent:** N/A\
2993 **Preferences Affected:** N/A
2994
2995 #### Windows (GPO)
2996 ```
2997 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2998 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2999 ```
3000 #### macOS
3001 ```
3002 <dict>
3003 <key>WebsiteFilter</key>
3004 <dict>
3005 <key>Block</key>
3006 <array>
3007 <string><all_urls></string>
3008 </array>
3009 <key>Exceptions</key>
3010 <array>
3011 <string>http://example.org/*</string>
3012 </array>
3013 </dict>
3014
3015 </dict>
3016 ```
3017 #### policies.json
3018 ```
3019 {
3020 "policies": {
3021 "WebsiteFilter": {
3022 "Block": ["<all_urls>"],
3023 "Exceptions": ["http://example.org/*"]
3024 }
3025 }
3026 }
3027 ```

patrick-canterino.de