]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #656 from AlessandroMenti/update-italian-translation
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
573
574 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
575
576 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
577 **CCK2 Equivalent:** N/A\
578 **Preferences Affected:** `security.enterprise_roots.enabled`
579
580 #### Windows (GPO)
581 ```
582 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
583 ```
584 #### Windows (Intune)
585 OMA-URI:
586 ```
587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
588 ```
589 Value (string):
590 ```
591 <enabled/> or <disabled/>
592 ```
593 #### macOS
594 ```
595 <dict>
596 <key>Certificates</key>
597 <dict>
598 <key>ImportEnterpriseRoots</key>
599 <true/> | <false/>
600 </dict>
601 </dict>
602 ```
603 #### policies.json
604 ```
605 {
606 "policies": {
607 "Certificates": {
608 "ImportEnterpriseRoots": true | false
609 }
610 }
611 }
612 ```
613 ### Certificates | Install
614
615 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
616
617 - Windows
618 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
619 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
620 - macOS
621 - /Library/Application Support/Mozilla/Certificates
622 - ~/Library/Application Support/Mozilla/Certificates
623 - Linux
624 - /usr/lib/mozilla/certificates
625 - /usr/lib64/mozilla/certificates
626 - ~/.mozilla/certificates
627
628 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
629
630 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
631
632 Certificates are installed using the trust string `CT,CT,`.
633
634 Binary (DER) and ASCII (PEM) certificates are both supported.
635
636 **Compatibility:** Firefox 64, Firefox ESR 64\
637 **CCK2 Equivalent:** `certs.ca`\
638 **Preferences Affected:** N/A
639
640 #### Windows (GPO)
641 ```
642 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
643 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
644 ```
645 #### Windows (Intune)
646 OMA-URI:
647 ```
648 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
649 ```
650 Value (string):
651 ```
652 <enabled/>
653 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
654 ```
655 #### macOS
656 ```
657 <dict>
658 <key>Certificates</key>
659 <dict>
660 <key>Install</key>
661 <array>
662 <string>cert1.der</string>
663 <string>/Users/username/cert2.pem</string>
664 </array>
665 </dict>
666 </dict>
667 ```
668 #### policies.json
669 ```
670 {
671 "policies": {
672 "Certificates": {
673 "Install": ["cert1.der", "/home/username/cert2.pem"]
674 }
675 }
676 }
677 ```
678 ### Cookies
679 Configure cookie preferences.
680
681 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
682
683 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
684
685 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
686
687 `Default` determines whether cookies are accepted at all.
688
689 `AcceptThirdParty` determines how third-party cookies are handled.
690
691 `ExpireAtSessionEnd` determines when cookies expire.
692
693 `RejectTracker` only rejects cookies for trackers.
694
695 `Locked` prevents the user from changing cookie preferences.
696
697 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1)\
698 **CCK2 Equivalent:** N/A\
699 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
700
701 #### Windows (GPO)
702 ```
703 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
704 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
705 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
706 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
707 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
708 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
709 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
710 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
711 ```
712 #### Windows (Intune)
713 OMA-URI:
714 ```
715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
716 ```
717 Value (string):
718 ```
719 <enabled/>
720 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
721 ```
722 OMA-URI:
723 ```
724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
725 ```
726 Value (string):
727 ```
728 <enabled/>
729 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
730 ```
731 OMA-URI:
732 ```
733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
734 ```
735 Value (string):
736 ```
737 <enabled/>
738 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
739 ```
740 OMA-URI:
741 ```
742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
743 ```
744 Value (string):
745 ```
746 <enabled/> or <disabled/>
747 ```
748 OMA-URI:
749 ```
750 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
751 ```
752 Value (string):
753 ```
754 <enabled/>
755 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
756 ```
757 OMA-URI:
758 ```
759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
760 ```
761 Value (string):
762 ```
763 <enabled/> or <disabled/>
764 ```
765 OMA-URI:
766 ```
767 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
768 ```
769 Value (string):
770 ```
771 <enabled/> or <disabled/>
772 ```
773 OMA-URI:
774 ```
775 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
776 ```
777 Value (string):
778 ```
779 <enabled/> or <disabled/>
780 ```
781 #### macOS
782 ```
783 <dict>
784 <key>Cookies</key>
785 <dict>
786 <key>Allow</key>
787 <array>
788 <string>http://example.com</string>
789 </array>
790 <key>AllowSession</key>
791 <array>
792 <string>http://example.edu</string>
793 </array>
794 <key>Block</key>
795 <array>
796 <string>http://example.org</string>
797 </array>
798 <key>Default</key>
799 <true/> | <false/>
800 <key>AcceptThirdParty</key>
801 <string>always | never | from-visited</string>
802 <key>ExpireAtSessionEnd</key>
803 <true/> | <false/>
804 <key>RejectTracker</key>
805 <true/> | <false/>
806 <key>Locked</key>
807 <true/> | <false/>
808 </dict>
809 </dict>
810 ```
811 #### policies.json
812 ```
813 {
814 "policies": {
815 "Cookies": {
816 "Allow": ["http://example.org/"],
817 "AllowSession": ["http://example.edu/"],
818 "Block": ["http://example.edu/"],
819 "Default": true | false,
820 "AcceptThirdParty": "always" | "never" | "from-visited",
821 "ExpireAtSessionEnd": true | false,
822 "RejectTracker": true | false,
823 "Locked": true | false
824 }
825 }
826 }
827 ```
828 ### DisableSetDesktopBackground
829 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
830
831 **Compatibility:** Firefox 60, Firefox ESR 60\
832 **CCK2 Equivalent:** `removeSetDesktopBackground`\
833 **Preferences Affected:** N/A
834
835 #### Windows (GPO)
836 ```
837 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
838 ```
839 #### Windows (Intune)
840 OMA-URI:
841 ```
842 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
843 ```
844 Value (string):
845 ```
846 <enabled/> or <disabled/>
847 ```
848 #### macOS
849 ```
850 <dict>
851 <key>DisableSetDesktopBackground</key>
852 <true/> | <false/>
853 </dict>
854 ```
855 #### policies.json
856 ```
857 {
858 "policies": {
859 "DisableSetDesktopBackground": true | false
860 }
861 }
862 ```
863 ### DisableMasterPasswordCreation
864 Remove the master password functionality.
865
866 **Compatibility:** Firefox 60, Firefox ESR 60\
867 **CCK2 Equivalent:** `noMasterPassword`\
868 **Preferences Affected:** N/A
869
870 #### Windows (GPO)
871 ```
872 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
873 ```
874 #### Windows (Intune)
875 OMA-URI:
876 ```
877 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
878 ```
879 Value (string):
880 ```
881 <enabled/> or <disabled/>
882 ```
883 #### macOS
884 ```
885 <dict>
886 <key>DisableMasterPasswordCreation</key>
887 <true/> | <false/>
888 </dict>
889 ```
890 #### policies.json
891 ```
892 {
893 "policies": {
894 "DisableMasterPasswordCreation": true | false
895 }
896 }
897 ```
898 ### DisableAppUpdate
899 Turn off application updates.
900
901 **Compatibility:** Firefox 60, Firefox ESR 60\
902 **CCK2 Equivalent:** `disableFirefoxUpdates`\
903 **Preferences Affected:** N/A
904
905 #### Windows (GPO)
906 ```
907 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
908 ```
909 #### Windows (Intune)
910 OMA-URI:
911 ```
912 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
913 ```
914 Value (string):
915 ```
916 <enabled/> or <disabled/>
917 ```
918 #### macOS
919 ```
920 <dict>
921 <key>DisableAppUpdate</key>
922 <true/> | <false/>
923 </dict>
924 ```
925 #### policies.json
926 ```
927 {
928 "policies": {
929 "DisableAppUpdate": true | false
930 }
931 }
932 ```
933 ### DisableBuiltinPDFViewer
934 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
935
936 **Compatibility:** Firefox 60, Firefox ESR 60\
937 **CCK2 Equivalent:** `disablePDFjs`\
938 **Preferences Affected:** `pdfjs.disabled`
939
940 #### Windows (GPO)
941 ```
942 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
943 ```
944 #### Windows (Intune)
945 OMA-URI:
946 ```
947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
948 ```
949 Value (string):
950 ```
951 <enabled/> or <disabled/>
952 ```
953 #### macOS
954 ```
955 <dict>
956 <key>DisableBuiltinPDFViewer</key>
957 <true/> | <false/>
958 </dict>
959 ```
960 #### policies.json
961 ```
962 {
963 "policies": {
964 "DisableBuiltinPDFViewer": true | false
965 }
966 }
967 ```
968 ### DisabledCiphers
969 Disable specific cryptographic ciphers.
970
971 ---
972 **Note:**
973
974 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
975
976 ---
977 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
978 **CCK2 Equivalent:** N/A\
979 **Preferences Affected:** N/A
980
981 #### Windows (GPO)
982 ```
983 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
984 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
985 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
986 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
987 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
988 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
989 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
990 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
991 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
992 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
993 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
994 ```
995 #### Windows (Intune)
996 OMA-URI:
997 ```
998 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1000 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1002 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1004 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1005 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1006 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1007 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1009 ```
1010 Value (string):
1011 ```
1012 <enabled/> or <disabled/>
1013 ```
1014 #### macOS
1015 ```
1016 <dict>
1017 <key>DisabledCiphers</key>
1018 <dict>
1019 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1020 <true/> | <false/>
1021 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1022 <true/> | <false/>
1023 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1024 <true/> | <false/>
1025 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1026 <true/> | <false/>
1027 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1028 <true/> | <false/>
1029 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1030 <true/> | <false/>
1031 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1032 <true/> | <false/>
1033 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1034 <true/> | <false/>
1035 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1036 <true/> | <false/>
1037 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1038 <true/> | <false/>
1039 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1040 <true/> | <false/>
1041 </dict>
1042 </dict>
1043 ```
1044 #### policies.json
1045 ```
1046 {
1047 "policies": {
1048 "DisabledCiphers" {
1049 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1050 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1051 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1052 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1053 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1054 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1055 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1056 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1057 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1058 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1059 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1060 }
1061 }
1062 }
1063 ```
1064 ### DisableDefaultBrowserAgent
1065 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1066
1067 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1068 **CCK2 Equivalent:** N/A\
1069 **Preferences Affected:** N/A
1070
1071 #### Windows (GPO)
1072 ```
1073 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1074 ```
1075 #### Windows (Intune)
1076 OMA-URI:
1077 ```
1078 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1079 ```
1080 Value (string):
1081 ```
1082 <enabled/> or <disabled/>
1083 ```
1084 #### policies.json
1085 ```
1086 {
1087 "policies": {
1088 "DisableDefaultBrowserAgent": true | false
1089 }
1090 }
1091 ```
1092 ### DisableDeveloperTools
1093 Remove access to all developer tools.
1094
1095 **Compatibility:** Firefox 60, Firefox ESR 60\
1096 **CCK2 Equivalent:** `removeDeveloperTools`\
1097 **Preferences Affected:** `devtools.policy.disabled`
1098
1099 #### Windows (GPO)
1100 ```
1101 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1102 ```
1103 #### Windows (Intune)
1104 OMA-URI:
1105 ```
1106 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1107 ```
1108 Value (string):
1109 ```
1110 <enabled/> or <disabled/>
1111 ```
1112 #### macOS
1113 ```
1114 <dict>
1115 <key>DisableDeveloperTools</key>
1116 <true/> | <false/>
1117 </dict>
1118 ```
1119 #### policies.json
1120 ```
1121 {
1122 "policies": {
1123 "DisableDeveloperTools": true | false
1124 }
1125 }
1126 ```
1127 ### DisableFeedbackCommands
1128 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1129
1130 **Compatibility:** Firefox 60, Firefox ESR 60\
1131 **CCK2 Equivalent:** N/A\
1132 **Preferences Affected:** N/A
1133
1134 #### Windows (GPO)
1135 ```
1136 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1137 ```
1138 #### Windows (Intune)
1139 OMA-URI:
1140 ```
1141 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1142 ```
1143 Value (string):
1144 ```
1145 <enabled/> or <disabled/>
1146 ```
1147 #### macOS
1148 ```
1149 <dict>
1150 <key>DisableFeedbackCommands</key>
1151 <true/> | <false/>
1152 </dict>
1153 ```
1154 #### policies.json
1155 ```
1156 {
1157 "policies": {
1158 "DisableFeedbackCommands": true | false
1159 }
1160 }
1161 ```
1162 ### DisableFirefoxScreenshots
1163 Remove access to Firefox Screenshots.
1164
1165 **Compatibility:** Firefox 60, Firefox ESR 60\
1166 **CCK2 Equivalent:** N/A\
1167 **Preferences Affected:** `extensions.screenshots.disabled`
1168
1169 #### Windows (GPO)
1170 ```
1171 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1172 ```
1173 #### Windows (Intune)
1174 OMA-URI:
1175 ```
1176 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1177 ```
1178 Value (string):
1179 ```
1180 <enabled/> or <disabled/>
1181 ```
1182 #### macOS
1183 ```
1184 <dict>
1185 <key>DisableFirefoxScreenshots</key>
1186 <true/> | <false/>
1187 </dict>
1188 ```
1189 #### policies.json
1190 ```
1191 {
1192 "policies": {
1193 "DisableFirefoxScreenshots": true | false
1194 }
1195 }
1196 ```
1197 ### DisableFirefoxAccounts
1198 Disable Firefox Accounts integration (Sync).
1199
1200 **Compatibility:** Firefox 60, Firefox ESR 60\
1201 **CCK2 Equivalent:** `disableSync`\
1202 **Preferences Affected:** `identity.fxaccounts.enabled`
1203
1204 #### Windows (GPO)
1205 ```
1206 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1207 ```
1208 #### Windows (Intune)
1209 OMA-URI:
1210 ```
1211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1212 ```
1213 Value (string):
1214 ```
1215 <enabled/> or <disabled/>
1216 ```
1217 #### macOS
1218 ```
1219 <dict>
1220 <key>DisableFirefoxAccounts</key>
1221 <true/> | <false/>
1222 </dict>
1223 ```
1224 #### policies.json
1225 ```
1226 {
1227 "policies": {
1228 "DisableFirefoxAccounts": true | false
1229 }
1230 }
1231 ```
1232 ### DisableFirefoxStudies
1233 Disable Firefox studies (Shield).
1234
1235 **Compatibility:** Firefox 60, Firefox ESR 60\
1236 **CCK2 Equivalent:** N/A\
1237 **Preferences Affected:** N/A
1238
1239 #### Windows (GPO)
1240 ```
1241 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1242 ```
1243 #### Windows (Intune)
1244 OMA-URI:
1245 ```
1246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1247 ```
1248 Value (string):
1249 ```
1250 <enabled/> or <disabled/>
1251 ```
1252 #### macOS
1253 ```
1254 <dict>
1255 <key>DisableFirefoxStudies</key>
1256 <true/> | <false/>
1257 </dict>
1258 ```
1259 #### policies.json
1260 ```
1261 {
1262 "policies": {
1263 "DisableFirefoxStudies": true | false
1264 }
1265 }
1266 ```
1267 ### DisableForgetButton
1268 Disable the "Forget" button.
1269
1270 **Compatibility:** Firefox 60, Firefox ESR 60\
1271 **CCK2 Equivalent:** `disableForget`\
1272 **Preferences Affected:** N/A
1273
1274 #### Windows (GPO)
1275 ```
1276 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1277 ```
1278 #### Windows (Intune)
1279 OMA-URI:
1280 ```
1281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1282 ```
1283 Value (string):
1284 ```
1285 <enabled/> or <disabled/>
1286 ```
1287 #### macOS
1288 ```
1289 <dict>
1290 <key>DisableForgetButton</key>
1291 <true/> | <false/>
1292 </dict>
1293 ```
1294 #### policies.json
1295 ```
1296 {
1297 "policies": {
1298 "DisableForgetButton": true | false
1299 }
1300 }
1301 ```
1302 ### DisableFormHistory
1303 Turn off saving information on web forms and the search bar.
1304
1305 **Compatibility:** Firefox 60, Firefox ESR 60\
1306 **CCK2 Equivalent:** `disableFormFill`\
1307 **Preferences Affected:** ` browser.formfill.enable`
1308
1309 #### Windows (GPO)
1310 ```
1311 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1312 ```
1313 #### Windows (Intune)
1314 OMA-URI:
1315 ```
1316 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1317 ```
1318 Value (string):
1319 ```
1320 <enabled/> or <disabled/>
1321 ```
1322 #### macOS
1323 ```
1324 <dict>
1325 <key>DisableFormHistory</key>
1326 <true/> | <false/>
1327 </dict>
1328 ```
1329 #### policies.json
1330 ```
1331 {
1332 "policies": {
1333 "DisableFormHistory": true | false
1334 }
1335 }
1336 ```
1337 ### DisablePasswordReveal
1338 Do not allow passwords to be shown in saved logins
1339
1340 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1341 **CCK2 Equivalent:** N/A
1342 **Preferences Affected:** N/A
1343
1344 #### Windows (GPO)
1345 ```
1346 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1347 ```
1348 #### Windows (Intune)
1349 OMA-URI:
1350 ```
1351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1352 ```
1353 Value (string):
1354 ```
1355 <enabled/> or <disabled/>
1356 ```
1357 #### macOS
1358 ```
1359 <dict>
1360 <key>DisablePasswordReveal</key>
1361 <true/> | <false/>
1362 </dict>
1363 ```
1364 #### policies.json
1365 ```
1366 {
1367 "policies": {
1368 "DisablePasswordReveal": true | false
1369 }
1370 }
1371 ```
1372 ### DisablePocket
1373 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1374
1375 **Compatibility:** Firefox 60, Firefox ESR 60\
1376 **CCK2 Equivalent:** `disablePocket`\
1377 **Preferences Affected:** `extensions.pocket.enabled`
1378
1379 #### Windows (GPO)
1380 ```
1381 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1382 ```
1383 #### Windows (Intune)
1384 OMA-URI:
1385 ```
1386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1387 ```
1388 Value (string):
1389 ```
1390 <enabled/> or <disabled/>
1391 ```
1392 #### macOS
1393 ```
1394 <dict>
1395 <key>DisablePocket</key>
1396 <true/> | <false/>
1397 </dict>
1398 ```
1399 #### policies.json
1400 ```
1401 {
1402 "policies": {
1403 "DisablePocket": true | false
1404 }
1405 }
1406 ```
1407 ### DisablePrivateBrowsing
1408 Remove access to private browsing.
1409
1410 **Compatibility:** Firefox 60, Firefox ESR 60\
1411 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1412 **Preferences Affected:** N/A
1413
1414 #### Windows (GPO)
1415 ```
1416 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1417 ```
1418 #### Windows (Intune)
1419 OMA-URI:
1420 ```
1421 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1422 ```
1423 Value (string):
1424 ```
1425 <enabled/> or <disabled/>
1426 ```
1427 #### macOS
1428 ```
1429 <dict>
1430 <key>DisablePrivateBrowsing</key>
1431 <true/> | <false/>
1432 </dict>
1433 ```
1434 #### policies.json
1435 ```
1436 {
1437 "policies": {
1438 "DisablePrivateBrowsing": true | false
1439 }
1440 }
1441 ```
1442 ### DisableProfileImport
1443 Disables the "Import data from another browser" option in the bookmarks window.
1444
1445 **Compatibility:** Firefox 60, Firefox ESR 60\
1446 **CCK2 Equivalent:** N/A\
1447 **Preferences Affected:** N/A
1448
1449 #### Windows (GPO)
1450 ```
1451 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1452 ```
1453 #### Windows (Intune)
1454 OMA-URI:
1455 ```
1456 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1457 ```
1458 Value (string):
1459 ```
1460 <enabled/> or <disabled/>
1461 ```
1462 #### macOS
1463 ```
1464 <dict>
1465 <key>DisableProfileImport</key>
1466 <true/> | <false/>
1467 </dict>
1468 ```
1469 #### policies.json
1470 ```
1471 {
1472 "policies": {
1473 "DisableProfileImport": true | false
1474 }
1475 }
1476 ```
1477 ### DisableProfileRefresh
1478 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1479
1480 **Compatibility:** Firefox 60, Firefox ESR 60\
1481 **CCK2 Equivalent:** `disableResetFirefox`\
1482 **Preferences Affected:** `browser.disableResetPrompt`
1483
1484 #### Windows (GPO)
1485 ```
1486 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1487 ```
1488 #### Windows (Intune)
1489 OMA-URI:
1490 ```
1491 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1492 ```
1493 Value (string):
1494 ```
1495 <enabled/> or <disabled/>
1496 ```
1497 #### macOS
1498 ```
1499 <dict>
1500 <key>DisableProfileRefresh</key>
1501 <true/> | <false/>
1502 </dict>
1503 ```
1504 #### policies.json
1505 ```
1506 {
1507 "policies": {
1508 "DisableProfileRefresh": true | false
1509 }
1510 }
1511 ```
1512 ### DisableSafeMode
1513 Disable safe mode within the browser.
1514
1515 On Windows, this disables safe mode via the command line as well.
1516
1517 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1518 **CCK2 Equivalent:** `disableSafeMode`\
1519 **Preferences Affected:** N/A
1520
1521 #### Windows (GPO)
1522 ```
1523 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1524 ```
1525 #### Windows (Intune)
1526 OMA-URI:
1527 ```
1528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1529 ```
1530 Value (string):
1531 ```
1532 <enabled/> or <disabled/>
1533 ```
1534 #### macOS
1535 ```
1536 <dict>
1537 <key>DisableSafeMode</key>
1538 <true/> | <false/>
1539 </dict>
1540 ```
1541 #### policies.json
1542 ```
1543 {
1544 "policies": {
1545 "DisableSafeMode": true | false
1546 }
1547 }
1548 ```
1549 ### DisableSecurityBypass
1550 Prevent the user from bypassing security in certain cases.
1551
1552 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1553
1554 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1555
1556 **Compatibility:** Firefox 60, Firefox ESR 60\
1557 **CCK2 Equivalent:** N/A\
1558 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1559
1560 #### Windows (GPO)
1561 ```
1562 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1563 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1564 ```
1565 #### Windows (Intune)
1566 OMA-URI:
1567 ```
1568 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1569 ```
1570 Value (string):
1571 ```
1572 <enabled/> or <disabled/>
1573 ```
1574 OMA-URI:
1575 ```
1576 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1577 ```
1578 Value (string):
1579 ```
1580 <enabled/> or <disabled/>
1581 ```
1582
1583 #### macOS
1584 ```
1585 <dict>
1586 <key>DisableSecurityBypass</key>
1587 <dict>
1588 <key>InvalidCertificate</key>
1589 <true/> | <false/>
1590 <key><SafeBrowsing/key>
1591 <true/> | <false/>
1592 </dict>
1593 </dict>
1594 ```
1595 #### policies.json
1596 ```
1597 {
1598 "policies": {
1599 "DisableSecurityBypass": {
1600 "InvalidCertificate": true | false,
1601 "SafeBrowsing": true | false
1602 }
1603 }
1604 }
1605 ```
1606 ### DisableSystemAddonUpdate
1607 Prevent system add-ons from being installed or update.
1608
1609 **Compatibility:** Firefox 60, Firefox ESR 60\
1610 **CCK2 Equivalent:** N/A\
1611 **Preferences Affected:** N/A
1612
1613 #### Windows (GPO)
1614 ```
1615 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1616 ```
1617 #### Windows (Intune)
1618 OMA-URI:
1619 ```
1620 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1621 ```
1622 Value (string):
1623 ```
1624 <enabled/> or <disabled/>
1625 ```
1626 #### macOS
1627 ```
1628 <dict>
1629 <key>DisableSystemAddonUpdate</key>
1630 <true/> | <false/>
1631 </dict>
1632 ```
1633 #### policies.json
1634 ```
1635 {
1636 "policies": {
1637 "DisableSystemAddonUpdate": true | false
1638 }
1639 }
1640 ```
1641 ### DisableTelemetry
1642 Prevent the upload of telemetry data.
1643
1644 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1645
1646 **Compatibility:** Firefox 60, Firefox ESR 60\
1647 **CCK2 Equivalent:** `disableTelemetry`\
1648 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1649
1650 #### Windows (GPO)
1651 ```
1652 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1653 ```
1654 #### Windows (Intune)
1655 OMA-URI:
1656 ```
1657 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1658 ```
1659 Value (string):
1660 ```
1661 <enabled/> or <disabled/>
1662 ```
1663 #### macOS
1664 ```
1665 <dict>
1666 <key>DisableTelemetry</key>
1667 <true/> | <false/>
1668 </dict>
1669 ```
1670 #### policies.json
1671 ```
1672 {
1673 "policies": {
1674 "DisableTelemetry": true | false
1675 }
1676 }
1677 ```
1678 ### DisplayBookmarksToolbar
1679 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1680
1681 **Compatibility:** Firefox 60, Firefox ESR 60\
1682 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1683 **Preferences Affected:** N/A
1684
1685 #### Windows (GPO)
1686 ```
1687 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1688 ```
1689 #### Windows (Intune)
1690 OMA-URI:
1691 ```
1692 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1693 ```
1694 Value (string):
1695 ```
1696 <enabled/> or <disabled/>
1697 ```
1698 #### macOS
1699 ```
1700 <dict>
1701 <key>DisplayBookmarksToolbar</key>
1702 <true/> | <false/>
1703 </dict>
1704 ```
1705 #### policies.json
1706 ```
1707 {
1708 "policies": {
1709 "DisplayBookmarksToolbar": true | false
1710 }
1711 }
1712 ```
1713 ### DisplayMenuBar (Deprecated)
1714 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1715
1716 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1717 **CCK2 Equivalent:** `displayMenuBar`\
1718 **Preferences Affected:** N/A
1719
1720 #### Windows (GPO)
1721 ```
1722 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1723 ```
1724 #### macOS
1725 ```
1726 <dict>
1727 <key>DisplayMenuBar</key>
1728 <true/> | <false/>
1729 </dict>
1730 ```
1731 #### policies.json
1732 ```
1733 {
1734 "policies": {
1735 "DisplayMenuBar": true | false
1736 }
1737 }
1738 ```
1739 ### DisplayMenuBar
1740 Set the state of the menubar.
1741
1742 `always` means the menubar is shown and cannot be hidden.
1743
1744 `never` means the menubar is hidden and cannot be shown.
1745
1746 `default-on` means the menubar is on by default but can be hidden.
1747
1748 `default-off` means the menubar is off by default but can be shown.
1749
1750 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1751 **CCK2 Equivalent:** `displayMenuBar`\
1752 **Preferences Affected:** N/A
1753
1754 #### Windows (GPO)
1755 ```
1756 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1757 ```
1758 #### Windows (Intune)
1759 OMA-URI:
1760 ```
1761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1762 ```
1763 Value (string):
1764 ```
1765 <enabled/>
1766 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1767 ```
1768 #### macOS
1769 ```
1770 <dict>
1771 <key>DisplayMenuBar</key>
1772 <string>always | never | default-on | default-off</string>
1773 </dict>
1774 ```
1775 #### policies.json
1776 ```
1777 {
1778 "policies": {
1779 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1780 }
1781 }
1782 ```
1783 ### DNSOverHTTPS
1784 Configure DNS over HTTPS.
1785
1786 `Enabled` determines whether DNS over HTTPS is enabled
1787
1788 `ProviderURL` is a URL to another provider.
1789
1790 `Locked` prevents the user from changing DNS over HTTPS preferences.
1791
1792 `ExcludedDomains` excludes domains from DNS over HTTPS.
1793
1794 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1795 **CCK2 Equivalent:** N/A\
1796 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1797
1798 #### Windows (GPO)
1799 ```
1800 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1801 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1802 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1803 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1804 ```
1805 #### Windows (Intune)
1806 OMA-URI:
1807 ```
1808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1809 ```
1810 Value (string):
1811 ```
1812 <enabled/> or <disabled/>
1813 ```
1814 OMA-URI:
1815 ```
1816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1817 ```
1818 Value (string):
1819 ```
1820 <enabled/>
1821 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1822 ```
1823 OMA-URI:
1824 ```
1825 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1826 ```
1827 Value (string):
1828 ```
1829 <enabled/> or <disabled/>
1830 ```
1831 OMA-URI:
1832 ```
1833 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1834 ```
1835 Value (string):
1836 ```
1837 <enabled/>
1838 <data id="List" value="1&#xF000;example.com"/>
1839 ```
1840 #### macOS
1841 ```
1842 <dict>
1843 <key>DNSOverHTTPS</key>
1844 <dict>
1845 <key>Enabled</key>
1846 <true/> | <false/>
1847 <key>ProviderURL</key>
1848 <string>URL_TO_ALTERNATE_PROVIDER</string>
1849 <key>Locked</key>
1850 <true/> | <false/>
1851 <key>ExcludedDomains</key>
1852 <array>
1853 <string>example.com</string>
1854 </array>
1855 </dict>
1856 </dict>
1857 ```
1858 #### policies.json
1859 ```
1860 {
1861 "policies": {
1862 "DNSOverHTTPS": {
1863 "Enabled": true | false,
1864 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1865 "Locked": true | false,
1866 "ExcludedDomains": ["example.com"]
1867 }
1868 }
1869 }
1870 ```
1871 ### DontCheckDefaultBrowser
1872 Don't check if Firefox is the default browser at startup.
1873
1874 **Compatibility:** Firefox 60, Firefox ESR 60\
1875 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1876 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1877
1878 #### Windows (GPO)
1879 ```
1880 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1881 ```
1882 #### Windows (Intune)
1883 OMA-URI:
1884 ```
1885 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1886 ```
1887 Value (string):
1888 ```
1889 <enabled/> or <disabled/>
1890 ```
1891 #### macOS
1892 ```
1893 <dict>
1894 <key>DontCheckDefaultBrowser</key>
1895 <true/> | <false/>
1896 </dict>
1897 ```
1898 #### policies.json
1899 ```
1900 {
1901 "policies": {
1902 "DontCheckDefaultBrowser": true | false
1903 }
1904 }
1905 ```
1906 ### DefaultDownloadDirectory
1907 Set the default download directory.
1908
1909 You can use ${home} for the native home directory.
1910
1911 **Compatibility:** Firefox 68, Firefox ESR 68\
1912 **CCK2 Equivalent:** N/A\
1913 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1914
1915 #### Windows (GPO)
1916 ```
1917 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1918 ```
1919 #### Windows (Intune)
1920 OMA-URI:
1921 ```
1922 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1923 ```
1924 Value (string):
1925 ```
1926 <enabled/>
1927 <data id="Preferences_String" value="${home}\Downloads"/>
1928 ```
1929 #### macOS
1930 ```
1931 <dict>
1932 <key>DefaultDownloadDirectory</key>
1933 <string>${home}/Downloads</string>
1934 </dict>
1935 ```
1936 #### policies.json (macOS and Linux)
1937 ```
1938 {
1939 "policies": {
1940 "DefaultDownloadDirectory": "${home}/Downloads"
1941 }
1942 ```
1943 #### policies.json (Windows)
1944 ```
1945 {
1946 "policies": {
1947 "DefaultDownloadDirectory": "${home}\\Downloads"
1948 }
1949 ```
1950 ### DownloadDirectory
1951 Set and lock the download directory.
1952
1953 You can use ${home} for the native home directory.
1954
1955 **Compatibility:** Firefox 68, Firefox ESR 68\
1956 **CCK2 Equivalent:** N/A\
1957 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1958
1959 #### Windows (GPO)
1960 ```
1961 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1962 ```
1963 #### Windows (Intune)
1964 OMA-URI:
1965 ```
1966 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1967 ```
1968 Value (string):
1969 ```
1970 <enabled/>
1971 <data id="Preferences_String" value="${home}\Downloads"/>
1972 ```
1973 #### macOS
1974 ```
1975 <dict>
1976 <key>DownloadDirectory</key>
1977 <string>${home}/Downloads</string>
1978 </dict>
1979 ```
1980 #### policies.json (macOS and Linux)
1981 ```
1982 {
1983 "policies": {
1984 "DownloadDirectory": "${home}/Downloads"
1985 }
1986 ```
1987 #### policies.json (Windows)
1988 ```
1989 {
1990 "policies": {
1991 "DownloadDirectory": "${home}\\Downloads"
1992 }
1993 ```
1994 ### EnableTrackingProtection
1995 Configure tracking protection.
1996
1997 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1998
1999 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2000
2001 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2002
2003 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2004
2005 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2006
2007 `Exceptions` are origins for which tracking protection is not enabled.
2008
2009 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2010 **CCK2 Equivalent:** N/A\
2011 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
2012
2013 #### Windows (GPO)
2014 ```
2015 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2016 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2017 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2018 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2019 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2020 ```
2021 #### Windows (Intune)
2022 OMA-URI:
2023 ```
2024 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2025 ```
2026 Value (string):
2027 ```
2028 <enabled/>
2029 <data id="TrackingProtectionLocked" value="true | false"/>
2030 <data id="Cryptomining" value="true | false"/>
2031 <data id="Fingerprinting" value="true | false"/>
2032 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2033 ```
2034 #### macOS
2035 ```
2036 <dict>
2037 <key>EnableTrackingProtection</key>
2038 <dict>
2039 <key>Value</key>
2040 <true/> | <false/>
2041 <key><Locked</key>
2042 <true/> | <false/>
2043 <key><Cryptomining</key>
2044 <true/> | <false/>
2045 <key><Fingerprinting</key>
2046 <true/> | <false/>
2047 <key>Exceptions</key>
2048 <array>
2049 <string>https://example.com</string>
2050 </array>
2051 </dict>
2052 </dict>
2053 ```
2054 #### policies.json
2055 ```
2056 {
2057 "policies": {
2058 "EnableTrackingProtection": {
2059 "Value": true | false,
2060 "Locked": true | false,
2061 "Cryptomining": true | false,
2062 "Fingerprinting": true | false,
2063 "Exceptions": ["https://example.com"]
2064 }
2065 }
2066 ```
2067 ### EncryptedMediaExtensions
2068 Enable or disable Encrypted Media Extensions and optionally lock it.
2069
2070 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2071
2072 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2073
2074 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2075 **CCK2 Equivalent:** N/A\
2076 **Preferences Affected:** `media.eme.enabled`
2077
2078 #### Windows (GPO)
2079 ```
2080 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2081 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2082 ```
2083 #### Windows (Intune)
2084 OMA-URI:
2085 ```
2086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2088 ```
2089 Value (string):
2090 ```
2091 <enabled/>or <disabled/>
2092 ```
2093 #### macOS
2094 ```
2095 <dict>
2096 <key>EncryptedMediaExtensions</key>
2097 <dict>
2098 <key>Enabled</key>
2099 <true/> | <false/>
2100 <key><Locked</key>
2101 <true/> | <false/>
2102 </dict>
2103 </dict>
2104 ```
2105 #### policies.json
2106 ```
2107 {
2108 "policies": {
2109 "EncryptedMediaExtensions": {
2110 "Enabled": true | false,
2111 "Locked": true | false
2112 }
2113 }
2114 ```
2115 ### EnterprisePoliciesEnabled
2116 Enable policy support on macOS.
2117
2118 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2119 **CCK2 Equivalent:** N/A\
2120 **Preferences Affected:** N/A
2121
2122 #### macOS
2123 ```
2124 <dict>
2125 <key>EnterprisePoliciesEnabled</key>
2126 <true/>
2127 </dict>
2128 ```
2129 ### Extensions
2130 Control the installation, uninstallation and locking of extensions.
2131
2132 `Install` is a list of URLs or native paths for extensions to be installed.
2133
2134 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2135
2136 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2137
2138 **Compatibility:** Firefox 60, Firefox ESR 60\
2139 **CCK2 Equivalent:** `addons`\
2140 **Preferences Affected:** N/A
2141
2142 #### Windows (GPO)
2143 ```
2144 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2145 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2146 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2147 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2148 ```
2149 #### Windows (Intune)
2150 OMA-URI:
2151 ```
2152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2153 ```
2154 Value (string):
2155 ```
2156 <enabled/>
2157 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2158 ```
2159 OMA-URI:
2160 ```
2161 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2162 ```
2163 Value (string):
2164 ```
2165 <enabled/>
2166 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2167 ```
2168 OMA-URI:
2169 ```
2170 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2171 ```
2172 Value (string):
2173 ```
2174 <enabled/>
2175 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2176 ```
2177 #### macOS
2178 ```
2179 <dict>
2180 <key>Extensions</key>
2181 <dict>
2182 <key>Install</key>
2183 <array>
2184 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2185 <string>//path/to/xpi</string>
2186 </array>
2187 <key>Uninstall</key>
2188 <array>
2189 <string>bad_addon_id@mozilla.org</string>
2190 </array>
2191 <key>Locked</key>
2192 <array>
2193 <string>addon_id@mozilla.org</string>
2194 </array>
2195 </dict>
2196 </dict>
2197 ```
2198 #### policies.json
2199 ```
2200 {
2201 "policies": {
2202 "Extensions": {
2203 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2204 "Uninstall": ["bad_addon_id@mozilla.org"],
2205 "Locked": ["addon_id@mozilla.org"]
2206 }
2207 }
2208 }
2209 ```
2210 ### ExtensionSettings
2211 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2212
2213 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2214
2215 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2216
2217 The configuration for each extension is another dictionary that can contain the fields documented below.
2218
2219 | Name | Description |
2220 | --- | --- |
2221 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2222 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2223 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2224 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2225 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2226 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2227 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2228 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2229 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2230 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2231
2232 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2233 **CCK2 Equivalent:** N/A\
2234 **Preferences Affected:** N/A
2235
2236 #### Windows (GPO)
2237 ```
2238 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2239 {
2240 "*": {
2241 "blocked_install_message": "Custom error message.",
2242 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2243 "installation_mode": "blocked",
2244 "allowed_types": ["extension"]
2245 },
2246 "uBlock0@raymondhill.net": {
2247 "installation_mode": "force_installed",
2248 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2249 },
2250 "https-everywhere@eff.org": {
2251 "installation_mode": "allowed",
2252 }
2253 }
2254 ```
2255 #### Windows (Intune)
2256 OMA-URI:
2257 ```
2258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2259 ```
2260 Value (string):
2261 ```
2262 <enabled/>
2263 <data id="ExtensionSettings" value='
2264 "*": {
2265 "blocked_install_message": "Custom error message.",
2266 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2267 "installation_mode": "blocked",
2268 "allowed_types": ["extension"]
2269 },
2270 "uBlock0@raymondhill.net": {
2271 "installation_mode": "force_installed",
2272 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2273 },
2274 "https-everywhere@eff.org": {
2275 "installation_mode": "allowed",
2276 }'/>
2277 ```
2278 #### macOS
2279 ```
2280 <dict>
2281 <key>ExtensionSettings</key>
2282 <dict>
2283 <key>*</key>
2284 <dict>
2285 <key>blocked_install_message</key>
2286 <string>Custom error message.</string>
2287 <key>install_sources</key>
2288 <array>
2289 <string>about:addons</string>
2290 <string>https://addons.mozilla.org/</string>
2291 </array>
2292 <key>installation_mode</key>
2293 <string>blocked</string>
2294 <key>allowed_types</key>
2295 <array>
2296 <string>extension</string>
2297 </array>
2298 </dict>
2299 <key>uBlock0@raymondhill.net</key>
2300 <dict>
2301 <key>installation_mode</key>
2302 <string>force_installed</string>
2303 <key>install_url</key>
2304 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2305 </dict>
2306 <key>https-everywhere@eff.org</key>
2307 <dict>
2308 <key>installation_mode</key>
2309 <string>allowed</string>
2310 </dict>
2311 </dict>
2312 </dict>
2313 ```
2314 #### policies.json
2315 ```
2316 {
2317 "policies": {
2318 "ExtensionSettings": {
2319 "*": {
2320 "blocked_install_message": "Custom error message.",
2321 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2322 "installation_mode": "blocked",
2323 "allowed_types": ["extension"]
2324 },
2325 "uBlock0@raymondhill.net": {
2326 "installation_mode": "force_installed",
2327 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2328 },
2329 "https-everywhere@eff.org": {
2330 "installation_mode": "allowed"
2331 }
2332 }
2333 }
2334 }
2335 ```
2336 ### ExtensionUpdate
2337 Control extension updates.
2338
2339 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2340 **CCK2 Equivalent:** N/A\
2341 **Preferences Affected:** `extensions.update.enabled`
2342
2343 #### Windows (GPO)
2344 ```
2345 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2346 ```
2347 #### Windows (Intune)
2348 OMA-URI:
2349 ```
2350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2351 ```
2352 Value (string):
2353 ```
2354 <enabled/> or <disabled/>
2355 ```
2356 #### macOS
2357 ```
2358 <dict>
2359 <key>ExtensionUpdate</key>
2360 <true/> | <false/>
2361 </dict>
2362 ```
2363 #### policies.json
2364 ```
2365 {
2366 "policies": {
2367 "ExtensionUpdate": true | false
2368 }
2369 }
2370 ```
2371 ### FlashPlugin
2372 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2373
2374 `Allow` is a list of origins where Flash are allowed.
2375
2376 `Block` is a list of origins where Flash is not allowed.
2377
2378 `Default` determines whether or not Flash is allowed by default.
2379
2380 `Locked` prevents the user from changing Flash preferences.
2381
2382 **Compatibility:** Firefox 60, Firefox ESR 60\
2383 **CCK2 Equivalent:** `permissions.plugin`\
2384 **Preferences Affected:** `plugin.state.flash`
2385
2386 #### Windows (GPO)
2387 ```
2388 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2389 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2390 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2391 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2392 ```
2393 #### Windows (Intune)
2394 OMA-URI:
2395 ```
2396 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2397 ```
2398 Value (string):
2399 ```
2400 <enabled/>
2401 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2402 ```
2403 OMA-URI:
2404 ```
2405 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2406 ```
2407 Value (string):
2408 ```
2409 <enabled/> or <disabled/>
2410 ```
2411 OMA-URI:
2412 ```
2413 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2414 ```
2415 Value (string):
2416 ```
2417 <enabled/> or <disabled/>
2418 ```
2419 #### macOS
2420 ```
2421 <dict>
2422 <key>FlashPlugin</key>
2423 <dict>
2424 <key>Allow</key>
2425 <array>
2426 <string>http://example.org</string>
2427 </array>
2428 <key>Block</key>
2429 <array>
2430 <string>http://example.edu</string>
2431 </array>
2432 <key>Default</key>
2433 <true/> | <false/>
2434 <key>Locked</key>
2435 <true/> | <false/>
2436 </dict>
2437 </dict>
2438 ```
2439 #### policies.json
2440 ```
2441 {
2442 "policies": {
2443 "FlashPlugin": {
2444 "Allow": ["http://example.org/"],
2445 "Block": ["http://example.edu/"],
2446 "Default": true | false,
2447 "Locked": true | false
2448 }
2449 }
2450 }
2451 ```
2452
2453
2454
2455 ### Handlers
2456 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2457
2458 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2459
2460 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2461
2462 | Name | Description |
2463 | --- | --- |
2464 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2465 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2466 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2467 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2468 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2469 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2470
2471 **Compatibility:** Firefox 78, Firefox ESR 78\
2472 **CCK2 Equivalent:** N/A\
2473 **Preferences Affected:** N/A
2474
2475 #### Windows (GPO)
2476 ```
2477 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2478 {
2479 "mimeTypes": {
2480 "application/msword": {
2481 "action": "useSystemDefault",
2482 "ask": true | false
2483 }
2484 },
2485 "schemes": {
2486 "mailto": {
2487 "action": "useHelperApp",
2488 "ask": true | false,
2489 "handlers": [{
2490 "name": "Gmail",
2491 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2492 }]
2493 }
2494 },
2495 "extensions": {
2496 "pdf": {
2497 "action": "useHelperApp",
2498 "ask": true | false,
2499 "handlers": [{
2500 "name": "Adobe Acrobat",
2501 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2502 }]
2503 }
2504 }
2505 }
2506 ```
2507 #### Windows (Intune)
2508 OMA-URI:
2509 ```
2510 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2511 ```
2512 Value (string):
2513 ```
2514 <enabled/>
2515 <data id="Handlers" value='
2516 {
2517 "mimeTypes": {
2518 "application/msword": {
2519 "action": "useSystemDefault",
2520 "ask": true | false
2521 }
2522 },
2523 "schemes": {
2524 "mailto": {
2525 "action": "useHelperApp",
2526 "ask": true | false,
2527 "handlers": [{
2528 "name": "Gmail",
2529 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2530 }]
2531 }
2532 },
2533 "extensions": {
2534 "pdf": {
2535 "action": "useHelperApp",
2536 "ask": true | false,
2537 "handlers": [{
2538 "name": "Adobe Acrobat",
2539 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2540 }]
2541 }
2542 }
2543 }
2544 '/>
2545 ```
2546 #### macOS
2547 ```
2548 <dict>
2549 <key>Handlers</key>
2550 <dict>
2551 <key>mimeTypes</key>
2552 <dict>
2553 <key>application/msword</key>
2554 <dict>
2555 <key>action</key>
2556 <string>useSystemDefault</string>
2557 <key>ask</key>
2558 <true/> | <false/>
2559 </dict>
2560 </dict>
2561 <key>schemes</key>
2562 <dict>
2563 <key>mailto</key>
2564 <dict>
2565 <key>action</key>
2566 <string>useHelperApp</string>
2567 <key>ask</key>
2568 <true/> | <false/>
2569 <key>handlers</key>
2570 <array>
2571 <dict>
2572 <key>name</key>
2573 <string>Gmail</string>
2574 <key>uriTemplate</key>
2575 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2576 </dict>
2577 </array>
2578 </dict>
2579 </dict>
2580 <key>extensions</key>
2581 <dict>
2582 <key>pdf</key>
2583 <dict>
2584 <key>action</key>
2585 <string>useHelperApp</string>
2586 <key>ask</key>
2587 <true/> | <false/>
2588 <key>handlers</key>
2589 <array>
2590 <dict>
2591 <key>name</key>
2592 <string>Adobe Acrobat</string>
2593 <key>path</key>
2594 <string>/System/Applications/Preview.app</string>
2595 </dict>
2596 </array>
2597 </dict>
2598 </dict>
2599 </dict>
2600 </dict>
2601 ```
2602 #### policies.json
2603 ```
2604 {
2605 "policies": {
2606 "Handlers": {
2607 "mimeTypes": {
2608 "application/msword": {
2609 "action": "useSystemDefault",
2610 "ask": false
2611 }
2612 },
2613 "schemes": {
2614 "mailto": {
2615 "action": "useHelperApp",
2616 "ask": true | false,
2617 "handlers": [{
2618 "name": "Gmail",
2619 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2620 }]
2621 }
2622 },
2623 "extensions": {
2624 "pdf": {
2625 "action": "useHelperApp",
2626 "ask": true | false,
2627 "handlers": [{
2628 "name": "Adobe Acrobat",
2629 "path": "/usr/bin/acroread"
2630 }]
2631 }
2632 }
2633 }
2634 }
2635 }
2636 ```
2637 ### FirefoxHome
2638 Customize the Firefox Home page.
2639
2640 **Compatibility:** Firefox 68, Firefox ESR 68\
2641 **CCK2 Equivalent:** N/A\
2642 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2643
2644 #### Windows (GPO)
2645 ```
2646 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2647 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2648 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2649 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2650 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2651 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2652 ```
2653 #### Windows (Intune)
2654 OMA-URI:
2655 ```
2656 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2657 ```
2658 Value (string):
2659 ```
2660 <enabled/>
2661 <data id="FirefoxHome_Search" value="true | false"/>
2662 <data id="FirefoxHome_TopSites" value="true | false"/>
2663 <data id="FirefoxHome_Highlights" value="true | false"/>
2664 <data id="FirefoxHome_Pocket" value="true | false"/>
2665 <data id="FirefoxHome_Snippets" value="true | false"/>
2666 <data id="FirefoxHome_Locked" value="true | false"/>
2667 ```
2668 #### macOS
2669 ```
2670 <dict>
2671 <key>FirefoxHome</key>
2672 <dict>
2673 <key>Search</key>
2674 <true/> | <false/>
2675 <key>TopSites</key>
2676 <true/> | <false/>
2677 <key>Highlights</key>
2678 <true/> | <false/>
2679 <key>Pocket</key>
2680 <true/> | <false/>
2681 <key>Snippets</key>
2682 <true/> | <false/>
2683 <key>Locked</key>
2684 <true/> | <false/>
2685 </dict>
2686 </dict>
2687 ```
2688 #### policies.json
2689 ```
2690 {
2691 "policies": {
2692 "FirefoxHome": {
2693 "Search": true | false,
2694 "TopSites": true | false,
2695 "Highlights": true | false,
2696 "Pocket": true | false,
2697 "Snippets": true | false,
2698 "Locked": true | false
2699 }
2700 }
2701 }
2702 ```
2703 ### HardwareAcceleration
2704 Control hardware acceleration.
2705
2706 **Compatibility:** Firefox 60, Firefox ESR 60\
2707 **CCK2 Equivalent:** N/A\
2708 **Preferences Affected:** `layers.acceleration.disabled`
2709
2710 #### Windows (GPO)
2711 ```
2712 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2713 ```
2714 #### Windows (Intune)
2715 OMA-URI:
2716 ```
2717 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2718 ```
2719 Value (string):
2720 ```
2721 <enabled/> or <disabled/>
2722 ```
2723 #### macOS
2724 ```
2725 <dict>
2726 <key>HardwareAcceleration</key>
2727 <true/> | <false/>
2728 </dict>
2729 ```
2730 #### policies.json
2731 ```
2732 {
2733 "policies": {
2734 "HardwareAcceleration": true | false
2735 }
2736 }
2737 ```
2738 ### Homepage
2739 Configure the default homepage and how Firefox starts.
2740
2741 `URL` is the default homepage.
2742
2743 `Locked` prevents the user from changing homepage preferences.
2744
2745 `Additional` allows for more than one homepage.
2746
2747 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2748
2749 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2750
2751 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2752 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2753 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2754
2755 #### Windows (GPO)
2756 ```
2757 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2758 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2759 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2760 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2761 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2762 ```
2763 #### Windows (Intune)
2764 OMA-URI:
2765 ```
2766 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2767 ```
2768 Value (string):
2769 ```
2770 <enabled/>
2771
2772 <data id="HomepageURL" value="https://example.com"/>
2773 <data id="HomepageLocked" value="true | false"/>
2774 ```
2775 OMA-URI:
2776 ```
2777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2778 ```
2779 Value (string):
2780 ```
2781 <enabled/>
2782
2783 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2784 ```
2785 OMA-URI:
2786 ```
2787 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2788 ```
2789 Value (string):
2790 ```
2791 <enabled/>
2792
2793 <data id="StartPage" value="none | homepage | previous-session"/>
2794 ```
2795 #### macOS
2796 ```
2797 <dict>
2798 <key>Homepage</key>
2799 <dict>
2800 <key>URL</key>
2801 <string>http://example.com</string>
2802 <key>Locked</key>
2803 <true/> | <false/>
2804 <key>Additional</key>
2805 <array>
2806 <string>http://example.org</string>
2807 <string>http://example.edu</string>
2808 </array>
2809 <key>StartPage</key>
2810 <string>none | homepage | previous-session | homepage-locked</string>
2811 </dict>
2812 </dict>
2813 ```
2814 #### policies.json
2815 ```
2816 {
2817 "policies": {
2818 "Homepage": {
2819 "URL": "http://example.com/",
2820 "Locked": true | false,
2821 "Additional": ["http://example.org/",
2822 "http://example.edu/"],
2823 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2824 }
2825 }
2826 }
2827 ```
2828 ### InstallAddonsPermission
2829 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2830
2831 `Allow` is a list of origins where extension installs are allowed.
2832
2833 `Default` determines whether or not extension installs are allowed by default.
2834
2835 **Compatibility:** Firefox 60, Firefox ESR 60\
2836 **CCK2 Equivalent:** `permissions.install`\
2837 **Preferences Affected:** `xpinstall.enabled`
2838
2839 #### Windows (GPO)
2840 ```
2841 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2842 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2843 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2844 ```
2845 #### Windows (Intune)
2846 OMA-URI:
2847 ```
2848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2849 ```
2850 Value (string):
2851 ```
2852 <enabled/>
2853 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2854 ```
2855 OMA-URI:
2856 ```
2857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2858 ```
2859 Value (string):
2860 ```
2861 <enabled/>
2862 ```
2863 #### macOS
2864 ```
2865 <dict>
2866 <key>InstallAddonsPermission</key>
2867 <dict>
2868 <key>Allow</key>
2869 <array>
2870 <string>http://example.org</string>
2871 <string>http://example.edu</string>
2872 </array>
2873 <key>Default</key>
2874 <true/> | <false/>
2875 </dict>
2876 </dict>
2877 ```
2878 #### policies.json
2879 ```
2880 {
2881 "policies": {
2882 "InstallAddonsPermission": {
2883 "Allow": ["http://example.org/",
2884 "http://example.edu/"],
2885 "Default": true | false
2886 }
2887 }
2888 }
2889 ```
2890 ### LegacyProfiles
2891 Disable the feature enforcing a separate profile for each installation.
2892
2893 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2894
2895 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2896
2897 This policy only work on Windows via GPO (not policies.json).
2898
2899 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2900 **CCK2 Equivalent:** N/A\
2901 **Preferences Affected:** N/A
2902
2903 #### Windows (GPO)
2904 ```
2905 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2906 ```
2907 #### Windows (Intune)
2908 OMA-URI:
2909 ```
2910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2911 ```
2912 Value (string):
2913 ```
2914 <enabled/> or <disabled/>
2915 ```
2916 ### LocalFileLinks
2917 Enable linking to local files by origin.
2918
2919 **Compatibility:** Firefox 68, Firefox ESR 68\
2920 **CCK2 Equivalent:** N/A\
2921 **Preferences Affected:** `capability.policy.localfilelinks.*`
2922
2923 #### Windows (GPO)
2924 ```
2925 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2926 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2927 ```
2928 #### Windows (Intune)
2929 OMA-URI:
2930 ```
2931 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2932 ```
2933 Value (string):
2934 ```
2935 <enabled/>
2936 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2937 ```
2938 #### macOS
2939 ```
2940 <dict>
2941 <key>LocalFileLinks</key>
2942 <array>
2943 <string>http://example.org</string>
2944 <string>http://example.edu</string>
2945 </array>
2946 </dict>
2947 ```
2948 #### policies.json
2949 ```
2950 {
2951 "policies": {
2952 "LocalFileLinks": ["http://example.org/",
2953 "http://example.edu/"]
2954 }
2955 }
2956 ```
2957 ### PrimaryPassword
2958 Require or prevent using a primary (formerly master) password.
2959
2960 If this value is true, a primary password is required. If this value is false, it works the same as `DisableMasterPasswordCreation` and removes the primary password functionality.
2961
2962 **Compatibility:** Firefox 79, Firefox ESR 78.1\
2963 **CCK2 Equivalent:** `noMasterPassword`\
2964 **Preferences Affected:** N/A
2965
2966 #### Windows (GPO)
2967 ```
2968 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
2969 ```
2970 #### Windows (Intune)
2971 OMA-URI:
2972 ```
2973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
2974 ```
2975 Value (string):
2976 ```
2977 <enabled/> or <disabled/>
2978 ```
2979 #### macOS
2980 ```
2981 <dict>
2982 <key>PrimaryPassword</key>
2983 <true/> | <false/>
2984 </dict>
2985 ```
2986 #### policies.json
2987 ```
2988 {
2989 "policies": {
2990 "PrimaryPassword": true | false
2991 }
2992 }
2993 ```
2994 ### NetworkPrediction
2995 Enable or disable network prediction (DNS prefetching).
2996
2997 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2998 **CCK2 Equivalent:** N/A\
2999 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
3000
3001 #### Windows (GPO)
3002 ```
3003 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3004 ```
3005 #### Windows (Intune)
3006 OMA-URI:
3007 ```
3008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3009 ```
3010 Value (string):
3011 ```
3012 <enabled/> or <disabled/>
3013 ```
3014 #### macOS
3015 ```
3016 <dict>
3017 <key>NetworkPrediction</key>
3018 <true/> | <false/>
3019 </dict>
3020 ```
3021 #### policies.json
3022 ```
3023 {
3024 "policies": {
3025 "NetworkPrediction": true | false
3026 }
3027 ```
3028 ### NewTabPage
3029 Enable or disable the New Tab page.
3030
3031 **Compatibility:** Firefox 68, Firefox ESR 68\
3032 **CCK2 Equivalent:** N/A\
3033 **Preferences Affected:** `browser.newtabpage.enabled`
3034
3035 #### Windows (GPO)
3036 ```
3037 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3038 ```
3039 #### Windows (Intune)
3040 OMA-URI:
3041 ```
3042 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3043 ```
3044 Value (string):
3045 ```
3046 <enabled/> or <disabled/>
3047 ```
3048 #### macOS
3049 ```
3050 <dict>
3051 <key>NewTabPage</key>
3052 <true/> | <false/>
3053 </dict>
3054 ```
3055 #### policies.json
3056 ```
3057 {
3058 "policies": {
3059 "NewTabPage": true | false
3060 }
3061 ```
3062 ### NoDefaultBookmarks
3063 Disable the creation of default bookmarks.
3064
3065 This policy is only effective if the user profile has not been created yet.
3066
3067 **Compatibility:** Firefox 60, Firefox ESR 60\
3068 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3069 **Preferences Affected:** N/A
3070
3071 #### Windows (GPO)
3072 ```
3073 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3074 ```
3075 #### Windows (Intune)
3076 OMA-URI:
3077 ```
3078 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3079 ```
3080 Value (string):
3081 ```
3082 <enabled/> or <disabled/>
3083 ```
3084 #### macOS
3085 ```
3086 <dict>
3087 <key>NoDefaultBookmarks</key>
3088 <true/> | <false/>
3089 </dict>
3090 ```
3091 #### policies.json
3092 ```
3093 {
3094 "policies": {
3095 "NoDefaultBookmarks": true | false
3096 }
3097 }
3098 ```
3099 ### OfferToSaveLogins
3100 Control whether or not Firefox offers to save passwords.
3101
3102 **Compatibility:** Firefox 60, Firefox ESR 60\
3103 **CCK2 Equivalent:** `dontRememberPasswords`\
3104 **Preferences Affected:** `signon.rememberSignons`
3105
3106 #### Windows (GPO)
3107 ```
3108 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3109 ```
3110 #### Windows (Intune)
3111 OMA-URI:
3112 ```
3113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3114 ```
3115 Value (string):
3116 ```
3117 <enabled/> or <disabled/>
3118 ```
3119 #### macOS
3120 ```
3121 <dict>
3122 <key>OfferToSaveLogins</key>
3123 <true/> | <false/>
3124 </dict>
3125 ```
3126 #### policies.json
3127 ```
3128 {
3129 "policies": {
3130 "OfferToSaveLogins": true | false
3131 }
3132 }
3133 ```
3134 ### OfferToSaveLoginsDefault
3135 Sets the default value of signon.rememberSignons without locking it.
3136
3137 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3138 **CCK2 Equivalent:** `dontRememberPasswords`\
3139 **Preferences Affected:** `signon.rememberSignons`
3140
3141 #### Windows (GPO)
3142 ```
3143 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3144 ```
3145 #### Windows (Intune)
3146 OMA-URI:
3147 ```
3148 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3149 ```
3150 Value (string):
3151 ```
3152 <enabled/> or <disabled/>
3153 ```
3154 #### macOS
3155 ```
3156 <dict>
3157 <key>OfferToSaveLoginsDefault</key>
3158 <true/> | <false/>
3159 </dict>
3160 ```
3161 #### policies.json
3162 ```
3163 {
3164 "policies": {
3165 "OfferToSaveLoginsDefault": true | false
3166 }
3167 }
3168 ```
3169 ### OverrideFirstRunPage
3170 Override the first run page. If the value is blank, no first run page is displayed.
3171
3172 **Compatibility:** Firefox 60, Firefox ESR 60\
3173 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3174 **Preferences Affected:** `startup.homepage_welcome_url`
3175
3176 #### Windows (GPO)
3177 ```
3178 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3179 ```
3180 #### Windows (Intune)
3181 OMA-URI:
3182 ```
3183 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3184 ```
3185 Value (string):
3186 ```
3187 <enabled/>
3188 <data id="OverridePage" value="https://example.com"/>
3189 ```
3190 #### macOS
3191 ```
3192 <dict>
3193 <key>OverrideFirstRunPage</key>
3194 <string>http://example.org</string>
3195 </dict>
3196 ```
3197 #### policies.json
3198 ```
3199 {
3200 "policies": {
3201 "OverrideFirstRunPage": "http://example.org"
3202 }
3203 ```
3204 ### OverridePostUpdatePage
3205 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3206
3207 **Compatibility:** Firefox 60, Firefox ESR 60\
3208 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3209 **Preferences Affected:** `startup.homepage_override_url`
3210
3211 #### Windows (GPO)
3212 ```
3213 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3214 ```
3215 #### Windows (Intune)
3216 OMA-URI:
3217 ```
3218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3219 ```
3220 Value (string):
3221 ```
3222 <enabled/>
3223 <data id="OverridePage" value="https://example.com"/>
3224 ```
3225 #### macOS
3226 ```
3227 <dict>
3228 <key>OverridePostUpdatePage</key>
3229 <string>http://example.org</string>
3230 </dict>
3231 ```
3232 #### policies.json
3233 ```
3234 {
3235 "policies": {
3236 "OverridePostUpdatePage": "http://example.org"
3237 }
3238 ```
3239 ### PasswordManagerEnabled
3240 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3241
3242 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3243 **CCK2 Equivalent:** N/A\
3244 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3245
3246 #### Windows (GPO)
3247 ```
3248 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3249 ```
3250 #### Windows (Intune)
3251 OMA-URI:
3252 ```
3253 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3254 ```
3255 Value (string):
3256 ```
3257 <enabled/> or <disabled/>
3258 ```
3259 #### macOS
3260 ```
3261 <dict>
3262 <key>PasswordManagerEnabled</key>
3263 <true/> | <false/>
3264 </dict>
3265 ```
3266 #### policies.json
3267 ```
3268 {
3269 "policies": {
3270 "PasswordManagerEnabled": true | false
3271 }
3272 }
3273 ```
3274 ### PDFjs
3275 Disable or configure PDF.js, the built-in PDF viewer.
3276
3277 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3278
3279 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3280
3281 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3282
3283 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3284 **CCK2 Equivalent:** N/A\
3285 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3286
3287 #### Windows (GPO)
3288 ```
3289 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3290 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3291 ```
3292 #### Windows (Intune)
3293 OMA-URI:
3294 ```
3295 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3296 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3297 ```
3298 Value (string):
3299 ```
3300 <enabled/>or <disabled/>
3301 ```
3302 #### macOS
3303 ```
3304 <dict>
3305 <key>PDFjs</key>
3306 <dict>
3307 <key>Enabled</key>
3308 <true/> | <false/>
3309 <key><EnablePermissions</key>
3310 <true/> | <false/>
3311 </dict>
3312 </dict>
3313 ```
3314 #### policies.json
3315 ```
3316 {
3317 "policies": {
3318 "PSFjs": {
3319 "Enabled": true | false,
3320 "EnablePermissions": true | false
3321 }
3322 }
3323 ```
3324 ### Permissions
3325 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3326
3327 `Allow` is a list of origins where the feature is allowed.
3328
3329 `Block` is a list of origins where the feature is not allowed.
3330
3331 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3332
3333 `Locked` prevents the user from changing preferences for the feature.
3334
3335 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3336
3337 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3338 **CCK2 Equivalent:** N/A\
3339 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3340
3341 #### Windows (GPO)
3342 ```
3343 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3344 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3345 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3346 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3347 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3348 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3349 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3350 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3351 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3352 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3353 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3354 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3355 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3356 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3357 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3358 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3359 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3360 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3361 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3362 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3363 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3364 ```
3365 #### Windows (Intune)
3366 OMA-URI:
3367 ```
3368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3369 ```
3370 Value (string):
3371 ```
3372 <enabled/> or <disabled/>
3373 ```
3374 OMA-URI:
3375 ```
3376 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3377 ```
3378 Value (string):
3379 ```
3380 <enabled/> or <disabled/>
3381 ```
3382 OMA-URI:
3383 ```
3384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3385 ```
3386 Value (string):
3387 ```
3388 <enabled/>
3389 <data id="Permissions" value="1&#xF000;https://example.org"/>
3390 ```
3391 OMA-URI:
3392 ```
3393 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3394 ```
3395 Value (string):
3396 ```
3397 <enabled/> or <disabled/>
3398 ```
3399 OMA-URI:
3400 ```
3401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3402 ```
3403 Value (string):
3404 ```
3405 <enabled/> or <disabled/>
3406 ```
3407 OMA-URI:
3408 ```
3409 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3410 ```
3411 Value (string):
3412 ```
3413 <enabled/>
3414 <data id="Permissions" value="1&#xF000;https://example.org"/>
3415 ```
3416 OMA-URI:
3417 ```
3418 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3419 ```
3420 Value (string):
3421 ```
3422 <enabled/>
3423 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3424 ```
3425 OMA-URI:
3426 ```
3427 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3428 ```
3429 Value (string):
3430 ```
3431 <enabled/>
3432 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3433 ```
3434 OMA-URI:
3435 ```
3436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3437 ```
3438 Value (string):
3439 ```
3440 <enabled/> or <disabled/>
3441 ```
3442 #### macOS
3443 ```
3444 <dict>
3445 <key>Permissions</key>
3446 <dict>
3447 <key>Camera</key>
3448 <dict>
3449 <key>Allow</key>
3450 <array>
3451 <string>https://example.org</string>
3452 <string>https://example.org:1234</string>
3453 </array>
3454 <key>Block</key>
3455 <array>
3456 <string>https://example.edu</string>
3457 </array>
3458 <key>BlockNewRequests</key>
3459 <true/> | <false/>
3460 <key>Locked</key>
3461 <true/> | <false/>
3462 </dict>
3463 <key>Microphone</key>
3464 <dict>
3465 <key>Allow</key>
3466 <array>
3467 <string>https://example.org</string>
3468 </array>
3469 <key>Block</key>
3470 <array>
3471 <string>https://example.edu</string>
3472 </array>
3473 <key>BlockNewRequests</key>
3474 <true/> | <false/>
3475 <key>Locked</key>
3476 <true/> | <false/>
3477 </dict>
3478 <key>Location</key>
3479 <dict>
3480 <key>Allow</key>
3481 <array>
3482 <string>https://example.org</string>
3483 </array>
3484 <key>Block</key>
3485 <array>
3486 <string>https://example.edu</string>
3487 </array>
3488 <key>BlockNewRequests</key>
3489 <true/> | <false/>
3490 <key>Locked</key>
3491 <true/> | <false/>
3492 </dict>
3493 <key>Notifications</key>
3494 <dict>
3495 <key>Allow</key>
3496 <array>
3497 <string>https://example.org</string>
3498 </array>
3499 <key>Block</key>
3500 <array>
3501 <string>https://example.edu</string>
3502 </array>
3503 <key>BlockNewRequests</key>
3504 <true/>
3505 <key>Locked</key>
3506 <true/>
3507 </dict>
3508 <key>Autoplay</key>
3509 <dict>
3510 <key>Allow</key>
3511 <array>
3512 <string>https://example.org</string>
3513 </array>
3514 <key>Block</key>
3515 <array>
3516 <string>https://example.edu</string>
3517 </array>
3518 <key>Default</key>
3519 <string>allow-audio-video | block-audio | block-audio-video</string>
3520 <key>Locked</key>
3521 <true/> | <false/>
3522 </dict>
3523 </dict>
3524 </dict>
3525 ```
3526 #### policies.json
3527 ```
3528 {
3529 "policies": {
3530 "Permissions": {
3531 "Camera": {
3532 "Allow": ["https://example.org","https://example.org:1234"],
3533 "Block": ["https://example.edu"],
3534 "BlockNewRequests": true | false,
3535 "Locked": true | false
3536 },
3537 "Microphone": {
3538 "Allow": ["https://example.org"],
3539 "Block": ["https://example.edu"],
3540 "BlockNewRequests": true | false,
3541 "Locked": true | false
3542 },
3543 "Location": {
3544 "Allow": ["https://example.org"],
3545 "Block": ["https://example.edu"],
3546 "BlockNewRequests": true | false,
3547 "Locked": true | false
3548 },
3549 "Notifications": {
3550 "Allow": ["https://example.org"],
3551 "Block": ["https://example.edu"],
3552 "BlockNewRequests": true | false,
3553 "Locked": true | false
3554 },
3555 "Autoplay": {
3556 "Allow": ["https://example.org"],
3557 "Block": ["https://example.edu"],
3558 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3559 "Locked": true | false
3560 }
3561 }
3562 }
3563 }
3564 ```
3565 ### PictureInPicture
3566
3567 Enable or disable Picture-in-Picture.
3568
3569 **Compatibility:** Firefox 78, Firefox ESR 78\
3570 **CCK2 Equivalent:** N/A\
3571 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3572
3573 #### Windows (GPO)
3574 ```
3575 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3576 ```
3577 #### Windows (Intune)
3578 OMA-URI:
3579 ```
3580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3581 ```
3582 Value (string):
3583 ```
3584 <enabled/> or <disabled/>
3585 ```
3586 #### macOS
3587 ```
3588 <dict>
3589 <key>PictureInPicture</key>
3590 <true/> | <false/>
3591 </dict>
3592 ```
3593 #### policies.json
3594 ```
3595 {
3596 "policies": {
3597 "PictureInPicture": true | false
3598 }
3599 }
3600 ```
3601 ### PopupBlocking
3602 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3603
3604 `Allow` is a list of origins where popup-windows are allowed.
3605
3606 `Default` determines whether or not pop-up windows are allowed by default.
3607
3608 `Locked` prevents the user from changing pop-up preferences.
3609
3610 **Compatibility:** Firefox 60, Firefox ESR 60\
3611 **CCK2 Equivalent:** `permissions.popup`\
3612 **Preferences Affected:** `dom.disable_open_during_load`
3613
3614 #### Windows (GPO)
3615 ```
3616 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3617 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3618 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3619 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3620 ```
3621 #### Windows (Intune)
3622 OMA-URI:
3623 ```
3624 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3625 ```
3626 Value (string):
3627 ```
3628 <enabled/>
3629 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3630 ```
3631 OMA-URI:
3632 ```
3633 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3634 ```
3635 Value (string):
3636 ```
3637 <enabled/> or <disabled/>
3638 ```
3639 OMA-URI:
3640 ```
3641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3642 ```
3643 Value (string):
3644 ```
3645 <enabled/> or <disabled/>
3646 ```
3647 #### macOS
3648 ```
3649 <dict>
3650 <key>PopupBlocking</key>
3651 <dict>
3652 <key>Allow</key>
3653 <array>
3654 <string>http://example.org</string>
3655 <string>http://example.edu</string>
3656 </array>
3657 <key>Default</key>
3658 <true/> | <false/>
3659 <key>Locked</key>
3660 <true/> | <false/>
3661 </dict>
3662 </dict>
3663 ```
3664 #### policies.json
3665 ```
3666 {
3667 "policies": {
3668 "PopupBlocking": {
3669 "Allow": ["http://example.org/",
3670 "http://example.edu/"],
3671 "Default": true | false,
3672 "Locked": true | false
3673 }
3674 }
3675 }
3676 ```
3677 ### Preferences
3678 Set and lock certain preferences.
3679
3680 **Compatibility:** See below\
3681 **CCK2 Equivalent:** `preferences`\
3682 **Preferences Affected:** See below
3683
3684 | Preference | Type | Compatibility | Default
3685 | --- | --- | --- | ---
3686 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3687 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3688 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3689 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3690 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3691 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3692 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3693 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3694 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3695 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3696 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3697 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3698 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3699 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3700 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3701 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3702 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3703 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3704 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3705 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3706 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3707 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3708 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3709 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3710 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3711 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3712 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3714 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3716 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3718 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3720 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3721 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3722 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3723 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3724 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3725 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3726 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3727 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3728 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3729 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3730 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3731 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3732 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3733 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3734 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3735 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3736 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3737 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3738 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3739 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3740 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3741 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3742 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3743 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3744 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3745 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3746 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3747 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3748 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3749 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3750 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3751 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3752 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3753 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3754 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3755 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3756 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3757 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3758 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3759 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3760 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
3761 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3762 disabled
3763 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
3764 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3765 disabled
3766 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3767 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3768 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3769 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3770 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3771 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3772 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3773 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3774 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3775 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3776 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3777 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3778 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3779 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3780 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3781 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3782 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3783 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3784 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3785 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3786 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3787 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3788 #### Windows (GPO)
3789 ```
3790 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3791 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3792 ```
3793 #### Windows (Intune)
3794 OMA-URI: (periods are replaced by underscores)
3795 ```
3796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3797 ```
3798 Value (string):
3799 ```
3800 <enabled/> or <disabled/>
3801 ```
3802 OMA-URI: (periods are replaced by underscores)
3803 ```
3804 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
3805 ```
3806 Value (string):
3807 ```
3808 <enabled/>
3809 <data id="Preferences_String" value="string_value"/>
3810 ```
3811 #### macOS
3812 ```
3813 <dict>
3814 <key>Preferences</key>
3815 <dict>
3816 <key>boolean_preference_name</key>
3817 <true/> | <false/>
3818 <key>string_preference_name</key>
3819 <string>string_value</string>
3820 </dict>
3821 </dict>
3822 ```
3823 #### policies.json
3824 ```
3825 {
3826 "policies": {
3827 "Preferences": {
3828 "boolean_preference_name": true | false,
3829 "string_preference_name": "string_value"
3830 }
3831 }
3832 }
3833 ```
3834 ### PromptForDownloadLocation
3835 Ask where to save each file before downloading.
3836
3837 **Compatibility:** Firefox 68, Firefox ESR 68\
3838 **CCK2 Equivalent:** N/A\
3839 **Preferences Affected:** `browser.download.useDownloadDir`
3840
3841 #### Windows (GPO)
3842 ```
3843 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3844 ```
3845 #### Windows (Intune)
3846 OMA-URI:
3847 ```
3848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3849 ```
3850 Value (string):
3851 ```
3852 <enabled/> or <disabled/>
3853 ```
3854 #### macOS
3855 ```
3856 <dict>
3857 <key>PromptForDownloadLocation</key>
3858 <true/> | <false/>
3859 </dict>
3860 ```
3861 #### policies.json
3862 ```
3863 {
3864 "policies": {
3865 "PromptForDownloadLocation": true | false
3866 }
3867 }
3868 ```
3869 ### Proxy
3870 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3871 To specify ports, append them to the hostnames with a colon (:).
3872
3873 `Mode` is the proxy method being used.
3874
3875 `Locked` is whether or not proxy settings can be changed.
3876
3877 `HTTPProxy` is the HTTP proxy server.
3878
3879 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3880
3881 `SSLProxy` is the SSL proxy server.
3882
3883 `FTPProxy` is the FTP proxy server.
3884
3885 `SOCKSProxy` is the SOCKS proxy server
3886
3887 `SOCKSVersion` is the SOCKS version (4 or 5)
3888
3889 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3890
3891 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3892
3893 `AutoLogin` means do not prompt for authentication if password is saved.
3894
3895 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3896
3897 **Compatibility:** Firefox 60, Firefox ESR 60\
3898 **CCK2 Equivalent:** `networkProxy*`\
3899 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3900
3901 #### Windows (GPO)
3902 ```
3903 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3904 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3905 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3906 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3907 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3908 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3909 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3910 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3911 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3912 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3913 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3914 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3915 ```
3916 #### Windows (Intune)
3917 OMA-URI:
3918 ```
3919 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3920 ```
3921 Value (string):
3922 ```
3923 <enabled/>
3924 <data id="ProxyLocked" value="true | false"/>
3925 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3926 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3927 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3928 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3929 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3930 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3931 <data id="SOCKSVersion" value="4 | 5"/>
3932 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3933 <data id="Passthrough" value="<local>"/>
3934 <data id="AutoLogin" value="true | false"/>
3935 <data id="UseProxyForDNS" value="true | false"/>
3936 ```
3937 #### macOS
3938 ```
3939 <dict>
3940 <key>Proxy</key>
3941 <dict>
3942 <key>Mode</key>
3943 <string>none | system | manual | autoDetect | autoConfig</string>
3944 <key>Locked</key>
3945 <true> | </false>
3946 <key>HTTPProxy</key>
3947 <string>https://httpproxy.example.com</string>
3948 <key>UseHTTPProxyForAllProtocols</key>
3949 <true> | </false>
3950 <key>SSLProxy</key>
3951 <string>https://sslproxy.example.com</string>
3952 <key>FTPProxy</key>
3953 <string>https://ftpproxy.example.com</string>
3954 <key>SOCKSProxy</key>
3955 <string>https://socksproxy.example.com</string>
3956 <key>SOCKSVersion</key>
3957 <string>4 | 5</string>
3958 <key>Passthrough</key>
3959 <string>&lt;local>&gt;</string>
3960 <key>AutoConfigURL</key>
3961 <string>URL_TO_AUTOCONFIG</string>
3962 <key>AutoLogin</key>
3963 <true> | </false>
3964 <key>UseProxyForDNS</key>
3965 <true> | </false>
3966 </dict>
3967 </dict>
3968 ```
3969 #### policies.json
3970 ```
3971 {
3972 "policies": {
3973 "Proxy": {
3974 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3975 "Locked": true | false,
3976 "HTTPProxy": "hostname",
3977 "UseHTTPProxyForAllProtocols": true | false,
3978 "SSLProxy": "hostname",
3979 "FTPProxy": "hostname",
3980 "SOCKSProxy": "hostname",
3981 "SOCKSVersion": 4 | 5
3982 "Passthrough": "<local>",
3983 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3984 "AutoLogin": true | false,
3985 "UseProxyForDNS": true | false
3986 }
3987 }
3988 }
3989 ```
3990 ### RequestedLocales
3991 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3992
3993 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3994
3995 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3996 **CCK2 Equivalent:** N/A\
3997 **Preferences Affected:** N/A
3998 #### Windows (GPO)
3999 ```
4000 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4001 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4002
4003 or
4004
4005 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4006 ```
4007 #### Windows (Intune)
4008 OMA-URI:
4009 ```
4010 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4011 ```
4012 Value (string):
4013 ```
4014 <enabled/>
4015 <data id="Preferences_String" value="de,en-US"/>
4016 ```
4017 #### macOS
4018 ```
4019 <dict>
4020 <key>RequestedLocales</key>
4021 <array>
4022 <string>de</string>
4023 <string>en-US</string>
4024 </array>
4025 </dict>
4026
4027 or
4028
4029 <dict>
4030 <key>RequestedLocales</key>
4031 <string>de,en-US</string>
4032 </dict>
4033
4034 ```
4035 #### policies.json
4036 ```
4037 {
4038 "policies": {
4039 "RequestedLocales": ["de", "en-US"]
4040 }
4041 }
4042
4043 or
4044
4045 {
4046 "policies": {
4047 "RequestedLocales": "de,en-US"
4048 }
4049 }
4050 ```
4051 <a name="SanitizeOnShutdown"></a>
4052
4053 ### SanitizeOnShutdown (Selective)
4054 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4055
4056 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4057
4058 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4059 **CCK2 Equivalent:** N/A\
4060 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4061 #### Windows (GPO)
4062 ```
4063 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4064 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4065 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4066 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4067 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4068 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4069 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4070 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4071 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4072 ```
4073 #### Windows (Intune)
4074 OMA-URI:
4075 ```
4076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4077 ```
4078 Value (string):
4079 ```
4080 <enabled/> or <disabled/>
4081 ```
4082 #### macOS
4083 ```
4084 <dict>
4085 <key>SanitizeOnShutdown</key>
4086 <dict>
4087 <key>Cache</key>
4088 <true/> | <false/>
4089 <key>Cookies</key>
4090 <true/> | <false/>
4091 <key>Downloads</key>
4092 <true/> | <false/>
4093 <key>FormData</key>
4094 <true/> | <false/>
4095 <key>History</key>
4096 <true/> | <false/>
4097 <key>Sessions</key>
4098 <true/> | <false/>
4099 <key>SiteSettings</key>
4100 <true/> | <false/>
4101 <key>OfflineApps</key>
4102 <true/> | <false/>
4103 <key>Locked</key>
4104 <true/> | <false/>
4105 </dict>
4106 </dict>
4107 ```
4108 #### policies.json
4109 ```
4110 {
4111 "policies": {
4112 "SanitizeOnShutdown": {
4113 "Cache": true | false,
4114 "Cookies": true | false,
4115 "Downloads": true | false,
4116 "FormData": true | false,
4117 "History": true | false,
4118 "Sessions": true | false,
4119 "SiteSettings": true | false,
4120 "OfflineApps": true | false,
4121 "Locked": true | false
4122 }
4123 }
4124 }
4125 ```
4126 ### SanitizeOnShutdown (All)
4127 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4128
4129 **Compatibility:** Firefox 60, Firefox ESR 60\
4130 **CCK2 Equivalent:** N/A\
4131 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4132 #### Windows (GPO)
4133 ```
4134 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4135 ```
4136 #### Windows (Intune)
4137 OMA-URI:
4138 ```
4139 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4140 ```
4141 Value (string):
4142 ```
4143 <enabled/> or <disabled/>
4144 ```
4145 #### macOS
4146 ```
4147 <dict>
4148 <key>SanitizeOnShutdown</key>
4149 <true/> | <false/>
4150 </dict>
4151 ```
4152 #### policies.json
4153 ```
4154 {
4155 "policies": {
4156 "SanitizeOnShutdown": true | false
4157 }
4158 }
4159 ```
4160 ### SearchBar
4161 Set whether or not search bar is displayed.
4162
4163 **Compatibility:** Firefox 60, Firefox ESR 60\
4164 **CCK2 Equivalent:** `showSearchBar`\
4165 **Preferences Affected:** N/A
4166
4167 #### Windows (GPO)
4168 ```
4169 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4170 ```
4171
4172 #### Windows (Intune)
4173 OMA-URI:
4174 ```
4175 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4176 ```
4177 Value (string):
4178 ```
4179 <enabled/>
4180 <data id="Permissions" value="unified | separate"/>
4181 ```
4182 #### macOS
4183 ```
4184 <dict>
4185 <key>SearchBar</key>
4186 <string>unified | separate</string>
4187 </dict>
4188 ```
4189 #### policies.json
4190 ```
4191 {
4192 "policies": {
4193 "SearchBar": "unified" | "separate"
4194 }
4195 }
4196 ```
4197 <a name="SearchEngines"></a>
4198
4199 ### SearchEngines (This policy is only available on the ESR.)
4200
4201 ### SearchEngines | Default
4202
4203 Set the default search engine. This policy is only available on the ESR.
4204
4205 **Compatibility:** Firefox ESR 60\
4206 **CCK2 Equivalent:** `defaultSearchEngine`\
4207 **Preferences Affected:** N/A
4208
4209 #### Windows (GPO)
4210 ```
4211 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4212 ```
4213 #### Windows (Intune)
4214 OMA-URI:
4215 ```
4216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4217 ```
4218 Value (string):
4219 ```
4220 <enabled/>
4221 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4222 ```
4223 #### macOS
4224 ```
4225 <dict>
4226 <key>SearchEngines</key>
4227 <dict>
4228 <key>Default</key>
4229 <string>NAME_OF_SEARCH_ENGINE</string>
4230 </dict>
4231 </dict>
4232 ```
4233 #### policies.json
4234 ```
4235 {
4236 "policies": {
4237 "SearchEngines": {
4238 "Default": "NAME_OF_SEARCH_ENGINE"
4239 }
4240 }
4241 }
4242 ```
4243 ### SearchEngines | PreventInstalls
4244
4245 Prevent installing search engines from webpages.
4246
4247 **Compatibility:** Firefox ESR 60\
4248 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4249 **Preferences Affected:** N/A
4250
4251 #### Windows (GPO)
4252 ```
4253 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4254 ```
4255 #### Windows (Intune)
4256 OMA-URI:
4257 ```
4258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4259 ```
4260 Value (string):
4261 ```
4262 <enabled/> or <disabled/>
4263 ```
4264 #### macOS
4265 ```
4266 <dict>
4267 <key>SearchEngines</key>
4268 <dict>
4269 <key>PreventInstalls</key>
4270 <true/> | <false/>
4271 </dict>
4272 </dict>
4273 ```
4274 #### policies.json
4275 ```
4276 {
4277 "policies": {
4278 "SearchEngines": {
4279 "PreventInstalls": true | false
4280 }
4281 }
4282 }
4283 ```
4284 ### SearchEngines | Remove
4285
4286 Hide built-in search engines. This policy is only available on the ESR.
4287
4288 **Compatibility:** Firefox ESR 60.2\
4289 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4290 **Preferences Affected:** N/A
4291
4292 #### Windows (GPO)
4293 ```
4294 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4295 ```
4296 #### Windows (Intune)
4297 OMA-URI:
4298 ```
4299 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4300 ```
4301 Value (string):
4302 ```
4303 <enabled/>
4304 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4305 ```
4306 #### macOS
4307 ```
4308 <dict>
4309 <key>SearchEngines</key>
4310 <dict>
4311 <key>Remove</key>
4312 <array>
4313 <string>NAME_OF_SEARCH_ENGINE</string>
4314 </array>
4315 </dict>
4316 </dict>
4317 ```
4318 #### policies.json
4319 ```
4320 {
4321 "policies": {
4322 "SearchEngines": {
4323 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4324 }
4325 }
4326 }
4327 ```
4328 ### SearchEngines | Add
4329
4330 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4331
4332 `Name` is the name of the search engine.
4333
4334 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4335
4336 `Method` is either GET or POST
4337
4338 `IconURL` is a URL for the icon to use.
4339
4340 `Alias` is a keyword to use for the engine.
4341
4342 `Description` is a description of the search engine.
4343
4344 `PostData` is the POST data as name value pairs separated by &.
4345
4346 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4347
4348 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4349 **CCK2 Equivalent:** `searchplugins`\
4350 **Preferences Affected:** N/A
4351
4352 #### Windows (GPO)
4353 ```
4354 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4355 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4356 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4357 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4358 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4359 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4360 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4361 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4362 ```
4363 #### Windows (Intune)
4364 OMA-URI:
4365 ```
4366 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4367 ```
4368 Value (string):
4369 ```
4370 <enabled/>
4371 <data id="SearchEngine_Name" value="Example1"/>
4372 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4373 <data id="SearchEngine_Method" value="GET | POST"/>
4374 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4375 <data id="SearchEngine_Alias" value="example"/>
4376 <data id="SearchEngine_Description" value="Example Description"/>
4377 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4378 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4379 ```
4380 #### macOS
4381 ```
4382 <dict>
4383 <key>SearchEngines</key>
4384 <dict>
4385 <key>Add</key>
4386 <array>
4387 <dict>
4388 <key>Name</key>
4389 <string>Example1</string>
4390 <key>URLTemplate</key>
4391 <string>https://www.example.org/q={searchTerms}</string>
4392 <key>Method</key>
4393 <string>GET | POST </string>
4394 <key>IconURL</key>
4395 <string>https://www.example.org/favicon.ico</string>
4396 <key>Alias</key>
4397 <string>example</string>
4398 <key>Description</key>
4399 <string>Example Description</string>
4400 <key>SuggestURLTemplate</key>
4401 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4402 <key>PostData</key>
4403 <string>name=value&q={searchTerms}</string>
4404 </dict>
4405 <array>
4406 </dict>
4407 </dict>
4408 ```
4409 #### policies.json
4410 ```
4411 {
4412 "policies": {
4413 "SearchEngines": {
4414 "Add": [
4415 {
4416 "Name": "Example1",
4417 "URLTemplate": "https://www.example.org/q={searchTerms}",
4418 "Method": "GET" | "POST",
4419 "IconURL": "https://www.example.org/favicon.ico",
4420 "Alias": "example",
4421 "Description": "Description",
4422 "PostData": "name=value&q={searchTerms}",
4423 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4424 }
4425 ]
4426 }
4427 }
4428 }
4429 ```
4430 ### SearchSuggestEnabled
4431
4432 Enable search suggestions.
4433
4434 **Compatibility:** Firefox 68, Firefox ESR 68\
4435 **CCK2 Equivalent:** N/A\
4436 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4437
4438 #### Windows (GPO)
4439 ```
4440 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4441 ```
4442 #### Windows (Intune)
4443 OMA-URI:
4444 ```
4445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4446 ```
4447 Value (string):
4448 ```
4449 <enabled/> or <disabled/>
4450 ```
4451 #### macOS
4452 ```
4453 <dict>
4454 <key>SearchSuggestEnabled</key>
4455 <true/> | <false/>
4456 </dict>
4457 ```
4458 #### policies.json
4459 ```
4460 {
4461 "policies": {
4462 "SearchSuggestEnabled": true | false
4463 }
4464 }
4465 ```
4466 ### SecurityDevices
4467
4468 Install PKCS #11 modules.
4469
4470 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4471 **CCK2 Equivalent:** `certs.devices`\
4472 **Preferences Affected:** N/A
4473
4474 #### Windows (GPO)
4475 ```
4476 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4477 ```
4478 #### Windows (Intune)
4479 OMA-URI:
4480 ```
4481 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4482 ```
4483 Value (string):
4484 ```
4485 <enabled/>
4486 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4487 ```
4488 #### macOS
4489 ```
4490 <dict>
4491 <key>SecurityDevices</key>
4492 <dict>
4493 <key>NAME_OF_DEVICE</key>
4494 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4495 </dict>
4496 </dict>
4497 ```
4498
4499 #### policies.json
4500 ```
4501 {
4502 "policies": {
4503 "SecurityDevices": {
4504 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4505 }
4506 }
4507 }
4508 ```
4509 ### SSLVersionMax
4510
4511 Set and lock the maximum version of TLS.
4512
4513 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4514 **CCK2 Equivalent:** N/A\
4515 **Preferences Affected:** `security.tls.version.max`
4516
4517 #### Windows (GPO)
4518 ```
4519 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4520 ```
4521 #### Windows (Intune)
4522 OMA-URI:
4523 ```
4524 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4525 ```
4526 Value (string):
4527 ```
4528 <enabled/>
4529 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4530 ```
4531 #### macOS
4532 ```
4533 <dict>
4534 <key>SSLVersionMax</key>
4535 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4536 </dict>
4537 ```
4538
4539 #### policies.json
4540 ```
4541 {
4542 "policies": {
4543 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4544 }
4545 }
4546 ```
4547 ### SSLVersionMin
4548
4549 Set and lock the minimum version of TLS.
4550
4551 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4552 **CCK2 Equivalent:** N/A\
4553 **Preferences Affected:** `security.tls.version.min`
4554
4555 #### Windows (GPO)
4556 ```
4557 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4558 ```
4559 #### Windows (Intune)
4560 OMA-URI:
4561 ```
4562 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4563 ```
4564 Value (string):
4565 ```
4566 <enabled/>
4567 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4568 ```
4569 #### macOS
4570 ```
4571 <dict>
4572 <key>SSLVersionMin</key>
4573 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4574 </dict>
4575 ```
4576
4577 #### policies.json
4578 ```
4579 {
4580 "policies": {
4581 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4582 }
4583 }
4584 ```
4585 ### SupportMenu
4586 Add a menuitem to the help menu for specifying support information.
4587
4588 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4589 **CCK2 Equivalent:** helpMenu\
4590 **Preferences Affected:** N/A
4591
4592 #### Windows (GPO)
4593 ```
4594 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4595 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4596 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4597 ```
4598 #### Windows (Intune)
4599 OMA-URI:
4600 ```
4601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4602 ```
4603 Value (string):
4604 ```
4605 <enabled/>
4606 <data id="SupportMenuTitle" value="Support Menu"/>
4607 <data id="SupportMenuURL" value="http://example.com/support"/>
4608 <data id="SupportMenuAccessKey" value="S">
4609 ```
4610 #### macOS
4611 ```
4612 <dict>
4613 <key>SupportMenu</key>
4614 <dict>
4615 <key>Title</key>
4616 <string>SupportMenu</string>
4617 <key>URL</key>
4618 <string>http://example.com/support</string>
4619 <key>AccessKey</key>
4620 <string>S</string>
4621 </dict>
4622 </dict>
4623 ```
4624 #### policies.json
4625 ```
4626 {
4627 "policies": {
4628 "SupportMenu": {
4629 "Title": "Support Menu",
4630 "URL": "http://example.com/support",
4631 "AccessKey": "S"
4632 }
4633 }
4634 }
4635 ```
4636 ### UserMessaging
4637
4638 Prevent installing search engines from webpages.
4639
4640 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4641
4642 `ExtensionRecommendations` Don't recommend extensions.
4643
4644 `FeatureRecommendations` Don't recommend browser features.
4645
4646 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4647
4648 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4649 **CCK2 Equivalent:** N/A\
4650 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4651
4652 #### Windows (GPO)
4653 ```
4654 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4655 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4656 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4657 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4658 ```
4659 #### Windows (Intune)
4660 OMA-URI:
4661 ```
4662 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4663 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4664 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4665 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4666 ```
4667 Value (string):
4668 ```
4669 <enabled/> or <disabled/>
4670 ```
4671 #### macOS
4672 ```
4673 <dict>
4674 <key>UserMessaging</key>
4675 <dict>
4676 <key>WhatsNew</key>
4677 <true/> | <false/>
4678 <key>ExtensionRecommendations</key>
4679 <true/> | <false/>
4680 <key>FeatureRecommendations</key>
4681 <true/> | <false/>
4682 <key>UrlbarInterventions</key>
4683 <true/> | <false/>
4684 </dict>
4685 </dict>
4686 ```
4687 #### policies.json
4688 ```
4689 {
4690 "policies": {
4691 "UserMessaging": {
4692 "WhatsNew": true | false,
4693 "ExtensionRecommendations": true | false,
4694 "FeatureRecommendations": true | false,
4695 "UrlbarInterventions": true | false
4696 }
4697 }
4698 }
4699 ```
4700 ### WebsiteFilter
4701 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4702
4703 **Compatibility:** Firefox 60, Firefox ESR 60\
4704 **CCK2 Equivalent:** N/A\
4705 **Preferences Affected:** N/A
4706
4707 #### Windows (GPO)
4708 ```
4709 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4710 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4711 ```
4712 #### Windows (Intune)
4713 OMA-URI:
4714 ```
4715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4716 ```
4717 Value (string):
4718 ```
4719 <enabled/>
4720 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4721 ```
4722 OMA-URI:
4723 ```
4724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4725 ```
4726 Value (string):
4727 ```
4728 <enabled/>
4729 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4730 ```
4731 #### macOS
4732 ```
4733 <dict>
4734 <key>WebsiteFilter</key>
4735 <dict>
4736 <key>Block</key>
4737 <array>
4738 <string><all_urls></string>
4739 </array>
4740 <key>Exceptions</key>
4741 <array>
4742 <string>http://example.org/*</string>
4743 </array>
4744 </dict>
4745
4746 </dict>
4747 ```
4748 #### policies.json
4749 ```
4750 {
4751 "policies": {
4752 "WebsiteFilter": {
4753 "Block": ["<all_urls>"],
4754 "Exceptions": ["http://example.org/*"]
4755 }
4756 }
4757 }
4758 ```

patrick-canterino.de