]> git.p6c8.net - policy-templates.git/blob - README.md
Remove MasterPassword since it is in 79
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
572
573 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
574
575 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
576 **CCK2 Equivalent:** N/A\
577 **Preferences Affected:** `security.enterprise_roots.enabled`
578
579 #### Windows (GPO)
580 ```
581 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
582 ```
583 #### Windows (Intune)
584 OMA-URI:
585 ```
586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
587 ```
588 Value (string):
589 ```
590 <enabled/> or <disabled/>
591 ```
592 #### macOS
593 ```
594 <dict>
595 <key>Certificates</key>
596 <dict>
597 <key>ImportEnterpriseRoots</key>
598 <true/> | <false/>
599 </dict>
600 </dict>
601 ```
602 #### policies.json
603 ```
604 {
605 "policies": {
606 "Certificates": {
607 "ImportEnterpriseRoots": true | false
608 }
609 }
610 }
611 ```
612 ### Certificates | Install
613
614 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
615
616 - Windows
617 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
618 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
619 - macOS
620 - /Library/Application Support/Mozilla/Certificates
621 - ~/Library/Application Support/Mozilla/Certificates
622 - Linux
623 - /usr/lib/mozilla/certificates
624 - /usr/lib64/mozilla/certificates
625 - ~/.mozilla/certificates
626
627 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
628
629 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
630
631 Certificates are installed using the trust string `CT,CT,`.
632
633 Binary (DER) and ASCII (PEM) certificates are both supported.
634
635 **Compatibility:** Firefox 64, Firefox ESR 64\
636 **CCK2 Equivalent:** `certs.ca`\
637 **Preferences Affected:** N/A
638
639 #### Windows (GPO)
640 ```
641 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
642 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
643 ```
644 #### Windows (Intune)
645 OMA-URI:
646 ```
647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
648 ```
649 Value (string):
650 ```
651 <enabled/>
652 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
653 ```
654 #### macOS
655 ```
656 <dict>
657 <key>Certificates</key>
658 <dict>
659 <key>Install</key>
660 <array>
661 <string>cert1.der</string>
662 <string>/Users/username/cert2.pem</string>
663 </array>
664 </dict>
665 </dict>
666 ```
667 #### policies.json
668 ```
669 {
670 "policies": {
671 "Certificates": {
672 "Install": ["cert1.der", "/home/username/cert2.pem"]
673 }
674 }
675 }
676 ```
677 ### Cookies
678 Configure cookie preferences.
679
680 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
681
682 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
683
684 `Default` determines whether cookies are accepted at all.
685
686 `AcceptThirdParty` determines how third-party cookies are handled.
687
688 `ExpireAtSessionEnd` determines when cookies expire.
689
690 `RejectTracker` only rejects cookies for trackers.
691
692 `Locked` prevents the user from changing cookie preferences.
693
694 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
695 **CCK2 Equivalent:** N/A\
696 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
697
698 #### Windows (GPO)
699 ```
700 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
701 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
702 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
704 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
706 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
707 ```
708 #### Windows (Intune)
709 OMA-URI:
710 ```
711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
712 ```
713 Value (string):
714 ```
715 <enabled/>
716 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
717 ```
718 OMA-URI:
719 ```
720 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
721 ```
722 Value (string):
723 ```
724 <enabled/>
725 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
726 ```
727 OMA-URI:
728 ```
729 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
730 ```
731 Value (string):
732 ```
733 <enabled/> or <disabled/>
734 ```
735 OMA-URI:
736 ```
737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
738 ```
739 Value (string):
740 ```
741 <enabled/>
742 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
743 ```
744 OMA-URI:
745 ```
746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
747 ```
748 Value (string):
749 ```
750 <enabled/> or <disabled/>
751 ```
752 OMA-URI:
753 ```
754 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
755 ```
756 Value (string):
757 ```
758 <enabled/> or <disabled/>
759 ```
760 OMA-URI:
761 ```
762 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
763 ```
764 Value (string):
765 ```
766 <enabled/> or <disabled/>
767 ```
768 #### macOS
769 ```
770 <dict>
771 <key>Cookies</key>
772 <dict>
773 <key>Allow</key>
774 <array>
775 <string>http://example.com</string>
776 </array>
777 <key>Block</key>
778 <array>
779 <string>http://example.org</string>
780 </array>
781 <key>Default</key>
782 <true/> | <false/>
783 <key>AcceptThirdParty</key>
784 <string>always | never | from-visited</string>
785 <key>ExpireAtSessionEnd</key>
786 <true/> | <false/>
787 <key>RejectTracker</key>
788 <true/> | <false/>
789 <key>Locked</key>
790 <true/> | <false/>
791 </dict>
792 </dict>
793 ```
794 #### policies.json
795 ```
796 {
797 "policies": {
798 "Cookies": {
799 "Allow": ["http://example.org/"],
800 "Block": ["http://example.edu/"],
801 "Default": true | false,
802 "AcceptThirdParty": "always" | "never" | "from-visited",
803 "ExpireAtSessionEnd": true | false,
804 "RejectTracker": true | false,
805 "Locked": true | false
806 }
807 }
808 }
809 ```
810 ### DisableSetDesktopBackground
811 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
812
813 **Compatibility:** Firefox 60, Firefox ESR 60\
814 **CCK2 Equivalent:** `removeSetDesktopBackground`\
815 **Preferences Affected:** N/A
816
817 #### Windows (GPO)
818 ```
819 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
820 ```
821 #### Windows (Intune)
822 OMA-URI:
823 ```
824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
825 ```
826 Value (string):
827 ```
828 <enabled/> or <disabled/>
829 ```
830 #### macOS
831 ```
832 <dict>
833 <key>DisableSetDesktopBackground</key>
834 <true/> | <false/>
835 </dict>
836 ```
837 #### policies.json
838 ```
839 {
840 "policies": {
841 "DisableSetDesktopBackground": true | false
842 }
843 }
844 ```
845 ### DisableMasterPasswordCreation
846 Remove the master password functionality.
847
848 **Compatibility:** Firefox 60, Firefox ESR 60\
849 **CCK2 Equivalent:** `noMasterPassword`\
850 **Preferences Affected:** N/A
851
852 #### Windows (GPO)
853 ```
854 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
855 ```
856 #### Windows (Intune)
857 OMA-URI:
858 ```
859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
860 ```
861 Value (string):
862 ```
863 <enabled/> or <disabled/>
864 ```
865 #### macOS
866 ```
867 <dict>
868 <key>DisableMasterPasswordCreation</key>
869 <true/> | <false/>
870 </dict>
871 ```
872 #### policies.json
873 ```
874 {
875 "policies": {
876 "DisableMasterPasswordCreation": true | false
877 }
878 }
879 ```
880 ### DisableAppUpdate
881 Turn off application updates.
882
883 **Compatibility:** Firefox 60, Firefox ESR 60\
884 **CCK2 Equivalent:** `disableFirefoxUpdates`\
885 **Preferences Affected:** N/A
886
887 #### Windows (GPO)
888 ```
889 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
890 ```
891 #### Windows (Intune)
892 OMA-URI:
893 ```
894 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
895 ```
896 Value (string):
897 ```
898 <enabled/> or <disabled/>
899 ```
900 #### macOS
901 ```
902 <dict>
903 <key>DisableAppUpdate</key>
904 <true/> | <false/>
905 </dict>
906 ```
907 #### policies.json
908 ```
909 {
910 "policies": {
911 "DisableAppUpdate": true | false
912 }
913 }
914 ```
915 ### DisableBuiltinPDFViewer
916 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
917
918 **Compatibility:** Firefox 60, Firefox ESR 60\
919 **CCK2 Equivalent:** `disablePDFjs`\
920 **Preferences Affected:** `pdfjs.disabled`
921
922 #### Windows (GPO)
923 ```
924 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
925 ```
926 #### Windows (Intune)
927 OMA-URI:
928 ```
929 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
930 ```
931 Value (string):
932 ```
933 <enabled/> or <disabled/>
934 ```
935 #### macOS
936 ```
937 <dict>
938 <key>DisableBuiltinPDFViewer</key>
939 <true/> | <false/>
940 </dict>
941 ```
942 #### policies.json
943 ```
944 {
945 "policies": {
946 "DisableBuiltinPDFViewer": true | false
947 }
948 }
949 ```
950 ### DisabledCiphers
951 Disable specific cryptographic ciphers.
952
953 ---
954 **Note:**
955
956 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
957
958 ---
959 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
960 **CCK2 Equivalent:** N/A\
961 **Preferences Affected:** N/A
962
963 #### Windows (GPO)
964 ```
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
975 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
976 ```
977 #### Windows (Intune)
978 OMA-URI:
979 ```
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
991 ```
992 Value (string):
993 ```
994 <enabled/> or <disabled/>
995 ```
996 #### macOS
997 ```
998 <dict>
999 <key>DisabledCiphers</key>
1000 <dict>
1001 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1006 <true/> | <false/>
1007 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1008 <true/> | <false/>
1009 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1010 <true/> | <false/>
1011 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1012 <true/> | <false/>
1013 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1014 <true/> | <false/>
1015 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1016 <true/> | <false/>
1017 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1018 <true/> | <false/>
1019 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1020 <true/> | <false/>
1021 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisabledCiphers" {
1031 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1032 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1035 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1037 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1039 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1040 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1041 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1042 }
1043 }
1044 }
1045 ```
1046 ### DisableDefaultBrowserAgent
1047 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1048
1049 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1050 **CCK2 Equivalent:** N/A\
1051 **Preferences Affected:** N/A
1052
1053 #### Windows (GPO)
1054 ```
1055 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1056 ```
1057 #### Windows (Intune)
1058 OMA-URI:
1059 ```
1060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1061 ```
1062 Value (string):
1063 ```
1064 <enabled/> or <disabled/>
1065 ```
1066 #### policies.json
1067 ```
1068 {
1069 "policies": {
1070 "DisableDefaultBrowserAgent": true | false
1071 }
1072 }
1073 ```
1074 ### DisableDeveloperTools
1075 Remove access to all developer tools.
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** `removeDeveloperTools`\
1079 **Preferences Affected:** `devtools.policy.disabled`
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableDeveloperTools</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableDeveloperTools": true | false
1106 }
1107 }
1108 ```
1109 ### DisableFeedbackCommands
1110 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** N/A\
1114 **Preferences Affected:** N/A
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableFeedbackCommands</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableFeedbackCommands": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFirefoxScreenshots
1145 Remove access to Firefox Screenshots.
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** N/A\
1149 **Preferences Affected:** `extensions.screenshots.disabled`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFirefoxScreenshots</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFirefoxScreenshots": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxAccounts
1180 Disable Firefox Accounts integration (Sync).
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** `disableSync`\
1184 **Preferences Affected:** `identity.fxaccounts.enabled`
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxAccounts</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxAccounts": true | false
1211 }
1212 }
1213 ```
1214 ### DisableFirefoxStudies
1215 Disable Firefox studies (Shield).
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** N/A\
1219 **Preferences Affected:** N/A
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableFirefoxStudies</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableFirefoxStudies": true | false
1246 }
1247 }
1248 ```
1249 ### DisableForgetButton
1250 Disable the "Forget" button.
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** `disableForget`\
1254 **Preferences Affected:** N/A
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableForgetButton</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableForgetButton": true | false
1281 }
1282 }
1283 ```
1284 ### DisableFormHistory
1285 Turn off saving information on web forms and the search bar.
1286
1287 **Compatibility:** Firefox 60, Firefox ESR 60\
1288 **CCK2 Equivalent:** `disableFormFill`\
1289 **Preferences Affected:** ` browser.formfill.enable`
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisableFormHistory</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisableFormHistory": true | false
1316 }
1317 }
1318 ```
1319 ### DisablePasswordReveal
1320 Do not allow passwords to be shown in saved logins
1321
1322 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1323 **CCK2 Equivalent:** N/A
1324 **Preferences Affected:** N/A
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisablePasswordReveal</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisablePasswordReveal": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePocket
1355 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePocket`\
1359 **Preferences Affected:** `extensions.pocket.enabled`
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePocket</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePocket": true | false
1386 }
1387 }
1388 ```
1389 ### DisablePrivateBrowsing
1390 Remove access to private browsing.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1394 **Preferences Affected:** N/A
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisablePrivateBrowsing</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisablePrivateBrowsing": true | false
1421 }
1422 }
1423 ```
1424 ### DisableProfileImport
1425 Disables the "Import data from another browser" option in the bookmarks window.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** N/A\
1429 **Preferences Affected:** N/A
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisableProfileImport</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisableProfileImport": true | false
1456 }
1457 }
1458 ```
1459 ### DisableProfileRefresh
1460 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1461
1462 **Compatibility:** Firefox 60, Firefox ESR 60\
1463 **CCK2 Equivalent:** `disableResetFirefox`\
1464 **Preferences Affected:** `browser.disableResetPrompt`
1465
1466 #### Windows (GPO)
1467 ```
1468 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1469 ```
1470 #### Windows (Intune)
1471 OMA-URI:
1472 ```
1473 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1474 ```
1475 Value (string):
1476 ```
1477 <enabled/> or <disabled/>
1478 ```
1479 #### macOS
1480 ```
1481 <dict>
1482 <key>DisableProfileRefresh</key>
1483 <true/> | <false/>
1484 </dict>
1485 ```
1486 #### policies.json
1487 ```
1488 {
1489 "policies": {
1490 "DisableProfileRefresh": true | false
1491 }
1492 }
1493 ```
1494 ### DisableSafeMode
1495 Disable safe mode within the browser.
1496
1497 On Windows, this disables safe mode via the command line as well.
1498
1499 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1500 **CCK2 Equivalent:** `disableSafeMode`\
1501 **Preferences Affected:** N/A
1502
1503 #### Windows (GPO)
1504 ```
1505 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1506 ```
1507 #### Windows (Intune)
1508 OMA-URI:
1509 ```
1510 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1511 ```
1512 Value (string):
1513 ```
1514 <enabled/> or <disabled/>
1515 ```
1516 #### macOS
1517 ```
1518 <dict>
1519 <key>DisableSafeMode</key>
1520 <true/> | <false/>
1521 </dict>
1522 ```
1523 #### policies.json
1524 ```
1525 {
1526 "policies": {
1527 "DisableSafeMode": true | false
1528 }
1529 }
1530 ```
1531 ### DisableSecurityBypass
1532 Prevent the user from bypassing security in certain cases.
1533
1534 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1535
1536 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1537
1538 **Compatibility:** Firefox 60, Firefox ESR 60\
1539 **CCK2 Equivalent:** N/A\
1540 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1541
1542 #### Windows (GPO)
1543 ```
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1545 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1546 ```
1547 #### Windows (Intune)
1548 OMA-URI:
1549 ```
1550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1551 ```
1552 Value (string):
1553 ```
1554 <enabled/> or <disabled/>
1555 ```
1556 OMA-URI:
1557 ```
1558 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1559 ```
1560 Value (string):
1561 ```
1562 <enabled/> or <disabled/>
1563 ```
1564
1565 #### macOS
1566 ```
1567 <dict>
1568 <key>DisableSecurityBypass</key>
1569 <dict>
1570 <key>InvalidCertificate</key>
1571 <true/> | <false/>
1572 <key><SafeBrowsing/key>
1573 <true/> | <false/>
1574 </dict>
1575 </dict>
1576 ```
1577 #### policies.json
1578 ```
1579 {
1580 "policies": {
1581 "DisableSecurityBypass": {
1582 "InvalidCertificate": true | false,
1583 "SafeBrowsing": true | false
1584 }
1585 }
1586 }
1587 ```
1588 ### DisableSystemAddonUpdate
1589 Prevent system add-ons from being installed or update.
1590
1591 **Compatibility:** Firefox 60, Firefox ESR 60\
1592 **CCK2 Equivalent:** N/A\
1593 **Preferences Affected:** N/A
1594
1595 #### Windows (GPO)
1596 ```
1597 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1598 ```
1599 #### Windows (Intune)
1600 OMA-URI:
1601 ```
1602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1603 ```
1604 Value (string):
1605 ```
1606 <enabled/> or <disabled/>
1607 ```
1608 #### macOS
1609 ```
1610 <dict>
1611 <key>DisableSystemAddonUpdate</key>
1612 <true/> | <false/>
1613 </dict>
1614 ```
1615 #### policies.json
1616 ```
1617 {
1618 "policies": {
1619 "DisableSystemAddonUpdate": true | false
1620 }
1621 }
1622 ```
1623 ### DisableTelemetry
1624 Prevent the upload of telemetry data.
1625
1626 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1627
1628 **Compatibility:** Firefox 60, Firefox ESR 60\
1629 **CCK2 Equivalent:** `disableTelemetry`\
1630 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1631
1632 #### Windows (GPO)
1633 ```
1634 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1635 ```
1636 #### Windows (Intune)
1637 OMA-URI:
1638 ```
1639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1640 ```
1641 Value (string):
1642 ```
1643 <enabled/> or <disabled/>
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>DisableTelemetry</key>
1649 <true/> | <false/>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "DisableTelemetry": true | false
1657 }
1658 }
1659 ```
1660 ### DisplayBookmarksToolbar
1661 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1662
1663 **Compatibility:** Firefox 60, Firefox ESR 60\
1664 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1665 **Preferences Affected:** N/A
1666
1667 #### Windows (GPO)
1668 ```
1669 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1670 ```
1671 #### Windows (Intune)
1672 OMA-URI:
1673 ```
1674 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1675 ```
1676 Value (string):
1677 ```
1678 <enabled/> or <disabled/>
1679 ```
1680 #### macOS
1681 ```
1682 <dict>
1683 <key>DisplayBookmarksToolbar</key>
1684 <true/> | <false/>
1685 </dict>
1686 ```
1687 #### policies.json
1688 ```
1689 {
1690 "policies": {
1691 "DisplayBookmarksToolbar": true | false
1692 }
1693 }
1694 ```
1695 ### DisplayMenuBar (Deprecated)
1696 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1697
1698 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1699 **CCK2 Equivalent:** `displayMenuBar`\
1700 **Preferences Affected:** N/A
1701
1702 #### Windows (GPO)
1703 ```
1704 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1705 ```
1706 #### macOS
1707 ```
1708 <dict>
1709 <key>DisplayMenuBar</key>
1710 <true/> | <false/>
1711 </dict>
1712 ```
1713 #### policies.json
1714 ```
1715 {
1716 "policies": {
1717 "DisplayMenuBar": true | false
1718 }
1719 }
1720 ```
1721 ### DisplayMenuBar
1722 Set the state of the menubar.
1723
1724 `always` means the menubar is shown and cannot be hidden.
1725
1726 `never` means the menubar is hidden and cannot be shown.
1727
1728 `default-on` means the menubar is on by default but can be hidden.
1729
1730 `default-off` means the menubar is off by default but can be shown.
1731
1732 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1733 **CCK2 Equivalent:** `displayMenuBar`\
1734 **Preferences Affected:** N/A
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1739 ```
1740 #### Windows (Intune)
1741 OMA-URI:
1742 ```
1743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1744 ```
1745 Value (string):
1746 ```
1747 <enabled/>
1748 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1749 ```
1750 #### macOS
1751 ```
1752 <dict>
1753 <key>DisplayMenuBar</key>
1754 <string>always | never | default-on | default-off</string>
1755 </dict>
1756 ```
1757 #### policies.json
1758 ```
1759 {
1760 "policies": {
1761 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1762 }
1763 }
1764 ```
1765 ### DNSOverHTTPS
1766 Configure DNS over HTTPS.
1767
1768 `Enabled` determines whether DNS over HTTPS is enabled
1769
1770 `ProviderURL` is a URL to another provider.
1771
1772 `Locked` prevents the user from changing DNS over HTTPS preferences.
1773
1774 `ExcludedDomains` excludes domains from DNS over HTTPS.
1775
1776 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1777 **CCK2 Equivalent:** N/A\
1778 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1779
1780 #### Windows (GPO)
1781 ```
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1785 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1786 ```
1787 #### Windows (Intune)
1788 OMA-URI:
1789 ```
1790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1791 ```
1792 Value (string):
1793 ```
1794 <enabled/> or <disabled/>
1795 ```
1796 OMA-URI:
1797 ```
1798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1799 ```
1800 Value (string):
1801 ```
1802 <enabled/>
1803 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1804 ```
1805 OMA-URI:
1806 ```
1807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1808 ```
1809 Value (string):
1810 ```
1811 <enabled/> or <disabled/>
1812 ```
1813 OMA-URI:
1814 ```
1815 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1816 ```
1817 Value (string):
1818 ```
1819 <enabled/>
1820 <data id="List" value="1&#xF000;example.com"/>
1821 ```
1822 #### macOS
1823 ```
1824 <dict>
1825 <key>DNSOverHTTPS</key>
1826 <dict>
1827 <key>Enabled</key>
1828 <true/> | <false/>
1829 <key>ProviderURL</key>
1830 <string>URL_TO_ALTERNATE_PROVIDER</string>
1831 <key>Locked</key>
1832 <true/> | <false/>
1833 <key>ExcludedDomains</key>
1834 <array>
1835 <string>example.com</string>
1836 </array>
1837 </dict>
1838 </dict>
1839 ```
1840 #### policies.json
1841 ```
1842 {
1843 "policies": {
1844 "DNSOverHTTPS": {
1845 "Enabled": true | false,
1846 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1847 "Locked": true | false,
1848 "ExcludedDomains": ["example.com"]
1849 }
1850 }
1851 }
1852 ```
1853 ### DontCheckDefaultBrowser
1854 Don't check if Firefox is the default browser at startup.
1855
1856 **Compatibility:** Firefox 60, Firefox ESR 60\
1857 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1858 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1859
1860 #### Windows (GPO)
1861 ```
1862 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1863 ```
1864 #### Windows (Intune)
1865 OMA-URI:
1866 ```
1867 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1868 ```
1869 Value (string):
1870 ```
1871 <enabled/> or <disabled/>
1872 ```
1873 #### macOS
1874 ```
1875 <dict>
1876 <key>DontCheckDefaultBrowser</key>
1877 <true/> | <false/>
1878 </dict>
1879 ```
1880 #### policies.json
1881 ```
1882 {
1883 "policies": {
1884 "DontCheckDefaultBrowser": true | false
1885 }
1886 }
1887 ```
1888 ### DefaultDownloadDirectory
1889 Set the default download directory.
1890
1891 You can use ${home} for the native home directory.
1892
1893 **Compatibility:** Firefox 68, Firefox ESR 68\
1894 **CCK2 Equivalent:** N/A\
1895 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1896
1897 #### Windows (GPO)
1898 ```
1899 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1900 ```
1901 #### Windows (Intune)
1902 OMA-URI:
1903 ```
1904 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1905 ```
1906 Value (string):
1907 ```
1908 <enabled/>
1909 <data id="Preferences_String" value="${home}\Downloads"/>
1910 ```
1911 #### macOS
1912 ```
1913 <dict>
1914 <key>DefaultDownloadDirectory</key>
1915 <string>${home}/Downloads</string>
1916 </dict>
1917 ```
1918 #### policies.json (macOS and Linux)
1919 ```
1920 {
1921 "policies": {
1922 "DefaultDownloadDirectory": "${home}/Downloads"
1923 }
1924 ```
1925 #### policies.json (Windows)
1926 ```
1927 {
1928 "policies": {
1929 "DefaultDownloadDirectory": "${home}\\Downloads"
1930 }
1931 ```
1932 ### DownloadDirectory
1933 Set and lock the download directory.
1934
1935 You can use ${home} for the native home directory.
1936
1937 **Compatibility:** Firefox 68, Firefox ESR 68\
1938 **CCK2 Equivalent:** N/A\
1939 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1940
1941 #### Windows (GPO)
1942 ```
1943 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1944 ```
1945 #### Windows (Intune)
1946 OMA-URI:
1947 ```
1948 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1949 ```
1950 Value (string):
1951 ```
1952 <enabled/>
1953 <data id="Preferences_String" value="${home}\Downloads"/>
1954 ```
1955 #### macOS
1956 ```
1957 <dict>
1958 <key>DownloadDirectory</key>
1959 <string>${home}/Downloads</string>
1960 </dict>
1961 ```
1962 #### policies.json (macOS and Linux)
1963 ```
1964 {
1965 "policies": {
1966 "DownloadDirectory": "${home}/Downloads"
1967 }
1968 ```
1969 #### policies.json (Windows)
1970 ```
1971 {
1972 "policies": {
1973 "DownloadDirectory": "${home}\\Downloads"
1974 }
1975 ```
1976 ### EnableTrackingProtection
1977 Configure tracking protection.
1978
1979 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1980
1981 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1982
1983 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1984
1985 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1986
1987 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1988
1989 `Exceptions` are origins for which tracking protection is not enabled.
1990
1991 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1992 **CCK2 Equivalent:** N/A\
1993 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1994
1995 #### Windows (GPO)
1996 ```
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2001 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2002 ```
2003 #### Windows (Intune)
2004 OMA-URI:
2005 ```
2006 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2007 ```
2008 Value (string):
2009 ```
2010 <enabled/>
2011 <data id="TrackingProtectionLocked" value="true | false"/>
2012 <data id="Cryptomining" value="true | false"/>
2013 <data id="Fingerprinting" value="true | false"/>
2014 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2015 ```
2016 #### macOS
2017 ```
2018 <dict>
2019 <key>EnableTrackingProtection</key>
2020 <dict>
2021 <key>Value</key>
2022 <true/> | <false/>
2023 <key><Locked</key>
2024 <true/> | <false/>
2025 <key><Cryptomining</key>
2026 <true/> | <false/>
2027 <key><Fingerprinting</key>
2028 <true/> | <false/>
2029 <key>Exceptions</key>
2030 <array>
2031 <string>https://example.com</string>
2032 </array>
2033 </dict>
2034 </dict>
2035 ```
2036 #### policies.json
2037 ```
2038 {
2039 "policies": {
2040 "EnableTrackingProtection": {
2041 "Value": true | false,
2042 "Locked": true | false,
2043 "Cryptomining": true | false,
2044 "Fingerprinting": true | false,
2045 "Exceptions": ["https://example.com"]
2046 }
2047 }
2048 ```
2049 ### EncryptedMediaExtensions
2050 Enable or disable Encrypted Media Extensions and optionally lock it.
2051
2052 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2053
2054 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2055
2056 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2057 **CCK2 Equivalent:** N/A\
2058 **Preferences Affected:** `media.eme.enabled`
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2063 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2064 ```
2065 #### Windows (Intune)
2066 OMA-URI:
2067 ```
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2070 ```
2071 Value (string):
2072 ```
2073 <enabled/>or <disabled/>
2074 ```
2075 #### macOS
2076 ```
2077 <dict>
2078 <key>EncryptedMediaExtensions</key>
2079 <dict>
2080 <key>Enabled</key>
2081 <true/> | <false/>
2082 <key><Locked</key>
2083 <true/> | <false/>
2084 </dict>
2085 </dict>
2086 ```
2087 #### policies.json
2088 ```
2089 {
2090 "policies": {
2091 "EncryptedMediaExtensions": {
2092 "Enabled": true | false,
2093 "Locked": true | false
2094 }
2095 }
2096 ```
2097 ### EnterprisePoliciesEnabled
2098 Enable policy support on macOS.
2099
2100 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2101 **CCK2 Equivalent:** N/A\
2102 **Preferences Affected:** N/A
2103
2104 #### macOS
2105 ```
2106 <dict>
2107 <key>EnterprisePoliciesEnabled</key>
2108 <true/>
2109 </dict>
2110 ```
2111 ### Extensions
2112 Control the installation, uninstallation and locking of extensions.
2113
2114 `Install` is a list of URLs or native paths for extensions to be installed.
2115
2116 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2117
2118 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2119
2120 **Compatibility:** Firefox 60, Firefox ESR 60\
2121 **CCK2 Equivalent:** `addons`\
2122 **Preferences Affected:** N/A
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2128 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2129 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2130 ```
2131 #### macOS
2132 ```
2133 <dict>
2134 <key>Extensions</key>
2135 <dict>
2136 <key>Install</key>
2137 <array>
2138 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2139 <string>//path/to/xpi</string>
2140 </array>
2141 <key>Uninstall</key>
2142 <array>
2143 <string>bad_addon_id@mozilla.org</string>
2144 </array>
2145 <key>Locked</key>
2146 <array>
2147 <string>addon_id@mozilla.org</string>
2148 </array>
2149 </dict>
2150 </dict>
2151 ```
2152 #### policies.json
2153 ```
2154 {
2155 "policies": {
2156 "Extensions": {
2157 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2158 "Uninstall": ["bad_addon_id@mozilla.org"],
2159 "Locked": ["addon_id@mozilla.org"]
2160 }
2161 }
2162 }
2163 ```
2164 ### ExtensionSettings
2165 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2166
2167 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2168
2169 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2170
2171 The configuration for each extension is another dictionary that can contain the fields documented below.
2172
2173 | Name | Description |
2174 | --- | --- |
2175 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2178 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2179 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2180 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2181 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2182 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2183 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2184 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2185
2186 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2187 **CCK2 Equivalent:** N/A\
2188 **Preferences Affected:** N/A
2189
2190 #### Windows (GPO)
2191 ```
2192 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2193 {
2194 "*": {
2195 "blocked_install_message": "Custom error message.",
2196 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2197 "installation_mode": "blocked",
2198 "allowed_types": ["extension"]
2199 },
2200 "uBlock0@raymondhill.net": {
2201 "installation_mode": "force_installed",
2202 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2203 },
2204 "https-everywhere@eff.org": {
2205 "installation_mode": "allowed",
2206 }
2207 }
2208 ```
2209 #### Windows (Intune)
2210 OMA-URI:
2211 ```
2212 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2213 ```
2214 Value (string):
2215 ```
2216 <enabled/>
2217 <data id="ExtensionSettings" value='
2218 "*": {
2219 "blocked_install_message": "Custom error message.",
2220 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2221 "installation_mode": "blocked",
2222 "allowed_types": ["extension"]
2223 },
2224 "uBlock0@raymondhill.net": {
2225 "installation_mode": "force_installed",
2226 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2227 },
2228 "https-everywhere@eff.org": {
2229 "installation_mode": "allowed",
2230 }'/>
2231 ```
2232 #### macOS
2233 ```
2234 <dict>
2235 <key>ExtensionSettings</key>
2236 <dict>
2237 <key>*</key>
2238 <dict>
2239 <key>blocked_install_message</key>
2240 <string>Custom error message.</string>
2241 <key>install_sources</key>
2242 <array>
2243 <string>about:addons</string>
2244 <string>https://addons.mozilla.org/</string>
2245 </array>
2246 <key>installation_mode</key>
2247 <string>blocked</string>
2248 <key>allowed_types</key>
2249 <array>
2250 <string>extension</string>
2251 </array>
2252 </dict>
2253 <key>uBlock0@raymondhill.net</key>
2254 <dict>
2255 <key>installation_mode</key>
2256 <string>force_installed</string>
2257 <key>install_url</key>
2258 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2259 </dict>
2260 <key>https-everywhere@eff.org</key>
2261 <dict>
2262 <key>installation_mode</key>
2263 <string>allowed</string>
2264 </dict>
2265 </dict>
2266 </dict>
2267 ```
2268 #### policies.json
2269 ```
2270 {
2271 "policies": {
2272 "ExtensionSettings": {
2273 "*": {
2274 "blocked_install_message": "Custom error message.",
2275 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2276 "installation_mode": "blocked",
2277 "allowed_types": ["extension"]
2278 },
2279 "uBlock0@raymondhill.net": {
2280 "installation_mode": "force_installed",
2281 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2282 },
2283 "https-everywhere@eff.org": {
2284 "installation_mode": "allowed"
2285 }
2286 }
2287 }
2288 }
2289 ```
2290 ### ExtensionUpdate
2291 Control extension updates.
2292
2293 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2294 **CCK2 Equivalent:** N/A\
2295 **Preferences Affected:** `extensions.update.enabled`
2296
2297 #### Windows (GPO)
2298 ```
2299 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2300 ```
2301 #### Windows (Intune)
2302 OMA-URI:
2303 ```
2304 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2305 ```
2306 Value (string):
2307 ```
2308 <enabled/> or <disabled/>
2309 ```
2310 #### macOS
2311 ```
2312 <dict>
2313 <key>ExtensionUpdate</key>
2314 <true/> | <false/>
2315 </dict>
2316 ```
2317 #### policies.json
2318 ```
2319 {
2320 "policies": {
2321 "ExtensionUpdate": true | false
2322 }
2323 }
2324 ```
2325 ### FlashPlugin
2326 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2327
2328 `Allow` is a list of origins where Flash are allowed.
2329
2330 `Block` is a list of origins where Flash is not allowed.
2331
2332 `Default` determines whether or not Flash is allowed by default.
2333
2334 `Locked` prevents the user from changing Flash preferences.
2335
2336 **Compatibility:** Firefox 60, Firefox ESR 60\
2337 **CCK2 Equivalent:** `permissions.plugin`\
2338 **Preferences Affected:** `plugin.state.flash`
2339
2340 #### Windows (GPO)
2341 ```
2342 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2343 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2344 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2345 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2346 ```
2347 #### Windows (Intune)
2348 OMA-URI:
2349 ```
2350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2351 ```
2352 Value (string):
2353 ```
2354 <enabled/>
2355 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2356 ```
2357 OMA-URI:
2358 ```
2359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2360 ```
2361 Value (string):
2362 ```
2363 <enabled/> or <disabled/>
2364 ```
2365 OMA-URI:
2366 ```
2367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2368 ```
2369 Value (string):
2370 ```
2371 <enabled/> or <disabled/>
2372 ```
2373 #### macOS
2374 ```
2375 <dict>
2376 <key>FlashPlugin</key>
2377 <dict>
2378 <key>Allow</key>
2379 <array>
2380 <string>http://example.org</string>
2381 </array>
2382 <key>Block</key>
2383 <array>
2384 <string>http://example.edu</string>
2385 </array>
2386 <key>Default</key>
2387 <true/> | <false/>
2388 <key>Locked</key>
2389 <true/> | <false/>
2390 </dict>
2391 </dict>
2392 ```
2393 #### policies.json
2394 ```
2395 {
2396 "policies": {
2397 "FlashPlugin": {
2398 "Allow": ["http://example.org/"],
2399 "Block": ["http://example.edu/"],
2400 "Default": true | false,
2401 "Locked": true | false
2402 }
2403 }
2404 }
2405 ```
2406
2407
2408
2409 ### Handlers
2410 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2411
2412 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2413
2414 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2415
2416 | Name | Description |
2417 | --- | --- |
2418 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2419 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2420 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2421 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2422 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2423 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2424
2425 **Compatibility:** Firefox 78, Firefox ESR 78\
2426 **CCK2 Equivalent:** N/A\
2427 **Preferences Affected:** N/A
2428
2429 #### Windows (GPO)
2430 ```
2431 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2432 {
2433 "mimeTypes": {
2434 "application/msword": {
2435 "action": "useSystemDefault",
2436 "ask": true | false
2437 }
2438 },
2439 "schemes": {
2440 "mailto": {
2441 "action": "useHelperApp",
2442 "ask": true | false,
2443 "handlers": [{
2444 "name": "Gmail",
2445 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2446 }]
2447 }
2448 },
2449 "extensions": {
2450 "pdf": {
2451 "action": "useHelperApp",
2452 "ask": true | false,
2453 "handlers": [{
2454 "name": "Adobe Acrobat",
2455 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2456 }]
2457 }
2458 }
2459 }
2460 ```
2461 #### Windows (Intune)
2462 OMA-URI:
2463 ```
2464 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2465 ```
2466 Value (string):
2467 ```
2468 <enabled/>
2469 <data id="Handlers" value='
2470 {
2471 "mimeTypes": {
2472 "application/msword": {
2473 "action": "useSystemDefault",
2474 "ask": true | false
2475 }
2476 },
2477 "schemes": {
2478 "mailto": {
2479 "action": "useHelperApp",
2480 "ask": true | false,
2481 "handlers": [{
2482 "name": "Gmail",
2483 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2484 }]
2485 }
2486 },
2487 "extensions": {
2488 "pdf": {
2489 "action": "useHelperApp",
2490 "ask": true | false,
2491 "handlers": [{
2492 "name": "Adobe Acrobat",
2493 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2494 }]
2495 }
2496 }
2497 }
2498 '/>
2499 ```
2500 #### macOS
2501 ```
2502 <dict>
2503 <key>Handlers</key>
2504 <dict>
2505 <key>mimeTypes</key>
2506 <dict>
2507 <key>application/msword</key>
2508 <dict>
2509 <key>action</key>
2510 <string>useSystemDefault</string>
2511 <key>ask</key>
2512 <true/> | <false/>
2513 </dict>
2514 </dict>
2515 <key>schemes</key>
2516 <dict>
2517 <key>mailto</key>
2518 <dict>
2519 <key>action</key>
2520 <string>useHelperApp</string>
2521 <key>ask</key>
2522 <true/> | <false/>
2523 <key>handlers</key>
2524 <array>
2525 <dict>
2526 <key>name</key>
2527 <string>Gmail</string>
2528 <key>uriTemplate</key>
2529 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2530 </dict>
2531 </array>
2532 </dict>
2533 </dict>
2534 <key>extensions</key>
2535 <dict>
2536 <key>pdf</key>
2537 <dict>
2538 <key>action</key>
2539 <string>useHelperApp</string>
2540 <key>ask</key>
2541 <true/> | <false/>
2542 <key>handlers</key>
2543 <array>
2544 <dict>
2545 <key>name</key>
2546 <string>Adobe Acrobat</string>
2547 <key>path</key>
2548 <string>/System/Applications/Preview.app</string>
2549 </dict>
2550 </array>
2551 </dict>
2552 </dict>
2553 </dict>
2554 </dict>
2555 ```
2556 #### policies.json
2557 ```
2558 {
2559 "mimeTypes": {
2560 "application/msword": {
2561 "action": "useSystemDefault",
2562 "ask": false
2563 }
2564 },
2565 "schemes": {
2566 "mailto": {
2567 "action": "useHelperApp",
2568 "ask": true | false,
2569 "handlers": [{
2570 "name": "Gmail",
2571 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2572 }]
2573 }
2574 },
2575 "extensions": {
2576 "pdf": {
2577 "action": "useHelperApp",
2578 "ask": true | false,
2579 "handlers": [{
2580 "name": "Adobe Acrobat",
2581 "path": "/usr/bin/acroread"
2582 }]
2583 }
2584 }
2585 }
2586 ```
2587 ### FirefoxHome
2588 Customize the Firefox Home page.
2589
2590 **Compatibility:** Firefox 68, Firefox ESR 68\
2591 **CCK2 Equivalent:** N/A\
2592 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2593
2594 #### Windows (GPO)
2595 ```
2596 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2597 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2598 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2599 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2600 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2601 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2602 ```
2603 #### Windows (Intune)
2604 OMA-URI:
2605 ```
2606 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2607 ```
2608 Value (string):
2609 ```
2610 <enabled/>
2611 <data id="FirefoxHome_Search" value="true | false"/>
2612 <data id="FirefoxHome_TopSites" value="true | false"/>
2613 <data id="FirefoxHome_Highlights" value="true | false"/>
2614 <data id="FirefoxHome_Pocket" value="true | false"/>
2615 <data id="FirefoxHome_Snippets" value="true | false"/>
2616 <data id="FirefoxHome_Locked" value="true | false"/>
2617 ```
2618 #### macOS
2619 ```
2620 <dict>
2621 <key>FirefoxHome</key>
2622 <dict>
2623 <key>Search</key>
2624 <true/> | <false/>
2625 <key>TopSites</key>
2626 <true/> | <false/>
2627 <key>Highlights</key>
2628 <true/> | <false/>
2629 <key>Pocket</key>
2630 <true/> | <false/>
2631 <key>Snippets</key>
2632 <true/> | <false/>
2633 <key>Locked</key>
2634 <true/> | <false/>
2635 </dict>
2636 </dict>
2637 ```
2638 #### policies.json
2639 ```
2640 {
2641 "policies": {
2642 "FirefoxHome": {
2643 "Search": true | false,
2644 "TopSites": true | false,
2645 "Highlights": true | false,
2646 "Pocket": true | false,
2647 "Snippets": true | false,
2648 "Locked": true | false
2649 }
2650 }
2651 }
2652 ```
2653 ### HardwareAcceleration
2654 Control hardware acceleration.
2655
2656 **Compatibility:** Firefox 60, Firefox ESR 60\
2657 **CCK2 Equivalent:** N/A\
2658 **Preferences Affected:** `layers.acceleration.disabled`
2659
2660 #### Windows (GPO)
2661 ```
2662 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2663 ```
2664 #### Windows (Intune)
2665 OMA-URI:
2666 ```
2667 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2668 ```
2669 Value (string):
2670 ```
2671 <enabled/> or <disabled/>
2672 ```
2673 #### macOS
2674 ```
2675 <dict>
2676 <key>HardwareAcceleration</key>
2677 <true/> | <false/>
2678 </dict>
2679 ```
2680 #### policies.json
2681 ```
2682 {
2683 "policies": {
2684 "HardwareAcceleration": true | false
2685 }
2686 }
2687 ```
2688 ### Homepage
2689 Configure the default homepage and how Firefox starts.
2690
2691 `URL` is the default homepage.
2692
2693 `Locked` prevents the user from changing homepage preferences.
2694
2695 `Additional` allows for more than one homepage.
2696
2697 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2698
2699 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2700
2701 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2702 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2703 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2704
2705 #### Windows (GPO)
2706 ```
2707 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2708 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2709 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2710 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2711 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2712 ```
2713 #### Windows (Intune)
2714 OMA-URI:
2715 ```
2716 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2717 ```
2718 Value (string):
2719 ```
2720 <enabled/>
2721
2722 <data id="HomepageURL" value="https://example.com"/>
2723 <data id="HomepageLocked" value="true | false"/>
2724 ```
2725 OMA-URI:
2726 ```
2727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2728 ```
2729 Value (string):
2730 ```
2731 <enabled/>
2732
2733 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2734 ```
2735 OMA-URI:
2736 ```
2737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2738 ```
2739 Value (string):
2740 ```
2741 <enabled/>
2742
2743 <data id="StartPage" value="none | homepage | previous-session"/>
2744 ```
2745 #### macOS
2746 ```
2747 <dict>
2748 <key>Homepage</key>
2749 <dict>
2750 <key>URL</key>
2751 <string>http://example.com</string>
2752 <key>Locked</key>
2753 <true/> | <false/>
2754 <key>Additional</key>
2755 <array>
2756 <string>http://example.org</string>
2757 <string>http://example.edu</string>
2758 </array>
2759 <key>StartPage</key>
2760 <string>none | homepage | previous-session | homepage-locked</string>
2761 </dict>
2762 </dict>
2763 ```
2764 #### policies.json
2765 ```
2766 {
2767 "policies": {
2768 "Homepage": {
2769 "URL": "http://example.com/",
2770 "Locked": true | false,
2771 "Additional": ["http://example.org/",
2772 "http://example.edu/"],
2773 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2774 }
2775 }
2776 }
2777 ```
2778 ### InstallAddonsPermission
2779 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2780
2781 `Allow` is a list of origins where extension installs are allowed.
2782
2783 `Default` determines whether or not extension installs are allowed by default.
2784
2785 **Compatibility:** Firefox 60, Firefox ESR 60\
2786 **CCK2 Equivalent:** `permissions.install`\
2787 **Preferences Affected:** `xpinstall.enabled`
2788
2789 #### Windows (GPO)
2790 ```
2791 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2792 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2793 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2794 ```
2795 #### Windows (Intune)
2796 OMA-URI:
2797 ```
2798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2799 ```
2800 Value (string):
2801 ```
2802 <enabled/>
2803 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2804 ```
2805 OMA-URI:
2806 ```
2807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2808 ```
2809 Value (string):
2810 ```
2811 <enabled/>
2812 ```
2813 #### macOS
2814 ```
2815 <dict>
2816 <key>InstallAddonsPermission</key>
2817 <dict>
2818 <key>Allow</key>
2819 <array>
2820 <string>http://example.org</string>
2821 <string>http://example.edu</string>
2822 </array>
2823 <key>Default</key>
2824 <true/> | <false/>
2825 </dict>
2826 </dict>
2827 ```
2828 #### policies.json
2829 ```
2830 {
2831 "policies": {
2832 "InstallAddonsPermission": {
2833 "Allow": ["http://example.org/",
2834 "http://example.edu/"],
2835 "Default": true | false
2836 }
2837 }
2838 }
2839 ```
2840 ### LegacyProfiles
2841 Disable the feature enforcing a separate profile for each installation.
2842
2843 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2844
2845 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2846
2847 This policy only work on Windows via GPO (not policies.json).
2848
2849 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2850 **CCK2 Equivalent:** N/A\
2851 **Preferences Affected:** N/A
2852
2853 #### Windows (GPO)
2854 ```
2855 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2856 ```
2857 #### Windows (Intune)
2858 OMA-URI:
2859 ```
2860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2861 ```
2862 Value (string):
2863 ```
2864 <enabled/> or <disabled/>
2865 ```
2866 ### LocalFileLinks
2867 Enable linking to local files by origin.
2868
2869 **Compatibility:** Firefox 68, Firefox ESR 68\
2870 **CCK2 Equivalent:** N/A\
2871 **Preferences Affected:** `capability.policy.localfilelinks.*`
2872
2873 #### Windows (GPO)
2874 ```
2875 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2876 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2877 ```
2878 #### Windows (Intune)
2879 OMA-URI:
2880 ```
2881 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2882 ```
2883 Value (string):
2884 ```
2885 <enabled/>
2886 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2887 ```
2888 #### macOS
2889 ```
2890 <dict>
2891 <key>LocalFileLinks</key>
2892 <array>
2893 <string>http://example.org</string>
2894 <string>http://example.edu</string>
2895 </array>
2896 </dict>
2897 ```
2898 #### policies.json
2899 ```
2900 {
2901 "policies": {
2902 "LocalFileLinks": ["http://example.org/",
2903 "http://example.edu/"]
2904 }
2905 }
2906 ```
2907 ### NetworkPrediction
2908 Enable or disable network prediction (DNS prefetching).
2909
2910 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2911 **CCK2 Equivalent:** N/A\
2912 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2913
2914 #### Windows (GPO)
2915 ```
2916 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2917 ```
2918 #### Windows (Intune)
2919 OMA-URI:
2920 ```
2921 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2922 ```
2923 Value (string):
2924 ```
2925 <enabled/> or <disabled/>
2926 ```
2927 #### macOS
2928 ```
2929 <dict>
2930 <key>NetworkPrediction</key>
2931 <true/> | <false/>
2932 </dict>
2933 ```
2934 #### policies.json
2935 ```
2936 {
2937 "policies": {
2938 "NetworkPrediction": true | false
2939 }
2940 ```
2941 ### NewTabPage
2942 Enable or disable the New Tab page.
2943
2944 **Compatibility:** Firefox 68, Firefox ESR 68\
2945 **CCK2 Equivalent:** N/A\
2946 **Preferences Affected:** `browser.newtabpage.enabled`
2947
2948 #### Windows (GPO)
2949 ```
2950 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2951 ```
2952 #### Windows (Intune)
2953 OMA-URI:
2954 ```
2955 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2956 ```
2957 Value (string):
2958 ```
2959 <enabled/> or <disabled/>
2960 ```
2961 #### macOS
2962 ```
2963 <dict>
2964 <key>NewTabPage</key>
2965 <true/> | <false/>
2966 </dict>
2967 ```
2968 #### policies.json
2969 ```
2970 {
2971 "policies": {
2972 "NewTabPage": true | false
2973 }
2974 ```
2975 ### NoDefaultBookmarks
2976 Disable the creation of default bookmarks.
2977
2978 This policy is only effective if the user profile has not been created yet.
2979
2980 **Compatibility:** Firefox 60, Firefox ESR 60\
2981 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2982 **Preferences Affected:** N/A
2983
2984 #### Windows (GPO)
2985 ```
2986 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2987 ```
2988 #### Windows (Intune)
2989 OMA-URI:
2990 ```
2991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2992 ```
2993 Value (string):
2994 ```
2995 <enabled/> or <disabled/>
2996 ```
2997 #### macOS
2998 ```
2999 <dict>
3000 <key>NoDefaultBookmarks</key>
3001 <true/> | <false/>
3002 </dict>
3003 ```
3004 #### policies.json
3005 ```
3006 {
3007 "policies": {
3008 "NoDefaultBookmarks": true | false
3009 }
3010 }
3011 ```
3012 ### OfferToSaveLogins
3013 Control whether or not Firefox offers to save passwords.
3014
3015 **Compatibility:** Firefox 60, Firefox ESR 60\
3016 **CCK2 Equivalent:** `dontRememberPasswords`\
3017 **Preferences Affected:** `signon.rememberSignons`
3018
3019 #### Windows (GPO)
3020 ```
3021 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3022 ```
3023 #### Windows (Intune)
3024 OMA-URI:
3025 ```
3026 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3027 ```
3028 Value (string):
3029 ```
3030 <enabled/> or <disabled/>
3031 ```
3032 #### macOS
3033 ```
3034 <dict>
3035 <key>OfferToSaveLogins</key>
3036 <true/> | <false/>
3037 </dict>
3038 ```
3039 #### policies.json
3040 ```
3041 {
3042 "policies": {
3043 "OfferToSaveLogins": true | false
3044 }
3045 }
3046 ```
3047 ### OfferToSaveLoginsDefault
3048 Sets the default value of signon.rememberSignons without locking it.
3049
3050 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3051 **CCK2 Equivalent:** `dontRememberPasswords`\
3052 **Preferences Affected:** `signon.rememberSignons`
3053
3054 #### Windows (GPO)
3055 ```
3056 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3057 ```
3058 #### Windows (Intune)
3059 OMA-URI:
3060 ```
3061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3062 ```
3063 Value (string):
3064 ```
3065 <enabled/> or <disabled/>
3066 ```
3067 #### macOS
3068 ```
3069 <dict>
3070 <key>OfferToSaveLoginsDefault</key>
3071 <true/> | <false/>
3072 </dict>
3073 ```
3074 #### policies.json
3075 ```
3076 {
3077 "policies": {
3078 "OfferToSaveLoginsDefault": true | false
3079 }
3080 }
3081 ```
3082 ### OverrideFirstRunPage
3083 Override the first run page. If the value is blank, no first run page is displayed.
3084
3085 **Compatibility:** Firefox 60, Firefox ESR 60\
3086 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3087 **Preferences Affected:** `startup.homepage_welcome_url`
3088
3089 #### Windows (GPO)
3090 ```
3091 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3092 ```
3093 #### Windows (Intune)
3094 OMA-URI:
3095 ```
3096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3097 ```
3098 Value (string):
3099 ```
3100 <enabled/>
3101 <data id="OverridePage" value="https://example.com"/>
3102 ```
3103 #### macOS
3104 ```
3105 <dict>
3106 <key>OverrideFirstRunPage</key>
3107 <string>http://example.org</string>
3108 </dict>
3109 ```
3110 #### policies.json
3111 ```
3112 {
3113 "policies": {
3114 "OverrideFirstRunPage": "http://example.org"
3115 }
3116 ```
3117 ### OverridePostUpdatePage
3118 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3119
3120 **Compatibility:** Firefox 60, Firefox ESR 60\
3121 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3122 **Preferences Affected:** `startup.homepage_override_url`
3123
3124 #### Windows (GPO)
3125 ```
3126 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3127 ```
3128 #### Windows (Intune)
3129 OMA-URI:
3130 ```
3131 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3132 ```
3133 Value (string):
3134 ```
3135 <enabled/>
3136 <data id="OverridePage" value="https://example.com"/>
3137 ```
3138 #### macOS
3139 ```
3140 <dict>
3141 <key>OverridePostUpdatePage</key>
3142 <string>http://example.org</string>
3143 </dict>
3144 ```
3145 #### policies.json
3146 ```
3147 {
3148 "policies": {
3149 "OverridePostUpdatePage": "http://example.org"
3150 }
3151 ```
3152 ### PasswordManagerEnabled
3153 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3154
3155 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3156 **CCK2 Equivalent:** N/A\
3157 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3158
3159 #### Windows (GPO)
3160 ```
3161 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3162 ```
3163 #### Windows (Intune)
3164 OMA-URI:
3165 ```
3166 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3167 ```
3168 Value (string):
3169 ```
3170 <enabled/> or <disabled/>
3171 ```
3172 #### macOS
3173 ```
3174 <dict>
3175 <key>PasswordManagerEnabled</key>
3176 <true/> | <false/>
3177 </dict>
3178 ```
3179 #### policies.json
3180 ```
3181 {
3182 "policies": {
3183 "PasswordManagerEnabled": true | false
3184 }
3185 }
3186 ```
3187 ### PDFjs
3188 Disable or configure PDF.js, the built-in PDF viewer.
3189
3190 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3191
3192 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3193
3194 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3195
3196 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3197 **CCK2 Equivalent:** N/A\
3198 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3199
3200 #### Windows (GPO)
3201 ```
3202 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3203 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3204 ```
3205 #### Windows (Intune)
3206 OMA-URI:
3207 ```
3208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3210 ```
3211 Value (string):
3212 ```
3213 <enabled/>or <disabled/>
3214 ```
3215 #### macOS
3216 ```
3217 <dict>
3218 <key>PDFjs</key>
3219 <dict>
3220 <key>Enabled</key>
3221 <true/> | <false/>
3222 <key><EnablePermissions</key>
3223 <true/> | <false/>
3224 </dict>
3225 </dict>
3226 ```
3227 #### policies.json
3228 ```
3229 {
3230 "policies": {
3231 "PSFjs": {
3232 "Enabled": true | false,
3233 "EnablePermissions": true | false
3234 }
3235 }
3236 ```
3237 ### Permissions
3238 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3239
3240 `Allow` is a list of origins where the feature is allowed.
3241
3242 `Block` is a list of origins where the feature is not allowed.
3243
3244 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3245
3246 `Locked` prevents the user from changing preferences for the feature.
3247
3248 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3249
3250 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3251 **CCK2 Equivalent:** N/A\
3252 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3253
3254 #### Windows (GPO)
3255 ```
3256 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3257 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3258 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3259 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3260 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3261 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3262 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3263 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3264 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3265 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3266 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3267 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3268 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3269 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3270 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3271 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3272 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3273 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3274 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3275 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3276 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3277 ```
3278 #### Windows (Intune)
3279 OMA-URI:
3280 ```
3281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3282 ```
3283 Value (string):
3284 ```
3285 <enabled/> or <disabled/>
3286 ```
3287 OMA-URI:
3288 ```
3289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3290 ```
3291 Value (string):
3292 ```
3293 <enabled/> or <disabled/>
3294 ```
3295 OMA-URI:
3296 ```
3297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3298 ```
3299 Value (string):
3300 ```
3301 <enabled/>
3302 <data id="Permissions" value="1&#xF000;https://example.org"/>
3303 ```
3304 OMA-URI:
3305 ```
3306 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3307 ```
3308 Value (string):
3309 ```
3310 <enabled/> or <disabled/>
3311 ```
3312 OMA-URI:
3313 ```
3314 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3315 ```
3316 Value (string):
3317 ```
3318 <enabled/> or <disabled/>
3319 ```
3320 OMA-URI:
3321 ```
3322 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3323 ```
3324 Value (string):
3325 ```
3326 <enabled/>
3327 <data id="Permissions" value="1&#xF000;https://example.org"/>
3328 ```
3329 OMA-URI:
3330 ```
3331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3332 ```
3333 Value (string):
3334 ```
3335 <enabled/>
3336 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3337 ```
3338 OMA-URI:
3339 ```
3340 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3341 ```
3342 Value (string):
3343 ```
3344 <enabled/>
3345 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3346 ```
3347 OMA-URI:
3348 ```
3349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3350 ```
3351 Value (string):
3352 ```
3353 <enabled/> or <disabled/>
3354 ```
3355 #### macOS
3356 ```
3357 <dict>
3358 <key>Permissions</key>
3359 <dict>
3360 <key>Camera</key>
3361 <dict>
3362 <key>Allow</key>
3363 <array>
3364 <string>https://example.org</string>
3365 <string>https://example.org:1234</string>
3366 </array>
3367 <key>Block</key>
3368 <array>
3369 <string>https://example.edu</string>
3370 </array>
3371 <key>BlockNewRequests</key>
3372 <true/> | <false/>
3373 <key>Locked</key>
3374 <true/> | <false/>
3375 </dict>
3376 <key>Microphone</key>
3377 <dict>
3378 <key>Allow</key>
3379 <array>
3380 <string>https://example.org</string>
3381 </array>
3382 <key>Block</key>
3383 <array>
3384 <string>https://example.edu</string>
3385 </array>
3386 <key>BlockNewRequests</key>
3387 <true/> | <false/>
3388 <key>Locked</key>
3389 <true/> | <false/>
3390 </dict>
3391 <key>Location</key>
3392 <dict>
3393 <key>Allow</key>
3394 <array>
3395 <string>https://example.org</string>
3396 </array>
3397 <key>Block</key>
3398 <array>
3399 <string>https://example.edu</string>
3400 </array>
3401 <key>BlockNewRequests</key>
3402 <true/> | <false/>
3403 <key>Locked</key>
3404 <true/> | <false/>
3405 </dict>
3406 <key>Notifications</key>
3407 <dict>
3408 <key>Allow</key>
3409 <array>
3410 <string>https://example.org</string>
3411 </array>
3412 <key>Block</key>
3413 <array>
3414 <string>https://example.edu</string>
3415 </array>
3416 <key>BlockNewRequests</key>
3417 <true/>
3418 <key>Locked</key>
3419 <true/>
3420 </dict>
3421 <key>Autoplay</key>
3422 <dict>
3423 <key>Allow</key>
3424 <array>
3425 <string>https://example.org</string>
3426 </array>
3427 <key>Block</key>
3428 <array>
3429 <string>https://example.edu</string>
3430 </array>
3431 <key>Default</key>
3432 <string>allow-audio-video | block-audio | block-audio-video</string>
3433 <key>Locked</key>
3434 <true/> | <false/>
3435 </dict>
3436 </dict>
3437 </dict>
3438 ```
3439 #### policies.json
3440 ```
3441 {
3442 "policies": {
3443 "Permissions": {
3444 "Camera": {
3445 "Allow": ["https://example.org","https://example.org:1234"],
3446 "Block": ["https://example.edu"],
3447 "BlockNewRequests": true | false,
3448 "Locked": true | false
3449 },
3450 "Microphone": {
3451 "Allow": ["https://example.org"],
3452 "Block": ["https://example.edu"],
3453 "BlockNewRequests": true | false,
3454 "Locked": true | false
3455 },
3456 "Location": {
3457 "Allow": ["https://example.org"],
3458 "Block": ["https://example.edu"],
3459 "BlockNewRequests": true | false,
3460 "Locked": true | false
3461 },
3462 "Notifications": {
3463 "Allow": ["https://example.org"],
3464 "Block": ["https://example.edu"],
3465 "BlockNewRequests": true | false,
3466 "Locked": true | false
3467 },
3468 "Autoplay": {
3469 "Allow": ["https://example.org"],
3470 "Block": ["https://example.edu"],
3471 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3472 "Locked": true | false
3473 }
3474 }
3475 }
3476 }
3477 ```
3478 ### PictureInPicture
3479
3480 Enable or disable Picture-in-Picture.
3481
3482 **Compatibility:** Firefox 78, Firefox ESR 78\
3483 **CCK2 Equivalent:** N/A\
3484 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3485
3486 #### Windows (GPO)
3487 ```
3488 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3489 ```
3490 #### Windows (Intune)
3491 OMA-URI:
3492 ```
3493 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3494 ```
3495 Value (string):
3496 ```
3497 <enabled/> or <disabled/>
3498 ```
3499 #### macOS
3500 ```
3501 <dict>
3502 <key>PictureInPicture</key>
3503 <true/> | <false/>
3504 </dict>
3505 ```
3506 #### policies.json
3507 ```
3508 {
3509 "policies": {
3510 "PictureInPicture": true | false
3511 }
3512 }
3513 ```
3514 ### PopupBlocking
3515 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3516
3517 `Allow` is a list of origins where popup-windows are allowed.
3518
3519 `Default` determines whether or not pop-up windows are allowed by default.
3520
3521 `Locked` prevents the user from changing pop-up preferences.
3522
3523 **Compatibility:** Firefox 60, Firefox ESR 60\
3524 **CCK2 Equivalent:** `permissions.popup`\
3525 **Preferences Affected:** `dom.disable_open_during_load`
3526
3527 #### Windows (GPO)
3528 ```
3529 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3530 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3531 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3532 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3533 ```
3534 #### Windows (Intune)
3535 OMA-URI:
3536 ```
3537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3538 ```
3539 Value (string):
3540 ```
3541 <enabled/>
3542 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3543 ```
3544 OMA-URI:
3545 ```
3546 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3547 ```
3548 Value (string):
3549 ```
3550 <enabled/> or <disabled/>
3551 ```
3552 OMA-URI:
3553 ```
3554 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3555 ```
3556 Value (string):
3557 ```
3558 <enabled/> or <disabled/>
3559 ```
3560 #### macOS
3561 ```
3562 <dict>
3563 <key>PopupBlocking</key>
3564 <dict>
3565 <key>Allow</key>
3566 <array>
3567 <string>http://example.org</string>
3568 <string>http://example.edu</string>
3569 </array>
3570 <key>Default</key>
3571 <true/> | <false/>
3572 <key>Locked</key>
3573 <true/> | <false/>
3574 </dict>
3575 </dict>
3576 ```
3577 #### policies.json
3578 ```
3579 {
3580 "policies": {
3581 "PopupBlocking": {
3582 "Allow": ["http://example.org/",
3583 "http://example.edu/"],
3584 "Default": true | false,
3585 "Locked": true | false
3586 }
3587 }
3588 }
3589 ```
3590 ### Preferences
3591 Set and lock certain preferences.
3592
3593 **Compatibility:** See below\
3594 **CCK2 Equivalent:** `preferences`\
3595 **Preferences Affected:** See below
3596
3597 | Preference | Type | Compatibility | Default
3598 | --- | --- | --- | ---
3599 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3600 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3601 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3602 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3603 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3604 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3605 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3606 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3607 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3608 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3609 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3610 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3611 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3612 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3613 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3614 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3615 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3616 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3617 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3618 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3619 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3620 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3621 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3622 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3623 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3624 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3625 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3626 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3627 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3628 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3629 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3630 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3631 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3632 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3633 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3634 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3635 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3637 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3639 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3641 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3643 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3645 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3647 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3648 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3649 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3650 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3651 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3653 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3655 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3657 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3659 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3661 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3663 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3665 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3667 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3669 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3671 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3673 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3675 disabled
3676 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3677 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3678 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3679 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3680 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3681 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3682 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3683 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3684 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3685 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3686 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3687 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3688 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3689 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3690 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3691 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3692 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3693 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3694 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3695 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3696 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3697 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3698 #### Windows (GPO)
3699 ```
3700 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3701 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3702 ```
3703 #### Windows (Intune)
3704 OMA-URI: (periods are replaced by underscores)
3705 ```
3706 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3707 ```
3708 Value (string):
3709 ```
3710 <enabled/> or <disabled/>
3711 ```
3712 #### macOS
3713 ```
3714 <dict>
3715 <key>Preferences</key>
3716 <dict>
3717 <key>boolean_preference_name</key>
3718 <true/> | <false/>
3719 <key>string_preference_name</key>
3720 <string>string_value</string>
3721 </dict>
3722 </dict>
3723 ```
3724 #### policies.json
3725 ```
3726 {
3727 "policies": {
3728 "Preferences": {
3729 "boolean_preference_name": true | false,
3730 "string_preference_name": "string_value"
3731 }
3732 }
3733 }
3734 ```
3735 ### PromptForDownloadLocation
3736 Ask where to save each file before downloading.
3737
3738 **Compatibility:** Firefox 68, Firefox ESR 68\
3739 **CCK2 Equivalent:** N/A\
3740 **Preferences Affected:** `browser.download.useDownloadDir`
3741
3742 #### Windows (GPO)
3743 ```
3744 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3745 ```
3746 #### Windows (Intune)
3747 OMA-URI:
3748 ```
3749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3750 ```
3751 Value (string):
3752 ```
3753 <enabled/> or <disabled/>
3754 ```
3755 #### macOS
3756 ```
3757 <dict>
3758 <key>PromptForDownloadLocation</key>
3759 <true/> | <false/>
3760 </dict>
3761 ```
3762 #### policies.json
3763 ```
3764 {
3765 "policies": {
3766 "PromptForDownloadLocation": true | false
3767 }
3768 }
3769 ```
3770 ### Proxy
3771 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3772 To specify ports, append them to the hostnames with a colon (:).
3773
3774 `Mode` is the proxy method being used.
3775
3776 `Locked` is whether or not proxy settings can be changed.
3777
3778 `HTTPProxy` is the HTTP proxy server.
3779
3780 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3781
3782 `SSLProxy` is the SSL proxy server.
3783
3784 `FTPProxy` is the FTP proxy server.
3785
3786 `SOCKSProxy` is the SOCKS proxy server
3787
3788 `SOCKSVersion` is the SOCKS version (4 or 5)
3789
3790 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3791
3792 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3793
3794 `AutoLogin` means do not prompt for authentication if password is saved.
3795
3796 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3797
3798 **Compatibility:** Firefox 60, Firefox ESR 60\
3799 **CCK2 Equivalent:** `networkProxy*`\
3800 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3801
3802 #### Windows (GPO)
3803 ```
3804 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3805 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3806 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3807 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3808 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3809 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3810 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3811 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3812 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3813 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3814 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3815 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3816 ```
3817 #### Windows (Intune)
3818 OMA-URI:
3819 ```
3820 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3821 ```
3822 Value (string):
3823 ```
3824 <enabled/>
3825 <data id="ProxyLocked" value="true | false"/>
3826 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3827 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3828 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3829 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3830 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3831 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3832 <data id="SOCKSVersion" value="4 | 5"/>
3833 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3834 <data id="Passthrough" value="<local>"/>
3835 <data id="AutoLogin" value="true | false"/>
3836 <data id="UseProxyForDNS" value="true | false"/>
3837 ```
3838 #### macOS
3839 ```
3840 <dict>
3841 <key>Proxy</key>
3842 <dict>
3843 <key>Mode</key>
3844 <string>none | system | manual | autoDetect | autoConfig</string>
3845 <key>Locked</key>
3846 <true> | </false>
3847 <key>HTTPProxy</key>
3848 <string>https://httpproxy.example.com</string>
3849 <key>UseHTTPProxyForAllProtocols</key>
3850 <true> | </false>
3851 <key>SSLProxy</key>
3852 <string>https://sslproxy.example.com</string>
3853 <key>FTPProxy</key>
3854 <string>https://ftpproxy.example.com</string>
3855 <key>SOCKSProxy</key>
3856 <string>https://socksproxy.example.com</string>
3857 <key>SOCKSVersion</key>
3858 <string>4 | 5</string>
3859 <key>Passthrough</key>
3860 <string>&lt;local>&gt;</string>
3861 <key>AutoConfigURL</key>
3862 <string>URL_TO_AUTOCONFIG</string>
3863 <key>AutoLogin</key>
3864 <true> | </false>
3865 <key>UseProxyForDNS</key>
3866 <true> | </false>
3867 </dict>
3868 </dict>
3869 ```
3870 #### policies.json
3871 ```
3872 {
3873 "policies": {
3874 "Proxy": {
3875 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3876 "Locked": true | false,
3877 "HTTPProxy": "hostname",
3878 "UseHTTPProxyForAllProtocols": true | false,
3879 "SSLProxy": "hostname",
3880 "FTPProxy": "hostname",
3881 "SOCKSProxy": "hostname",
3882 "SOCKSVersion": 4 | 5
3883 "Passthrough": "<local>",
3884 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3885 "AutoLogin": true | false,
3886 "UseProxyForDNS": true | false
3887 }
3888 }
3889 }
3890 ```
3891 ### RequestedLocales
3892 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3893
3894 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3895
3896 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3897 **CCK2 Equivalent:** N/A\
3898 **Preferences Affected:** N/A
3899 #### Windows (GPO)
3900 ```
3901 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3902 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3903
3904 or
3905
3906 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3907 ```
3908 #### Windows (Intune)
3909 OMA-URI:
3910 ```
3911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3912 ```
3913 Value (string):
3914 ```
3915 <enabled/>
3916 <data id="Preferences_String" value="de,en-US"/>
3917 ```
3918 #### macOS
3919 ```
3920 <dict>
3921 <key>RequestedLocales</key>
3922 <array>
3923 <string>de</string>
3924 <string>en-US</string>
3925 </array>
3926 </dict>
3927
3928 or
3929
3930 <dict>
3931 <key>RequestedLocales</key>
3932 <string>de,en-US</string>
3933 </dict>
3934
3935 ```
3936 #### policies.json
3937 ```
3938 {
3939 "policies": {
3940 "RequestedLocales": ["de", "en-US"]
3941 }
3942 }
3943
3944 or
3945
3946 {
3947 "policies": {
3948 "RequestedLocales": "de,en-US"
3949 }
3950 }
3951 ```
3952 <a name="SanitizeOnShutdown"></a>
3953
3954 ### SanitizeOnShutdown (Selective)
3955 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3956
3957 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3958
3959 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3960 **CCK2 Equivalent:** N/A\
3961 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3962 #### Windows (GPO)
3963 ```
3964 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3965 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3966 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3967 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3968 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3969 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3970 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3971 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3972 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3973 ```
3974 #### Windows (Intune)
3975 OMA-URI:
3976 ```
3977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3978 ```
3979 Value (string):
3980 ```
3981 <enabled/> or <disabled/>
3982 ```
3983 #### macOS
3984 ```
3985 <dict>
3986 <key>SanitizeOnShutdown</key>
3987 <dict>
3988 <key>Cache</key>
3989 <true/> | <false/>
3990 <key>Cookies</key>
3991 <true/> | <false/>
3992 <key>Downloads</key>
3993 <true/> | <false/>
3994 <key>FormData</key>
3995 <true/> | <false/>
3996 <key>History</key>
3997 <true/> | <false/>
3998 <key>Sessions</key>
3999 <true/> | <false/>
4000 <key>SiteSettings</key>
4001 <true/> | <false/>
4002 <key>OfflineApps</key>
4003 <true/> | <false/>
4004 <key>Locked</key>
4005 <true/> | <false/>
4006 </dict>
4007 </dict>
4008 ```
4009 #### policies.json
4010 ```
4011 {
4012 "policies": {
4013 "SanitizeOnShutdown": {
4014 "Cache": true | false,
4015 "Cookies": true | false,
4016 "Downloads": true | false,
4017 "FormData": true | false,
4018 "History": true | false,
4019 "Sessions": true | false,
4020 "SiteSettings": true | false,
4021 "OfflineApps": true | false,
4022 "Locked": true | false
4023 }
4024 }
4025 }
4026 ```
4027 ### SanitizeOnShutdown (All)
4028 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4029
4030 **Compatibility:** Firefox 60, Firefox ESR 60\
4031 **CCK2 Equivalent:** N/A\
4032 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4033 #### Windows (GPO)
4034 ```
4035 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4036 ```
4037 #### Windows (Intune)
4038 OMA-URI:
4039 ```
4040 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4041 ```
4042 Value (string):
4043 ```
4044 <enabled/> or <disabled/>
4045 ```
4046 #### macOS
4047 ```
4048 <dict>
4049 <key>SanitizeOnShutdown</key>
4050 <true/> | <false/>
4051 </dict>
4052 ```
4053 #### policies.json
4054 ```
4055 {
4056 "policies": {
4057 "SanitizeOnShutdown": true | false
4058 }
4059 }
4060 ```
4061 ### SearchBar
4062 Set whether or not search bar is displayed.
4063
4064 **Compatibility:** Firefox 60, Firefox ESR 60\
4065 **CCK2 Equivalent:** `showSearchBar`\
4066 **Preferences Affected:** N/A
4067
4068 #### Windows (GPO)
4069 ```
4070 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4071 ```
4072
4073 #### Windows (Intune)
4074 OMA-URI:
4075 ```
4076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4077 ```
4078 Value (string):
4079 ```
4080 <enabled/>
4081 <data id="Permissions" value="unified | separate"/>
4082 ```
4083 #### macOS
4084 ```
4085 <dict>
4086 <key>SearchBar</key>
4087 <string>unified | separate</string>
4088 </dict>
4089 ```
4090 #### policies.json
4091 ```
4092 {
4093 "policies": {
4094 "SearchBar": "unified" | "separate"
4095 }
4096 }
4097 ```
4098 <a name="SearchEngines"></a>
4099
4100 ### SearchEngines (This policy is only available on the ESR.)
4101
4102 ### SearchEngines | Default
4103
4104 Set the default search engine. This policy is only available on the ESR.
4105
4106 **Compatibility:** Firefox ESR 60\
4107 **CCK2 Equivalent:** `defaultSearchEngine`\
4108 **Preferences Affected:** N/A
4109
4110 #### Windows (GPO)
4111 ```
4112 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4113 ```
4114 #### Windows (Intune)
4115 OMA-URI:
4116 ```
4117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4118 ```
4119 Value (string):
4120 ```
4121 <enabled/>
4122 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4123 ```
4124 #### macOS
4125 ```
4126 <dict>
4127 <key>SearchEngines</key>
4128 <dict>
4129 <key>Default</key>
4130 <string>NAME_OF_SEARCH_ENGINE</string>
4131 </dict>
4132 </dict>
4133 ```
4134 #### policies.json
4135 ```
4136 {
4137 "policies": {
4138 "SearchEngines": {
4139 "Default": "NAME_OF_SEARCH_ENGINE"
4140 }
4141 }
4142 }
4143 ```
4144 ### SearchEngines | PreventInstalls
4145
4146 Prevent installing search engines from webpages.
4147
4148 **Compatibility:** Firefox ESR 60\
4149 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4150 **Preferences Affected:** N/A
4151
4152 #### Windows (GPO)
4153 ```
4154 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4155 ```
4156 #### Windows (Intune)
4157 OMA-URI:
4158 ```
4159 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4160 ```
4161 Value (string):
4162 ```
4163 <enabled/> or <disabled/>
4164 ```
4165 #### macOS
4166 ```
4167 <dict>
4168 <key>SearchEngines</key>
4169 <dict>
4170 <key>PreventInstalls</key>
4171 <true/> | <false/>
4172 </dict>
4173 </dict>
4174 ```
4175 #### policies.json
4176 ```
4177 {
4178 "policies": {
4179 "SearchEngines": {
4180 "PreventInstalls": true | false
4181 }
4182 }
4183 }
4184 ```
4185 ### SearchEngines | Remove
4186
4187 Hide built-in search engines. This policy is only available on the ESR.
4188
4189 **Compatibility:** Firefox ESR 60.2\
4190 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4191 **Preferences Affected:** N/A
4192
4193 #### Windows (GPO)
4194 ```
4195 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4196 ```
4197 #### Windows (Intune)
4198 OMA-URI:
4199 ```
4200 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4201 ```
4202 Value (string):
4203 ```
4204 <enabled/>
4205 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4206 ```
4207 #### macOS
4208 ```
4209 <dict>
4210 <key>SearchEngines</key>
4211 <dict>
4212 <key>Remove</key>
4213 <array>
4214 <string>NAME_OF_SEARCH_ENGINE</string>
4215 </array>
4216 </dict>
4217 </dict>
4218 ```
4219 #### policies.json
4220 ```
4221 {
4222 "policies": {
4223 "SearchEngines": {
4224 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4225 }
4226 }
4227 }
4228 ```
4229 ### SearchEngines | Add
4230
4231 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4232
4233 `Name` is the name of the search engine.
4234
4235 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4236
4237 `Method` is either GET or POST
4238
4239 `IconURL` is a URL for the icon to use.
4240
4241 `Alias` is a keyword to use for the engine.
4242
4243 `Description` is a description of the search engine.
4244
4245 `PostData` is the POST data as name value pairs separated by &.
4246
4247 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4248
4249 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4250 **CCK2 Equivalent:** `searchplugins`\
4251 **Preferences Affected:** N/A
4252
4253 #### Windows (GPO)
4254 ```
4255 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4256 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4257 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4258 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4259 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4260 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4261 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4262 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4263 ```
4264 #### Windows (Intune)
4265 OMA-URI:
4266 ```
4267 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4268 ```
4269 Value (string):
4270 ```
4271 <enabled/>
4272 <data id="SearchEngine_Name" value="Example1"/>
4273 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4274 <data id="SearchEngine_Method" value="GET | POST"/>
4275 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4276 <data id="SearchEngine_Alias" value="example"/>
4277 <data id="SearchEngine_Description" value="Example Description"/>
4278 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4279 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4280 ```
4281 #### macOS
4282 ```
4283 <dict>
4284 <key>SearchEngines</key>
4285 <dict>
4286 <key>Add</key>
4287 <array>
4288 <dict>
4289 <key>Name</key>
4290 <string>Example1</string>
4291 <key>URLTemplate</key>
4292 <string>https://www.example.org/q={searchTerms}</string>
4293 <key>Method</key>
4294 <string>GET | POST </string>
4295 <key>IconURL</key>
4296 <string>https://www.example.org/favicon.ico</string>
4297 <key>Alias</key>
4298 <string>example</string>
4299 <key>Description</key>
4300 <string>Example Description</string>
4301 <key>SuggestURLTemplate</key>
4302 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4303 <key>PostData</key>
4304 <string>name=value&q={searchTerms}</string>
4305 </dict>
4306 <array>
4307 </dict>
4308 </dict>
4309 ```
4310 #### policies.json
4311 ```
4312 {
4313 "policies": {
4314 "SearchEngines": {
4315 "Add": [
4316 {
4317 "Name": "Example1",
4318 "URLTemplate": "https://www.example.org/q={searchTerms}",
4319 "Method": "GET" | "POST",
4320 "IconURL": "https://www.example.org/favicon.ico",
4321 "Alias": "example",
4322 "Description": "Description",
4323 "PostData": "name=value&q={searchTerms}",
4324 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4325 }
4326 ]
4327 }
4328 }
4329 }
4330 ```
4331 ### SearchSuggestEnabled
4332
4333 Enable search suggestions.
4334
4335 **Compatibility:** Firefox 68, Firefox ESR 68\
4336 **CCK2 Equivalent:** N/A\
4337 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4338
4339 #### Windows (GPO)
4340 ```
4341 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4342 ```
4343 #### Windows (Intune)
4344 OMA-URI:
4345 ```
4346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4347 ```
4348 Value (string):
4349 ```
4350 <enabled/> or <disabled/>
4351 ```
4352 #### macOS
4353 ```
4354 <dict>
4355 <key>SearchSuggestEnabled</key>
4356 <true/> | <false/>
4357 </dict>
4358 ```
4359 #### policies.json
4360 ```
4361 {
4362 "policies": {
4363 "SearchSuggestEnabled": true | false
4364 }
4365 }
4366 ```
4367 ### SecurityDevices
4368
4369 Install PKCS #11 modules.
4370
4371 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4372 **CCK2 Equivalent:** `certs.devices`\
4373 **Preferences Affected:** N/A
4374
4375 #### Windows (GPO)
4376 ```
4377 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4378 ```
4379 #### Windows (Intune)
4380 OMA-URI:
4381 ```
4382 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4383 ```
4384 Value (string):
4385 ```
4386 <enabled/>
4387 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4388 ```
4389 #### macOS
4390 ```
4391 <dict>
4392 <key>SecurityDevices</key>
4393 <dict>
4394 <key>NAME_OF_DEVICE</key>
4395 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4396 </dict>
4397 </dict>
4398 ```
4399
4400 #### policies.json
4401 ```
4402 {
4403 "policies": {
4404 "SecurityDevices": {
4405 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4406 }
4407 }
4408 }
4409 ```
4410 ### SSLVersionMax
4411
4412 Set and lock the maximum version of TLS.
4413
4414 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4415 **CCK2 Equivalent:** N/A\
4416 **Preferences Affected:** `security.tls.version.max`
4417
4418 #### Windows (GPO)
4419 ```
4420 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4421 ```
4422 #### Windows (Intune)
4423 OMA-URI:
4424 ```
4425 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4426 ```
4427 Value (string):
4428 ```
4429 <enabled/>
4430 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4431 ```
4432 #### macOS
4433 ```
4434 <dict>
4435 <key>SSLVersionMax</key>
4436 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4437 </dict>
4438 ```
4439
4440 #### policies.json
4441 ```
4442 {
4443 "policies": {
4444 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4445 }
4446 }
4447 ```
4448 ### SSLVersionMin
4449
4450 Set and lock the minimum version of TLS.
4451
4452 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4453 **CCK2 Equivalent:** N/A\
4454 **Preferences Affected:** `security.tls.version.min`
4455
4456 #### Windows (GPO)
4457 ```
4458 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4459 ```
4460 #### Windows (Intune)
4461 OMA-URI:
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/>
4468 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4469 ```
4470 #### macOS
4471 ```
4472 <dict>
4473 <key>SSLVersionMin</key>
4474 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4475 </dict>
4476 ```
4477
4478 #### policies.json
4479 ```
4480 {
4481 "policies": {
4482 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4483 }
4484 }
4485 ```
4486 ### SupportMenu
4487 Add a menuitem to the help menu for specifying support information.
4488
4489 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4490 **CCK2 Equivalent:** helpMenu\
4491 **Preferences Affected:** N/A
4492
4493 #### Windows (GPO)
4494 ```
4495 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4496 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4497 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4498 ```
4499 #### Windows (Intune)
4500 OMA-URI:
4501 ```
4502 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4503 ```
4504 Value (string):
4505 ```
4506 <enabled/>
4507 <data id="SupportMenuTitle" value="Support Menu"/>
4508 <data id="SupportMenuURL" value="http://example.com/support"/>
4509 <data id="SupportMenuAccessKey" value="S">
4510 ```
4511 #### macOS
4512 ```
4513 <dict>
4514 <key>SupportMenu</key>
4515 <dict>
4516 <key>Title</key>
4517 <string>SupportMenu</string>
4518 <key>URL</key>
4519 <string>http://example.com/support</string>
4520 <key>AccessKey</key>
4521 <string>S</string>
4522 </dict>
4523 </dict>
4524 ```
4525 #### policies.json
4526 ```
4527 {
4528 "policies": {
4529 "SupportMenu": {
4530 "Title": "Support Menu",
4531 "URL": "http://example.com/support",
4532 "AccessKey": "S"
4533 }
4534 }
4535 }
4536 ```
4537 ### UserMessaging
4538
4539 Prevent installing search engines from webpages.
4540
4541 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4542
4543 `ExtensionRecommendations` Don't recommend extensions.
4544
4545 `FeatureRecommendations` Don't recommend browser features.
4546
4547 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4548
4549 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4550 **CCK2 Equivalent:** N/A\
4551 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4552
4553 #### Windows (GPO)
4554 ```
4555 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4556 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4557 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4558 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4559 ```
4560 #### Windows (Intune)
4561 OMA-URI:
4562 ```
4563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4564 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4565 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4566 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4567 ```
4568 Value (string):
4569 ```
4570 <enabled/> or <disabled/>
4571 ```
4572 #### macOS
4573 ```
4574 <dict>
4575 <key>UserMessaging</key>
4576 <dict>
4577 <key>WhatsNew</key>
4578 <true/> | <false/>
4579 <key>ExtensionRecommendations</key>
4580 <true/> | <false/>
4581 <key>FeatureRecommendations</key>
4582 <true/> | <false/>
4583 <key>UrlbarInterventions</key>
4584 <true/> | <false/>
4585 </dict>
4586 </dict>
4587 ```
4588 #### policies.json
4589 ```
4590 {
4591 "policies": {
4592 "UserMessaging": {
4593 "WhatsNew": true | false,
4594 "ExtensionRecommendations": true | false,
4595 "FeatureRecommendations": true | false,
4596 "UrlbarInterventions": true | false
4597 }
4598 }
4599 }
4600 ```
4601 ### WebsiteFilter
4602 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4603
4604 **Compatibility:** Firefox 60, Firefox ESR 60\
4605 **CCK2 Equivalent:** N/A\
4606 **Preferences Affected:** N/A
4607
4608 #### Windows (GPO)
4609 ```
4610 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4611 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4612 ```
4613 #### Windows (Intune)
4614 OMA-URI:
4615 ```
4616 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4617 ```
4618 Value (string):
4619 ```
4620 <enabled/>
4621 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4622 ```
4623 OMA-URI:
4624 ```
4625 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4626 ```
4627 Value (string):
4628 ```
4629 <enabled/>
4630 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4631 ```
4632 #### macOS
4633 ```
4634 <dict>
4635 <key>WebsiteFilter</key>
4636 <dict>
4637 <key>Block</key>
4638 <array>
4639 <string><all_urls></string>
4640 </array>
4641 <key>Exceptions</key>
4642 <array>
4643 <string>http://example.org/*</string>
4644 </array>
4645 </dict>
4646
4647 </dict>
4648 ```
4649 #### policies.json
4650 ```
4651 {
4652 "policies": {
4653 "WebsiteFilter": {
4654 "Block": ["<all_urls>"],
4655 "Exceptions": ["http://example.org/*"]
4656 }
4657 }
4658 }
4659 ```

patrick-canterino.de