]> git.p6c8.net - policy-templates.git/blob - docs/index.md
update compatibility version to 127
[policy-templates.git] / docs / index.md
1 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
4
5 ```
6 {
7 "policies": {
8 "Authentication": {
9 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
10 }
11 "Authentication_Comment": "These domains are required for us"
12 }
13 }
14 ```
15
16 | Policy Name | Description
17 | --- | --- |
18 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
19 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
20 | **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs.
21 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
22 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
23 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
24 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
25 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
26 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
27 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
28 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
29 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
30 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
31 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
32 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
33 | **[`Certificates`](#certificates)** |
34 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
35 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
36 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
37 | **[`ContentAnalysis`](#contentanalysis)** | Configure Firefox to use an agent for Data Loss Prevention (DLP) that is compatible with the [Google Chrome Content Analysis Connector Agent SDK](https://github.com/chromium/content_analysis_sdk).
38 | **[`Cookies`](#cookies)** | Configure cookie preferences.
39 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
40 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
41 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
42 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
43 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
44 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
45 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
46 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
47 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
48 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
49 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
50 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
51 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
52 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
53 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
54 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
55 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
56 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
57 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
58 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
59 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
60 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
61 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
62 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
63 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
64 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
65 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
66 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
67 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
68 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
69 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
70 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
71 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
72 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
73 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
74 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
75 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
76 | **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest.
77 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
78 | **[`Handlers`](#handlers)** | Configure default application handlers.
79 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
80 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
81 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
82 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
83 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
84 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
85 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
86 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
87 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
88 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
89 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
90 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
91 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
92 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
93 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
94 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
95 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
96 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
97 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
98 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
99 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
100 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
101 | **[`Preferences`](#preferences)** | Set and lock preferences.
102 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
103 | **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing.
104 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
105 | **[`Proxy`](#proxy)** | Configure proxy settings.
106 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
107 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
108 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
109 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
110 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
111 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
112 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
113 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
114 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
115 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
116 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
117 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
118 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
119 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
120 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
121 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
122 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
123 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
124 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
125 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
126
127 ### 3rdparty
128
129 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
130
131 For GPO and Intune, the extension developer should provide an ADMX file.
132
133 **Compatibility:** Firefox 68\
134 **CCK2 Equivalent:** N/A\
135 **Preferences Affected:** N/A
136
137 #### macOS
138 ```
139 <dict>
140 <key>3rdparty</key>
141 <dict>
142 <key>Extensions</key>
143 <dict>
144 <key>uBlock0@raymondhill.net</key>
145 <dict>
146 <key>adminSettings</key>
147 <dict>
148 <key>selectedFilterLists</key>
149 <array>
150 <string>ublock-privacy</string>
151 <string>ublock-badware</string>
152 <string>ublock-filters</string>
153 <string>user-filters</string>
154 </array>
155 </dict>
156 </dict>
157 </dict>
158 </dict>
159 </dict>
160 ```
161 #### policies.json
162 ```
163 {
164 "policies": {
165 "3rdparty": {
166 "Extensions": {
167 "uBlock0@raymondhill.net": {
168 "adminSettings": {
169 "selectedFilterLists": [
170 "ublock-privacy",
171 "ublock-badware",
172 "ublock-filters",
173 "user-filters"
174 ]
175 }
176 }
177 }
178 }
179 }
180 }
181 ```
182
183 ### AllowedDomainsForApps
184
185 Define domains allowed to access Google Workspace.
186
187 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
188
189 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
190
191 **Compatibility:** Firefox 89, Firefox ESR 78.11\
192 **CCK2 Equivalent:** N/A\
193 **Preferences Affected:** N/A
194
195 #### Windows (GPO)
196 ```
197 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
198 ```
199 #### Windows (Intune)
200 OMA-URI:
201 ```
202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
203 ```
204 Value (string):
205 ```
206 <enabled/>
207 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
208 ```
209 #### macOS
210 ```
211 <dict>
212 <key>AllowedDomainsForApps</key>
213 <string>managedfirefox.com,example.com</string>
214 </dict>
215 ```
216 #### policies.json
217 ```
218 {
219 "policies": {
220 "AllowedDomainsForApps": "managedfirefox.com,example.com"
221 }
222 }
223 ```
224 ### AllowFileSelectionDialogs
225
226 Enable or disable file selection dialogs.
227
228 **Compatibility:** Firefox 124\
229 **CCK2 Equivalent:** N/A\
230 **Preferences Affected:** `widget.disable_file_pickers`
231
232 #### Windows (GPO)
233 ```
234 Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0
235 ```
236 #### Windows (Intune)
237 OMA-URI:
238 ```
239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate
240 ```
241 Value (string):
242 ```
243 <enabled/> or <disabled/>
244 ```
245 #### macOS
246 ```
247 <dict>
248 <key>AllowFileSelectionDialogs</key>
249 <true/> | <false/>
250 </dict>
251 ```
252 #### policies.json
253 ```
254 {
255 "policies": {
256 "AllowFileSelectionDialogs": true | false
257 }
258 }
259 ```
260 ### AppAutoUpdate
261
262 Enable or disable **automatic** application update.
263
264 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
265
266 If set to false, application updates are downloaded but the user can choose when to install the update.
267
268 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
269
270 **Compatibility:** Firefox 75, Firefox ESR 68.7\
271 **CCK2 Equivalent:** N/A\
272 **Preferences Affected:** `app.update.auto`
273
274 #### Windows (GPO)
275 ```
276 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
277 ```
278 #### Windows (Intune)
279 OMA-URI:
280 ```
281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
282 ```
283 Value (string):
284 ```
285 <enabled/> or <disabled/>
286 ```
287 #### macOS
288 ```
289 <dict>
290 <key>AppAutoUpdate</key>
291 <true/> | <false/>
292 </dict>
293 ```
294 #### policies.json
295 ```
296 {
297 "policies": {
298 "AppAutoUpdate": true | false
299 }
300 }
301 ```
302 ### AppUpdatePin
303
304 Prevent Firefox from being updated beyond the specified version.
305
306 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
307
308 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
309
310 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
311
312 **Compatibility:** Firefox 102,\
313 **CCK2 Equivalent:** N/A\
314 **Preferences Affected:** N/A
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
319 ```
320 #### Windows (Intune)
321 OMA-URI:
322 ```
323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
324 ```
325 Value (string):
326 ```
327 <enabled/>
328 <data id="AppUpdatePin" value="106."/>
329 ```
330 #### macOS
331 ```
332 <dict>
333 <key>AppUpdatePin</key>
334 <string>106.</string>
335 </dict>
336 ```
337 #### policies.json
338 ```
339 {
340 "policies": {
341 "AppUpdatePin": "106."
342 }
343 }
344 ```
345 ### AppUpdateURL
346
347 Change the URL for application update if you are providing Firefox updates from a custom update server.
348
349 **Compatibility:** Firefox 62, Firefox ESR 60.2\
350 **CCK2 Equivalent:** N/A\
351 **Preferences Affected:** `app.update.url`
352
353 #### Windows (GPO)
354 ```
355 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
356 ```
357 #### Windows (Intune)
358 OMA-URI:
359 ```
360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
361 ```
362 Value (string):
363 ```
364 <enabled/>
365 <data id="AppUpdateURL" value="https://yoursite.com"/>
366 ```
367 #### macOS
368 ```
369 <dict>
370 <key>AppUpdateURL</key>
371 <string>https://yoursite.com</string>
372 </dict>
373 ```
374 #### policies.json
375 ```
376 {
377 "policies": {
378 "AppUpdateURL": "https://yoursite.com"
379 }
380 }
381 ```
382 ### Authentication
383
384 Configure sites that support integrated authentication.
385
386 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
387
388 `PrivateBrowsing` enables integrated authentication in private browsing.
389
390 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
391 **CCK2 Equivalent:** N/A\
392 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
393
394 #### Windows (GPO)
395 ```
396 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
397 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
398 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
399 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
400 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
401 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
402 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
403 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
404 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
405 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
406 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
407 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
408 ```
409 #### Windows (Intune)
410 OMA-URI:
411 ```
412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
413 ```
414 Value (string):
415 ```
416 <enabled/>
417 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
418 ```
419 OMA-URI:
420 ```
421 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
422 ```
423 Value (string):
424 ```
425 <enabled/>
426 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
427 ```
428 OMA-URI:
429 ```
430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
431 ```
432 Value (string):
433 ```
434 <enabled/>
435 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
436 ```
437 OMA-URI:
438 ```
439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
440 ```
441 Value (string):
442 ```
443 <enabled/>
444 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
445 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
446 ```
447 OMA-URI:
448 ```
449 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
450 ```
451 Value (string):
452 ```
453 <enabled/> or <disabled/>
454 ```
455 OMA-URI:
456 ```
457 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
458 ```
459 Value (string):
460 ```
461 <enabled/> or <disabled/>
462 ```
463 #### macOS
464 ```
465 <dict>
466 <key>Authentication</key>
467 <dict>
468 <key>SPNEGO</key>
469 <array>
470 <string>mydomain.com</string>
471 <string>https://myotherdomain.com</string>
472 </array>
473 <key>Delegated</key>
474 <array>
475 <string>mydomain.com</string>
476 <string>https://myotherdomain.com</string>
477 </array>
478 <key>NTLM</key>
479 <array>
480 <string>mydomain.com</string>
481 <string>https://myotherdomain.com</string>
482 </array>
483 <key>AllowNonFQDN</key>
484 <dict>
485 <key>SPNEGO</key>
486 <true/> | <false/>
487 <key>NTLM</key>
488 <true/> | <false/>
489 </dict>
490 <key>AllowProxies</key>
491 <dict>
492 <key>SPNEGO</key>
493 <true/> | <false/>
494 <key>NTLM</key>
495 <true/> | <false/>
496 </dict>
497 <key>Locked</key>
498 <true/> | <false/>
499 <key>PrivateBrowsing</key>
500 <true/> | <false/>
501 </dict>
502 </dict>
503 ```
504 #### policies.json
505 ```
506 {
507 "policies": {
508 "Authentication": {
509 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
510 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
511 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
512 "AllowNonFQDN": {
513 "SPNEGO": true | false,
514 "NTLM": true | false
515 },
516 "AllowProxies": {
517 "SPNEGO": true | false,
518 "NTLM": true | false
519 },
520 "Locked": true | false,
521 "PrivateBrowsing": true | false
522 }
523 }
524 }
525 ```
526 ### AutoLaunchProtocolsFromOrigins
527 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
528
529 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
530
531 The schema is:
532 ```
533 {
534 "items": {
535 "properties": {
536 "allowed_origins": {
537 "items": {
538 "type": "string"
539 },
540 "type": "array"
541 },
542 "protocol": {
543 "type": "string"
544 }
545 },
546 "required": [
547 "protocol",
548 "allowed_origins"
549 ],
550 "type": "object"
551 },
552 "type": "array"
553 }
554 ```
555 **Compatibility:** Firefox 90, Firefox ESR 78.12\
556 **CCK2 Equivalent:** N/A\
557 **Preferences Affected:** N/A
558
559 #### Windows (GPO)
560 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
561 ```
562 [
563 {
564 "protocol": "zoommtg",
565 "allowed_origins": [
566 "https://somesite.zoom.us"
567 ]
568 }
569 ]
570 ```
571 #### Windows (Intune)
572 OMA-URI:
573 ```
574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
575 ```
576 Value (string):
577 ```
578 <enabled/>
579 <data id="JSON" value='
580 [
581 {
582 "protocol": "zoommtg",
583 "allowed_origins": [
584 "https://somesite.zoom.us"
585 ]
586 }
587 ]'/>
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>AutoLaunchProtocolsFromOrigins</key>
593 <array>
594 <dict>
595 <key>protocol</key>
596 <string>zoommtg</string>
597 <key>allowed_origins</key>
598 <array>
599 <string>https://somesite.zoom.us</string>
600 </array>
601 </dict>
602 </array>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "AutoLaunchProtocolsFromOrigins": [{
610 "protocol": "zoommtg",
611 "allowed_origins": [
612 "https://somesite.zoom.us"
613 ]
614 }]
615 }
616 }
617 ```
618 ### BackgroundAppUpdate
619
620 Enable or disable **automatic** application update **in the background**, when the application is not running.
621
622 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
623
624 If set to false, the application will not try to install updates when the application is not running.
625
626 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
627
628 If you are having trouble getting the background task to run, verify your configuration with the ["Requirements to run" section in this support document](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows).
629
630 **Compatibility:** Firefox 90 (Windows only)\
631 **CCK2 Equivalent:** N/A\
632 **Preferences Affected:** `app.update.background.enabled`
633
634 #### Windows (GPO)
635 ```
636 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
637 ```
638 #### Windows (Intune)
639 OMA-URI:
640 ```
641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
642 ```
643 Value (string):
644 ```
645 <enabled/> or <disabled/>
646 ```
647 #### macOS
648 ```
649 <dict>
650 <key>BackgroundAppUpdate</key>
651 <true/> | <false/>
652 </dict>
653 ```
654 #### policies.json
655 ```
656 {
657 "policies": {
658 "BackgroundAppUpdate": true | false
659 }
660 }
661 ```
662 ### BlockAboutAddons
663
664 Block access to the Add-ons Manager (about:addons).
665
666 **Compatibility:** Firefox 60, Firefox ESR 60\
667 **CCK2 Equivalent:** `disableAddonsManager`\
668 **Preferences Affected:** N/A
669
670 #### Windows (GPO)
671 ```
672 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
673 ```
674 #### Windows (Intune)
675 OMA-URI:
676 ```
677 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
678 ```
679 Value (string):
680 ```
681 <enabled/> or <disabled/>
682 ```
683 #### macOS
684 ```
685 <dict>
686 <key>BlockAboutAddons</key>
687 <true/> | <false/>
688 </dict>
689 ```
690 #### policies.json
691 ```
692 {
693 "policies": {
694 "BlockAboutAddons": true | false
695 }
696 }
697 ```
698 ### BlockAboutConfig
699
700 Block access to about:config.
701
702 **Compatibility:** Firefox 60, Firefox ESR 60\
703 **CCK2 Equivalent:** `disableAboutConfig`\
704 **Preferences Affected:** N/A
705
706 #### Windows (GPO)
707 ```
708 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
709 ```
710 #### Windows (Intune)
711 OMA-URI:
712 ```
713 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
714 ```
715 Value (string):
716 ```
717 <enabled/> or <disabled/>
718 ```
719 #### macOS
720 ```
721 <dict>
722 <key>BlockAboutConfig</key>
723 <true/> | <false/>
724 </dict>
725 ```
726 #### policies.json
727 ```
728 {
729 "policies": {
730 "BlockAboutConfig": true | false
731 }
732 }
733 ```
734 ### BlockAboutProfiles
735
736 Block access to About Profiles (about:profiles).
737
738 **Compatibility:** Firefox 60, Firefox ESR 60\
739 **CCK2 Equivalent:** `disableAboutProfiles`\
740 **Preferences Affected:** N/A
741
742 #### Windows (GPO)
743 ```
744 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
745 ```
746 #### Windows (Intune)
747 OMA-URI:
748 ```
749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
750 ```
751 Value (string):
752 ```
753 <enabled/> or <disabled/>
754 ```
755 #### macOS
756 ```
757 <dict>
758 <key>BlockAboutProfiles</key>
759 <true/> | <false/>
760 </dict>
761 ```
762 #### policies.json
763 ```
764 {
765 "policies": {
766 "BlockAboutProfiles": true | false
767 }
768 }
769 ```
770 ### BlockAboutSupport
771
772 Block access to Troubleshooting Information (about:support).
773
774 **Compatibility:** Firefox 60, Firefox ESR 60\
775 **CCK2 Equivalent:** `disableAboutSupport`\
776 **Preferences Affected:** N/A
777
778 #### Windows (GPO)
779 ```
780 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
781 ```
782 #### Windows (Intune)
783 OMA-URI:
784 ```
785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
786 ```
787 Value (string):
788 ```
789 <enabled/> or <disabled/>
790 ```
791 #### macOS
792 ```
793 <dict>
794 <key>BlockAboutSupport</key>
795 <true/> | <false/>
796 </dict>
797 ```
798 #### policies.json
799 ```
800 {
801 "policies": {
802 "BlockAboutSupport": true | false
803 }
804 }
805 ```
806 ### Bookmarks
807
808 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
809
810 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
811
812 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
813
814 **Compatibility:** Firefox 60, Firefox ESR 60\
815 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
816 **Preferences Affected:** N/A
817
818 #### Windows (GPO)
819 ```
820 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
821 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
822 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
823 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
824 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
825
826 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
827 ```
828 []
829 ```
830
831 ```
832 #### Windows (Intune)
833 OMA-URI:
834 ```
835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
836 ```
837 Value (string):
838 ```
839 <enabled/>
840 <data id="BookmarkTitle" value="Example"/>
841 <data id="BookmarkURL" value="https://example.com"/>
842 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
843 <data id="BookmarkPlacement" value="toolbar | menu"/>
844 <data id="BookmarkFolder" value="FolderName"/>
845 ```
846 OMA-URI:
847 ```
848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
849 ```
850 Value (string):
851 ```
852 <enabled/>
853 <data id="JSON" value='[]'/>
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>Bookmarks</key>
859 <array>
860 <dict>
861 <key>Title</key>
862 <string>Example</string>
863 <key>URL</key>
864 <string>https://example.com</string>
865 <key>Favicon</key>
866 <string>https://example.com/favicon.ico</string>
867 <key>Placement</key>
868 <string>toolbar | menu</string>
869 <key>Folder</key>
870 <string>FolderName</string>
871 </dict>
872 </array>
873 </dict>
874 ```
875 #### policies.json
876 ```
877 {
878 "policies": {
879 "Bookmarks": [
880 {
881 "Title": "Example",
882 "URL": "https://example.com",
883 "Favicon": "https://example.com/favicon.ico",
884 "Placement": "toolbar" | "menu",
885 "Folder": "FolderName"
886 }
887 ]
888 }
889 }
890 ```
891 ### CaptivePortal
892 Enable or disable the detection of captive portals.
893
894 **Compatibility:** Firefox 67, Firefox ESR 60.7\
895 **CCK2 Equivalent:** N/A\
896 **Preferences Affected:** `network.captive-portal-service.enabled`
897
898 #### Windows (GPO)
899 ```
900 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
901 ```
902 #### Windows (Intune)
903 OMA-URI:
904 ```
905 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
906 ```
907 Value (string):
908 ```
909 <enabled/> or <disabled/>
910 ```
911 #### macOS
912 ```
913 <dict>
914 <key>CaptivePortal</key>
915 <true/> | <false/>
916 </dict>
917 ```
918 #### policies.json
919 ```
920 {
921 "policies": {
922 "CaptivePortal": true | false
923 }
924 }
925 ```
926 ### Certificates
927
928 ### Certificates | ImportEnterpriseRoots
929
930 Trust certificates that have been added to the operating system certificate store by a user or administrator.
931
932 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
933
934 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
935
936 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
937 **CCK2 Equivalent:** N/A\
938 **Preferences Affected:** `security.enterprise_roots.enabled`
939
940 #### Windows (GPO)
941 ```
942 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
943 ```
944 #### Windows (Intune)
945 OMA-URI:
946 ```
947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
948 ```
949 Value (string):
950 ```
951 <enabled/> or <disabled/>
952 ```
953 #### macOS
954 ```
955 <dict>
956 <key>Certificates</key>
957 <dict>
958 <key>ImportEnterpriseRoots</key>
959 <true/> | <false/>
960 </dict>
961 </dict>
962 ```
963 #### policies.json
964 ```
965 {
966 "policies": {
967 "Certificates": {
968 "ImportEnterpriseRoots": true | false
969 }
970 }
971 }
972 ```
973 ### Certificates | Install
974
975 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
976
977 - Windows
978 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
979 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
980 - macOS
981 - /Library/Application Support/Mozilla/Certificates
982 - ~/Library/Application Support/Mozilla/Certificates
983 - Linux
984 - /usr/lib/mozilla/certificates
985 - /usr/lib64/mozilla/certificates
986 - ~/.mozilla/certificates
987
988 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
989
990 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
991
992 Certificates are installed using the trust string `CT,CT,`.
993
994 Binary (DER) and ASCII (PEM) certificates are both supported.
995
996 **Compatibility:** Firefox 64, Firefox ESR 64\
997 **CCK2 Equivalent:** `certs.ca`\
998 **Preferences Affected:** N/A
999
1000 #### Windows (GPO)
1001 ```
1002 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
1003 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
1004 ```
1005 #### Windows (Intune)
1006 OMA-URI:
1007 ```
1008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
1009 ```
1010 Value (string):
1011 ```
1012 <enabled/>
1013 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
1014 ```
1015 #### macOS
1016 ```
1017 <dict>
1018 <key>Certificates</key>
1019 <dict>
1020 <key>Install</key>
1021 <array>
1022 <string>cert1.der</string>
1023 <string>/Users/username/cert2.pem</string>
1024 </array>
1025 </dict>
1026 </dict>
1027 ```
1028 #### policies.json
1029 ```
1030 {
1031 "policies": {
1032 "Certificates": {
1033 "Install": ["cert1.der", "/home/username/cert2.pem"]
1034 }
1035 }
1036 }
1037 ```
1038 ### Containers
1039 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1040
1041 Currently you can set the initial set of containers.
1042
1043 For each container, you can specify the name, icon, and color.
1044
1045 | Name | Description |
1046 | --- | --- |
1047 | `name`| Name of container
1048 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1049 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1050
1051 **Compatibility:** Firefox 113\
1052 **CCK2 Equivalent:** N/A\
1053 **Preferences Affected:** N/A
1054
1055 #### Windows (GPO)
1056 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1057 ```
1058 {
1059 "Default": [
1060 {
1061 "name": "My container",
1062 "icon": "pet",
1063 "color": "turquoise"
1064 }
1065 ]
1066 }
1067 ```
1068 #### Windows (Intune)
1069 OMA-URI:
1070 ```
1071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1072 ```
1073 Value (string):
1074 ```
1075 <enabled/>
1076 <data id="JSON" value='
1077 {
1078 "Default": [
1079 {
1080 "name": "My container",
1081 "icon": "pet",
1082 "color": "turquoise"
1083 }
1084 ]
1085 }
1086 '/>
1087 ```
1088 #### macOS
1089 ```
1090 <dict>
1091 <key>Default</key>
1092 <dict>
1093 <key>Containers</key>
1094 <array>
1095 <dict>
1096 <key>name</key>
1097 <string>My container</string>
1098 <key>icon</key>
1099 <string>pet</string>
1100 <key>color</key>
1101 <string>turquoise</string>
1102 </dict>
1103 </array>
1104 </dict>
1105 </dict>
1106 ```
1107 #### policies.json
1108 ```
1109 {
1110 "policies": {
1111 "Containers": {
1112 "Default": [
1113 {
1114 "name": "My container",
1115 "icon": "pet",
1116 "color": "turquoise"
1117 }
1118 ]
1119 }
1120 }
1121 }
1122 ```
1123 ### ContentAnalysis
1124 Configure Firefox to use an agent for Data Loss Prevention (DLP) that is compatible with the [Google Chrome Content Analysis Connector Agent SDK](https://github.com/chromium/content_analysis_sdk).
1125
1126 `AgentName` is the name of the DLP agent. This is used in dialogs and notifications about DLP operations. The default is "A DLP Agent".
1127
1128 `AgentTimeout` is the timeout in number of seconds after a DLP request is sent to the agent. After this timeout, the request will be denied unless `DefaultAllow` is set to true. The default is 30.
1129
1130 `AllowUrlRegexList` is a space-separated list of regular expressions that indicates URLs for which DLP operations will always be allowed without consulting the agent. The default is the empty string.
1131
1132 `BypassForSameTabOperations` indicates whether Firefox will automatically allow DLP requests whose data comes from the same tab and frame - for example, if data is copied to the clipboard and then pasted on the same page. The default is false.
1133
1134 `ClientSignature` indicates the required signature of the DLP agent connected to the pipe. If this is a non-empty string and the DLP agent does not have a signature matching this value, Firefox will not connect to the pipe. The default is the empty string.
1135
1136 `DefaultAllow` indicates whether DLP requests should be allowed if there is a problem connecting to the DLP agent. The default is false.
1137
1138 `DenyUrlRegexList` is a space-separated list of regular expressions that indicates URLs for which DLP operations will always be denied without consulting the agent. The default is the empty string.
1139
1140 `Enabled` indicates whether Firefox should use DLP. Note that if this value is true and no DLP agent is running, all DLP requests will be denied unless `DefaultAllow` is set to true.
1141
1142 `IsPerUser` indicates whether the pipe the DLP agent has created is per-user or per-system. The default is true, meaning per-user.
1143
1144 `PipePathName` is the name of the pipe the DLP agent has created and Firefox will connect to. The default is "path_user".
1145
1146 `ShowBlockedResult` indicates whether Firefox should show a notification when a DLP request is denied. The default is true.
1147
1148 **Compatibility:** Firefox 127\
1149 **CCK2 Equivalent:** N/A\
1150 **Preferences Affected:** `browser.contentanalysis.agent_name`, `browser.contentanalysis.agent_timeout`, `browser.contentanalysis.allow_url_regex_list`, `browser.contentanalysis.bypass_for_same_tab_operations`, `browser.contentanalysis.client_signature`, `browser.contentanalysis.default_allow`, `browser.contentanalysis.deny_url_regex_list`, `browser.contentanalysis.enabled`, `browser.contentanalysis.is_per_user`, `browser.contentanalysis.pipe_path_name`, `browser.contentanalysis.show_blocked_result`
1151
1152 #### Windows (GPO)
1153 ```
1154 Software\Policies\Mozilla\Firefox\ContentAnalysis\AgentName = "My DLP Product"
1155 Software\Policies\Mozilla\Firefox\ContentAnalysis\AgentTimeout = 60
1156 Software\Policies\Mozilla\Firefox\ContentAnalysis\AllowUrlRegexList = "https://example\.com/.* https://subdomain\.example\.com/.*"
1157 Software\Policies\Mozilla\Firefox\ContentAnalysis\BypassForSameTabOperations = 0x1 | 0x0
1158 Software\Policies\Mozilla\Firefox\ContentAnalysis\ClientSignature = "My DLP Company"
1159 Software\Policies\Mozilla\Firefox\ContentAnalysis\DefaultAllow = 0x1 | 0x0
1160 Software\Policies\Mozilla\Firefox\ContentAnalysis\DenyUrlRegexList = "https://example\.com/.* https://subdomain\.example\.com/.*"
1161 Software\Policies\Mozilla\Firefox\ContentAnalysis\Enabled = 0x1 | 0x0
1162 Software\Policies\Mozilla\Firefox\ContentAnalysis\IsPerUser = 0x1 | 0x0
1163 Software\Policies\Mozilla\Firefox\ContentAnalysis\PipePathName = "pipe_custom_name"
1164 Software\Policies\Mozilla\Firefox\ContentAnalysis\ShowBlockedResult = 0x1 | 0x0
1165 ```
1166
1167 #### Windows (Intune)
1168 OMA-URI:
1169 ```
1170 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AgentName
1171 ```
1172 Value (string):
1173 ```
1174 <enabled/>
1175 <data id="ContentAnalysis_AgentName" value="My DLP Product"/>
1176 ```
1177 OMA-URI:
1178 ```
1179 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AgentTimeout
1180 ```
1181 Value (string):
1182 ```
1183 <enabled/>
1184 <data id="ContentAnalysis_AgentTimeout" value="60"/>
1185 ```
1186 OMA-URI:
1187 ```
1188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AllowUrlRegexList
1189 ```
1190 Value (string):
1191 ```
1192 <enabled/>
1193 <data id="ContentAnalysis_AllowUrlRegexList" value="https://example\.com/.* https://subdomain\.example\.com/.*"/>
1194 ```
1195 OMA-URI:
1196 ```
1197 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_BypassForSameTabOperations
1198 ```
1199 Value (string):
1200 ```
1201 <enabled/> or <disabled/>
1202 ```
1203 OMA-URI:
1204 ```
1205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_ClientSignature
1206 ```
1207 Value (string):
1208 ```
1209 <enabled/>
1210 <data id="ContentAnalysis_ClientSignature" value="My DLP Company"/>
1211 ```
1212 OMA-URI:
1213 ```
1214 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_DefaultAllow
1215 ```
1216 Value (string):
1217 ```
1218 <enabled/> or <disabled/>
1219 ```
1220 OMA-URI:
1221 ```
1222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_DenyUrlRegexList
1223 ```
1224 Value (string):
1225 ```
1226 <enabled/>
1227 <data id="ContentAnalysis_DenyUrlRegexList" value="https://example\.com/.* https://subdomain\.example\.com/.*"/>
1228 ```
1229 OMA-URI:
1230 ```
1231 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_Enabled
1232 ```
1233 Value (string):
1234 ```
1235 <enabled/> or <disabled/>
1236 ```
1237 OMA-URI:
1238 ```
1239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_IsPerUser
1240 ```
1241 Value (string):
1242 ```
1243 <enabled/> or <disabled/>
1244 ```
1245 OMA-URI:
1246 ```
1247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_PipePathName
1248 ```
1249 Value (string):
1250 ```
1251 <enabled/>
1252 <data id="ContentAnalysis_PipePathName" value="pipe_custom_name"/>
1253 ```
1254 OMA-URI:
1255 ```
1256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_ShowBlockedResult
1257 ```
1258 Value (string):
1259 ```
1260 <enabled/> or <disabled/>
1261 ```
1262
1263 #### policies.json
1264 ```
1265 {
1266 "policies": {
1267 "ContentAnalysis": {
1268 "AgentName": "My DLP Product",
1269 "AgentTimeout": 60,
1270 "AllowUrlRegexList": "https://example\.com/.* https://subdomain\.example\.com/.*",
1271 "BypassForSameTabOperations": true | false,
1272 "ClientSignature": "My DLP Company",
1273 "DefaultAllow": true | false,
1274 "DenyUrlRegexList": "https://example\.com/.* https://subdomain\.example\.com/.*",
1275 "Enabled": true | false,
1276 "IsPerUser": true | false,
1277 "PipePathName": "pipe_custom_name",
1278 "ShowBlockedResult": true | false,
1279 }
1280 }
1281 }
1282 ```
1283
1284 ### Cookies
1285 Configure cookie preferences.
1286
1287 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1288
1289 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1290
1291 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1292
1293 `Behavior` sets the default behavior for cookies based on the values below.
1294
1295 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1296
1297 | Value | Description
1298 | --- | --- |
1299 | accept | Accept all cookies
1300 | reject-foreign | Reject third party cookies
1301 | reject | Reject all cookies
1302 | limit-foreign | Reject third party cookies for sites you haven't visited
1303 | reject-tracker | Reject cookies for known trackers (default)
1304 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1305
1306 `Locked` prevents the user from changing cookie preferences.
1307
1308 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1309 **CCK2 Equivalent:** N/A\
1310 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1311
1312 #### Windows (GPO)
1313 ```
1314 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1315 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1316 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1317 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
1318 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
1319 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
1320 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
1321 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1322 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1323 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1324 ```
1325 #### Windows (Intune)
1326 OMA-URI:
1327 ```
1328 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1329 ```
1330 Value (string):
1331 ```
1332 <enabled/>
1333 <data id="Permissions" value="1&#xF000;https://example.com"/>
1334 ```
1335 OMA-URI:
1336 ```
1337 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1338 ```
1339 Value (string):
1340 ```
1341 <enabled/>
1342 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1343 ```
1344 OMA-URI:
1345 ```
1346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1347 ```
1348 Value (string):
1349 ```
1350 <enabled/>
1351 <data id="Permissions" value="1&#xF000;https://example.org"/>
1352 ```
1353 OMA-URI:
1354 ```
1355 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1356 ```
1357 Value (string):
1358 ```
1359 <enabled/> or <disabled/>
1360 ```
1361 OMA-URI:
1362 ```
1363 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1364 ```
1365 Value (string):
1366 ```
1367 <enabled/>
1368 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1369 ```
1370 OMA-URI:
1371 ```
1372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1373 ```
1374 Value (string):
1375 ```
1376 <enabled/> or <disabled/>
1377 ```
1378 OMA-URI:
1379 ```
1380 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1381 ```
1382 Value (string):
1383 ```
1384 <enabled/> or <disabled/>
1385 ```
1386 OMA-URI:
1387 ```
1388 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1389 ```
1390 Value (string):
1391 ```
1392 <enabled/> or <disabled/>
1393 ```
1394 OMA-URI:
1395 ```
1396 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1397 ```
1398 Value (string):
1399 ```
1400 <enabled/>
1401 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1402 ```
1403 OMA-URI:
1404 ```
1405 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1406 ```
1407 Value (string):
1408 ```
1409 <enabled/>
1410 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1411 ```
1412 #### macOS
1413 ```
1414 <dict>
1415 <key>Cookies</key>
1416 <dict>
1417 <key>Allow</key>
1418 <array>
1419 <string>http://example.com</string>
1420 </array>
1421 <key>AllowSession</key>
1422 <array>
1423 <string>http://example.edu</string>
1424 </array>
1425 <key>Block</key>
1426 <array>
1427 <string>http://example.org</string>
1428 </array>
1429 <key>Default</key>
1430 <true/> | <false/>
1431 <key>AcceptThirdParty</key>
1432 <string>always | never | from-visited</string>
1433 <key>ExpireAtSessionEnd</key>
1434 <true/> | <false/>
1435 <key>RejectTracker</key>
1436 <true/> | <false/>
1437 <key>Locked</key>
1438 <true/> | <false/>
1439 <key>Behavior</key>
1440 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1441 <key>BehaviorPrivateBrowsing</key>
1442 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1443 </dict>
1444 </dict>
1445 ```
1446 #### policies.json
1447 ```
1448 {
1449 "policies": {
1450 "Cookies": {
1451 "Allow": ["http://example.org/"],
1452 "AllowSession": ["http://example.edu/"],
1453 "Block": ["http://example.edu/"],
1454 "Default": true | false,
1455 "AcceptThirdParty": "always" | "never" | "from-visited",
1456 "ExpireAtSessionEnd": true | false,
1457 "RejectTracker": true | false,
1458 "Locked": true | false,
1459 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1460 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1461 }
1462 }
1463 }
1464 ```
1465 ### DefaultDownloadDirectory
1466 Set the default download directory.
1467
1468 You can use ${home} for the native home directory.
1469
1470 **Compatibility:** Firefox 68, Firefox ESR 68\
1471 **CCK2 Equivalent:** N/A\
1472 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1473
1474 #### Windows (GPO)
1475 ```
1476 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1477 ```
1478 #### Windows (Intune)
1479 OMA-URI:
1480 ```
1481 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1482 ```
1483 Value (string):
1484 ```
1485 <enabled/>
1486 <data id="Preferences_String" value="${home}\Downloads"/>
1487 ```
1488 #### macOS
1489 ```
1490 <dict>
1491 <key>DefaultDownloadDirectory</key>
1492 <string>${home}/Downloads</string>
1493 </dict>
1494 ```
1495 #### policies.json (macOS and Linux)
1496 ```
1497 {
1498 "policies": {
1499 "DefaultDownloadDirectory": "${home}/Downloads"
1500 }
1501 }
1502 ```
1503 #### policies.json (Windows)
1504 ```
1505 {
1506 "policies": {
1507 "DefaultDownloadDirectory": "${home}\\Downloads"
1508 }
1509 }
1510 ```
1511 ### DisableAppUpdate
1512 Turn off application updates within Firefox.
1513
1514 **Compatibility:** Firefox 60, Firefox ESR 60\
1515 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1516 **Preferences Affected:** N/A
1517
1518 #### Windows (GPO)
1519 ```
1520 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1521 ```
1522 #### Windows (Intune)
1523 OMA-URI:
1524 ```
1525 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1526 ```
1527 Value (string):
1528 ```
1529 <enabled/> or <disabled/>
1530 ```
1531 #### macOS
1532 ```
1533 <dict>
1534 <key>DisableAppUpdate</key>
1535 <true/> | <false/>
1536 </dict>
1537 ```
1538 #### policies.json
1539 ```
1540 {
1541 "policies": {
1542 "DisableAppUpdate": true | false
1543 }
1544 }
1545 ```
1546 ### DisableBuiltinPDFViewer
1547 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1548
1549 **Compatibility:** Firefox 60, Firefox ESR 60\
1550 **CCK2 Equivalent:** `disablePDFjs`\
1551 **Preferences Affected:** `pdfjs.disabled`
1552
1553 #### Windows (GPO)
1554 ```
1555 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1556 ```
1557 #### Windows (Intune)
1558 OMA-URI:
1559 ```
1560 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1561 ```
1562 Value (string):
1563 ```
1564 <enabled/> or <disabled/>
1565 ```
1566 #### macOS
1567 ```
1568 <dict>
1569 <key>DisableBuiltinPDFViewer</key>
1570 <true/> | <false/>
1571 </dict>
1572 ```
1573 #### policies.json
1574 ```
1575 {
1576 "policies": {
1577 "DisableBuiltinPDFViewer": true | false
1578 }
1579 }
1580 ```
1581 ### DisabledCiphers
1582 Disable specific cryptographic ciphers, listed below.
1583
1584 ```
1585 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1586 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1587 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1588 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1589 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1590 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1591 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1592 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1593 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1594 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1595 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1596 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1597 TLS_RSA_WITH_AES_128_GCM_SHA256
1598 TLS_RSA_WITH_AES_256_GCM_SHA384
1599 TLS_RSA_WITH_AES_128_CBC_SHA
1600 TLS_RSA_WITH_AES_256_CBC_SHA
1601 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1602 ```
1603
1604 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1605
1606 ---
1607 **Note:**
1608
1609 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1610
1611 ---
1612 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1613 **CCK2 Equivalent:** N/A\
1614 **Preferences Affected:** N/A
1615
1616 #### Windows (GPO)
1617 ```
1618 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1619 ```
1620 #### Windows (Intune)
1621 OMA-URI:
1622 ```
1623 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1624
1625 ```
1626 Value (string):
1627 ```
1628 <enabled/> or <disabled/>
1629 ```
1630 #### macOS
1631 ```
1632 <dict>
1633 <key>DisabledCiphers</key>
1634 <dict>
1635 <key>CIPHER_NAME</key>
1636 <true/> | <false/>
1637 </dict>
1638 </dict>
1639 ```
1640 #### policies.json
1641 ```
1642 {
1643 "policies": {
1644 "DisabledCiphers": {
1645 "CIPHER_NAME": true | false,
1646 }
1647 }
1648 }
1649 ```
1650 ### DisableDefaultBrowserAgent
1651 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1652
1653 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1654
1655 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1656 **CCK2 Equivalent:** N/A\
1657 **Preferences Affected:** N/A
1658
1659 #### Windows (GPO)
1660 ```
1661 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1662 ```
1663 #### Windows (Intune)
1664 OMA-URI:
1665 ```
1666 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1667 ```
1668 Value (string):
1669 ```
1670 <enabled/> or <disabled/>
1671 ```
1672 #### policies.json
1673 ```
1674 {
1675 "policies": {
1676 "DisableDefaultBrowserAgent": true | false
1677 }
1678 }
1679 ```
1680 ### DisableDeveloperTools
1681 Remove access to all developer tools.
1682
1683 **Compatibility:** Firefox 60, Firefox ESR 60\
1684 **CCK2 Equivalent:** `removeDeveloperTools`\
1685 **Preferences Affected:** `devtools.policy.disabled`
1686
1687 #### Windows (GPO)
1688 ```
1689 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1690 ```
1691 #### Windows (Intune)
1692 OMA-URI:
1693 ```
1694 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1695 ```
1696 Value (string):
1697 ```
1698 <enabled/> or <disabled/>
1699 ```
1700 #### macOS
1701 ```
1702 <dict>
1703 <key>DisableDeveloperTools</key>
1704 <true/> | <false/>
1705 </dict>
1706 ```
1707 #### policies.json
1708 ```
1709 {
1710 "policies": {
1711 "DisableDeveloperTools": true | false
1712 }
1713 }
1714 ```
1715 ### DisableFeedbackCommands
1716 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1717
1718 **Compatibility:** Firefox 60, Firefox ESR 60\
1719 **CCK2 Equivalent:** N/A\
1720 **Preferences Affected:** N/A
1721
1722 #### Windows (GPO)
1723 ```
1724 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1725 ```
1726 #### Windows (Intune)
1727 OMA-URI:
1728 ```
1729 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1730 ```
1731 Value (string):
1732 ```
1733 <enabled/> or <disabled/>
1734 ```
1735 #### macOS
1736 ```
1737 <dict>
1738 <key>DisableFeedbackCommands</key>
1739 <true/> | <false/>
1740 </dict>
1741 ```
1742 #### policies.json
1743 ```
1744 {
1745 "policies": {
1746 "DisableFeedbackCommands": true | false
1747 }
1748 }
1749 ```
1750 ### DisableFirefoxAccounts
1751 Disable Firefox Accounts integration (Sync).
1752
1753 **Compatibility:** Firefox 60, Firefox ESR 60\
1754 **CCK2 Equivalent:** `disableSync`\
1755 **Preferences Affected:** `identity.fxaccounts.enabled`
1756
1757 #### Windows (GPO)
1758 ```
1759 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1760 ```
1761 #### Windows (Intune)
1762 OMA-URI:
1763 ```
1764 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1765 ```
1766 Value (string):
1767 ```
1768 <enabled/> or <disabled/>
1769 ```
1770 #### macOS
1771 ```
1772 <dict>
1773 <key>DisableFirefoxAccounts</key>
1774 <true/> | <false/>
1775 </dict>
1776 ```
1777 #### policies.json
1778 ```
1779 {
1780 "policies": {
1781 "DisableFirefoxAccounts": true | false
1782 }
1783 }
1784 ```
1785 ### DisableFirefoxScreenshots
1786 Remove access to Firefox Screenshots.
1787
1788 **Compatibility:** Firefox 60, Firefox ESR 60\
1789 **CCK2 Equivalent:** N/A\
1790 **Preferences Affected:** `extensions.screenshots.disabled`
1791
1792 #### Windows (GPO)
1793 ```
1794 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1795 ```
1796 #### Windows (Intune)
1797 OMA-URI:
1798 ```
1799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1800 ```
1801 Value (string):
1802 ```
1803 <enabled/> or <disabled/>
1804 ```
1805 #### macOS
1806 ```
1807 <dict>
1808 <key>DisableFirefoxScreenshots</key>
1809 <true/> | <false/>
1810 </dict>
1811 ```
1812 #### policies.json
1813 ```
1814 {
1815 "policies": {
1816 "DisableFirefoxScreenshots": true | false
1817 }
1818 }
1819 ```
1820 ### DisableFirefoxStudies
1821 Disable Firefox studies (Shield).
1822
1823 **Compatibility:** Firefox 60, Firefox ESR 60\
1824 **CCK2 Equivalent:** N/A\
1825 **Preferences Affected:** N/A
1826
1827 #### Windows (GPO)
1828 ```
1829 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1830 ```
1831 #### Windows (Intune)
1832 OMA-URI:
1833 ```
1834 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1835 ```
1836 Value (string):
1837 ```
1838 <enabled/> or <disabled/>
1839 ```
1840 #### macOS
1841 ```
1842 <dict>
1843 <key>DisableFirefoxStudies</key>
1844 <true/> | <false/>
1845 </dict>
1846 ```
1847 #### policies.json
1848 ```
1849 {
1850 "policies": {
1851 "DisableFirefoxStudies": true | false
1852 }
1853 }
1854 ```
1855 ### DisableForgetButton
1856 Disable the "Forget" button.
1857
1858 **Compatibility:** Firefox 60, Firefox ESR 60\
1859 **CCK2 Equivalent:** `disableForget`\
1860 **Preferences Affected:** N/A
1861
1862 #### Windows (GPO)
1863 ```
1864 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1865 ```
1866 #### Windows (Intune)
1867 OMA-URI:
1868 ```
1869 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1870 ```
1871 Value (string):
1872 ```
1873 <enabled/> or <disabled/>
1874 ```
1875 #### macOS
1876 ```
1877 <dict>
1878 <key>DisableForgetButton</key>
1879 <true/> | <false/>
1880 </dict>
1881 ```
1882 #### policies.json
1883 ```
1884 {
1885 "policies": {
1886 "DisableForgetButton": true | false
1887 }
1888 }
1889 ```
1890 ### DisableFormHistory
1891 Turn off saving information on web forms and the search bar.
1892
1893 **Compatibility:** Firefox 60, Firefox ESR 60\
1894 **CCK2 Equivalent:** `disableFormFill`\
1895 **Preferences Affected:** `browser.formfill.enable`
1896
1897 #### Windows (GPO)
1898 ```
1899 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1900 ```
1901 #### Windows (Intune)
1902 OMA-URI:
1903 ```
1904 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1905 ```
1906 Value (string):
1907 ```
1908 <enabled/> or <disabled/>
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>DisableFormHistory</key>
1914 <true/> | <false/>
1915 </dict>
1916 ```
1917 #### policies.json
1918 ```
1919 {
1920 "policies": {
1921 "DisableFormHistory": true | false
1922 }
1923 }
1924 ```
1925 ### DisableMasterPasswordCreation
1926 Remove the master password functionality.
1927
1928 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1929
1930 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1931
1932 **Compatibility:** Firefox 60, Firefox ESR 60\
1933 **CCK2 Equivalent:** `noMasterPassword`\
1934 **Preferences Affected:** N/A
1935
1936 #### Windows (GPO)
1937 ```
1938 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1939 ```
1940 #### Windows (Intune)
1941 OMA-URI:
1942 ```
1943 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1944 ```
1945 Value (string):
1946 ```
1947 <enabled/> or <disabled/>
1948 ```
1949 #### macOS
1950 ```
1951 <dict>
1952 <key>DisableMasterPasswordCreation</key>
1953 <true/> | <false/>
1954 </dict>
1955 ```
1956 #### policies.json
1957 ```
1958 {
1959 "policies": {
1960 "DisableMasterPasswordCreation": true | false
1961 }
1962 }
1963 ```
1964 ### DisablePasswordReveal
1965 Do not allow passwords to be shown in saved logins
1966
1967 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1968 **CCK2 Equivalent:** N/A
1969 **Preferences Affected:** N/A
1970
1971 #### Windows (GPO)
1972 ```
1973 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1974 ```
1975 #### Windows (Intune)
1976 OMA-URI:
1977 ```
1978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1979 ```
1980 Value (string):
1981 ```
1982 <enabled/> or <disabled/>
1983 ```
1984 #### macOS
1985 ```
1986 <dict>
1987 <key>DisablePasswordReveal</key>
1988 <true/> | <false/>
1989 </dict>
1990 ```
1991 #### policies.json
1992 ```
1993 {
1994 "policies": {
1995 "DisablePasswordReveal": true | false
1996 }
1997 }
1998 ```
1999 ### DisablePocket
2000 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
2001
2002 **Compatibility:** Firefox 60, Firefox ESR 60\
2003 **CCK2 Equivalent:** `disablePocket`\
2004 **Preferences Affected:** `extensions.pocket.enabled`
2005
2006 #### Windows (GPO)
2007 ```
2008 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
2009 ```
2010 #### Windows (Intune)
2011 OMA-URI:
2012 ```
2013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
2014 ```
2015 Value (string):
2016 ```
2017 <enabled/> or <disabled/>
2018 ```
2019 #### macOS
2020 ```
2021 <dict>
2022 <key>DisablePocket</key>
2023 <true/> | <false/>
2024 </dict>
2025 ```
2026 #### policies.json
2027 ```
2028 {
2029 "policies": {
2030 "DisablePocket": true | false
2031 }
2032 }
2033 ```
2034 ### DisablePrivateBrowsing
2035 Remove access to private browsing.
2036
2037 **Compatibility:** Firefox 60, Firefox ESR 60\
2038 **CCK2 Equivalent:** `disablePrivateBrowsing`\
2039 **Preferences Affected:** N/A
2040
2041 #### Windows (GPO)
2042 ```
2043 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
2044 ```
2045 #### Windows (Intune)
2046 OMA-URI:
2047 ```
2048 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
2049 ```
2050 Value (string):
2051 ```
2052 <enabled/> or <disabled/>
2053 ```
2054 #### macOS
2055 ```
2056 <dict>
2057 <key>DisablePrivateBrowsing</key>
2058 <true/> | <false/>
2059 </dict>
2060 ```
2061 #### policies.json
2062 ```
2063 {
2064 "policies": {
2065 "DisablePrivateBrowsing": true | false
2066 }
2067 }
2068 ```
2069 ### DisableProfileImport
2070 Disables the "Import data from another browser" option in the bookmarks window.
2071
2072 **Compatibility:** Firefox 60, Firefox ESR 60\
2073 **CCK2 Equivalent:** N/A\
2074 **Preferences Affected:** N/A
2075
2076 #### Windows (GPO)
2077 ```
2078 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
2079 ```
2080 #### Windows (Intune)
2081 OMA-URI:
2082 ```
2083 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
2084 ```
2085 Value (string):
2086 ```
2087 <enabled/> or <disabled/>
2088 ```
2089 #### macOS
2090 ```
2091 <dict>
2092 <key>DisableProfileImport</key>
2093 <true/> | <false/>
2094 </dict>
2095 ```
2096 #### policies.json
2097 ```
2098 {
2099 "policies": {
2100 "DisableProfileImport": true | false
2101 }
2102 }
2103 ```
2104 ### DisableProfileRefresh
2105 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
2106
2107 **Compatibility:** Firefox 60, Firefox ESR 60\
2108 **CCK2 Equivalent:** `disableResetFirefox`\
2109 **Preferences Affected:** `browser.disableResetPrompt`
2110
2111 #### Windows (GPO)
2112 ```
2113 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
2114 ```
2115 #### Windows (Intune)
2116 OMA-URI:
2117 ```
2118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
2119 ```
2120 Value (string):
2121 ```
2122 <enabled/> or <disabled/>
2123 ```
2124 #### macOS
2125 ```
2126 <dict>
2127 <key>DisableProfileRefresh</key>
2128 <true/> | <false/>
2129 </dict>
2130 ```
2131 #### policies.json
2132 ```
2133 {
2134 "policies": {
2135 "DisableProfileRefresh": true | false
2136 }
2137 }
2138 ```
2139 ### DisableSafeMode
2140 Disable safe mode within the browser.
2141
2142 On Windows, this disables safe mode via the command line as well.
2143
2144 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
2145 **CCK2 Equivalent:** `disableSafeMode`\
2146 **Preferences Affected:** N/A
2147
2148 #### Windows (GPO)
2149 ```
2150 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
2151 ```
2152 #### Windows (Intune)
2153 OMA-URI:
2154 ```
2155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
2156 ```
2157 Value (string):
2158 ```
2159 <enabled/> or <disabled/>
2160 ```
2161 #### macOS
2162 ```
2163 <dict>
2164 <key>DisableSafeMode</key>
2165 <true/> | <false/>
2166 </dict>
2167 ```
2168 #### policies.json
2169 ```
2170 {
2171 "policies": {
2172 "DisableSafeMode": true | false
2173 }
2174 }
2175 ```
2176 ### DisableSecurityBypass
2177 Prevent the user from bypassing security in certain cases.
2178
2179 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
2180
2181 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
2182
2183 These policies only affect what happens when an error is shown, they do not affect any settings in preferences.
2184
2185 **Compatibility:** Firefox 60, Firefox ESR 60\
2186 **CCK2 Equivalent:** N/A\
2187 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
2188
2189 #### Windows (GPO)
2190 ```
2191 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
2192 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
2193 ```
2194 #### Windows (Intune)
2195 OMA-URI:
2196 ```
2197 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2198 ```
2199 Value (string):
2200 ```
2201 <enabled/> or <disabled/>
2202 ```
2203 OMA-URI:
2204 ```
2205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2206 ```
2207 Value (string):
2208 ```
2209 <enabled/> or <disabled/>
2210 ```
2211
2212 #### macOS
2213 ```
2214 <dict>
2215 <key>DisableSecurityBypass</key>
2216 <dict>
2217 <key>InvalidCertificate</key>
2218 <true/> | <false/>
2219 <key>SafeBrowsing</key>
2220 <true/> | <false/>
2221 </dict>
2222 </dict>
2223 ```
2224 #### policies.json
2225 ```
2226 {
2227 "policies": {
2228 "DisableSecurityBypass": {
2229 "InvalidCertificate": true | false,
2230 "SafeBrowsing": true | false
2231 }
2232 }
2233 }
2234 ```
2235 ### DisableSetDesktopBackground
2236 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2237
2238 **Compatibility:** Firefox 60, Firefox ESR 60\
2239 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2240 **Preferences Affected:** N/A
2241
2242 #### Windows (GPO)
2243 ```
2244 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2245 ```
2246 #### Windows (Intune)
2247 OMA-URI:
2248 ```
2249 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2250 ```
2251 Value (string):
2252 ```
2253 <enabled/> or <disabled/>
2254 ```
2255 #### macOS
2256 ```
2257 <dict>
2258 <key>DisableSetDesktopBackground</key>
2259 <true/> | <false/>
2260 </dict>
2261 ```
2262 #### policies.json
2263 ```
2264 {
2265 "policies": {
2266 "DisableSetDesktopBackground": true | false
2267 }
2268 }
2269 ```
2270 ### DisableSystemAddonUpdate
2271 Prevent system add-ons from being installed or updated.
2272
2273 **Compatibility:** Firefox 60, Firefox ESR 60\
2274 **CCK2 Equivalent:** N/A\
2275 **Preferences Affected:** N/A
2276
2277 #### Windows (GPO)
2278 ```
2279 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2280 ```
2281 #### Windows (Intune)
2282 OMA-URI:
2283 ```
2284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2285 ```
2286 Value (string):
2287 ```
2288 <enabled/> or <disabled/>
2289 ```
2290 #### macOS
2291 ```
2292 <dict>
2293 <key>DisableSystemAddonUpdate</key>
2294 <true/> | <false/>
2295 </dict>
2296 ```
2297 #### policies.json
2298 ```
2299 {
2300 "policies": {
2301 "DisableSystemAddonUpdate": true | false
2302 }
2303 }
2304 ```
2305 ### DisableTelemetry
2306 Prevent the upload of telemetry data.
2307
2308 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2309
2310 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2311
2312 **Compatibility:** Firefox 60, Firefox ESR 60\
2313 **CCK2 Equivalent:** `disableTelemetry`\
2314 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2315
2316 #### Windows (GPO)
2317 ```
2318 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2319 ```
2320 #### Windows (Intune)
2321 OMA-URI:
2322 ```
2323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2324 ```
2325 Value (string):
2326 ```
2327 <enabled/> or <disabled/>
2328 ```
2329 #### macOS
2330 ```
2331 <dict>
2332 <key>DisableTelemetry</key>
2333 <true/> | <false/>
2334 </dict>
2335 ```
2336 #### policies.json
2337 ```
2338 {
2339 "policies": {
2340 "DisableTelemetry": true | false
2341 }
2342 }
2343 ```
2344 ### DisableThirdPartyModuleBlocking
2345 Do not allow blocking third-party modules from the `about:third-party` page.
2346
2347 This policy only works on Windows through GPO (not policies.json).
2348
2349 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2350 **CCK2 Equivalent:** N/A\
2351 **Preferences Affected:** N/A
2352
2353 #### Windows (GPO)
2354 ```
2355 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2356 ```
2357 #### Windows (Intune)
2358 OMA-URI:
2359 ```
2360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2361 ```
2362 Value (string):
2363 ```
2364 <enabled/> or <disabled/>
2365 ```
2366 ### DisplayBookmarksToolbar
2367 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2368
2369 `always` means the bookmarks toolbar is always shown.
2370
2371 `never` means the bookmarks toolbar is not shown.
2372
2373 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2374
2375 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2376 **CCK2 Equivalent:** N/A\
2377 **Preferences Affected:** N/A
2378
2379 #### Windows (GPO)
2380 ```
2381 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2382 ```
2383 #### Windows (Intune)
2384 OMA-URI:
2385 ```
2386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2387 ```
2388 Value (string):
2389 ```
2390 <enabled/>
2391 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2392 ```
2393 #### macOS
2394 ```
2395 <dict>
2396 <key>DisplayBookmarksToolbar</key>
2397 <string>always | never | newtab</string>
2398 </dict>
2399 ```
2400 #### policies.json
2401 ```
2402 {
2403 "policies": {
2404 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2405 }
2406 }
2407 ```
2408 ### DisplayMenuBar
2409 Set the state of the menubar.
2410
2411 `always` means the menubar is shown and cannot be hidden.
2412
2413 `never` means the menubar is hidden and cannot be shown.
2414
2415 `default-on` means the menubar is on by default but can be hidden.
2416
2417 `default-off` means the menubar is off by default but can be shown.
2418
2419 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2420 **CCK2 Equivalent:** `displayMenuBar`\
2421 **Preferences Affected:** N/A
2422
2423 #### Windows (GPO)
2424 ```
2425 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2426 ```
2427 #### Windows (Intune)
2428 OMA-URI:
2429 ```
2430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2431 ```
2432 Value (string):
2433 ```
2434 <enabled/>
2435 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2436 ```
2437 #### macOS
2438 ```
2439 <dict>
2440 <key>DisplayMenuBar</key>
2441 <string>always | never | default-on | default-off</string>
2442 </dict>
2443 ```
2444 #### policies.json
2445 ```
2446 {
2447 "policies": {
2448 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2449 }
2450 }
2451 ```
2452 ### DNSOverHTTPS
2453 Configure DNS over HTTPS.
2454
2455 `Enabled` determines whether DNS over HTTPS is enabled
2456
2457 `ProviderURL` is a URL to another provider.
2458
2459 `Locked` prevents the user from changing DNS over HTTPS preferences.
2460
2461 `ExcludedDomains` excludes domains from DNS over HTTPS.
2462
2463 `Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider.
2464
2465 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\
2466 **CCK2 Equivalent:** N/A\
2467 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2468
2469 #### Windows (GPO)
2470 ```
2471 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2472 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2473 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2474 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2475 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0
2476 ```
2477 #### Windows (Intune)
2478 OMA-URI:
2479 ```
2480 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2481 ```
2482 Value (string):
2483 ```
2484 <enabled/> or <disabled/>
2485 ```
2486 OMA-URI:
2487 ```
2488 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2489 ```
2490 Value (string):
2491 ```
2492 <enabled/>
2493 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2494 ```
2495 OMA-URI:
2496 ```
2497 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2498 ```
2499 Value (string):
2500 ```
2501 <enabled/> or <disabled/>
2502 ```
2503 OMA-URI:
2504 ```
2505 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2506 ```
2507 Value (string):
2508 ```
2509 <enabled/>
2510 <data id="List" value="1&#xF000;example.com"/>
2511 ```
2512 OMA-URI:
2513 ```
2514 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback
2515 ```
2516 Value (string):
2517 ```
2518 <enabled/> or <disabled/>
2519 ```
2520 #### macOS
2521 ```
2522 <dict>
2523 <key>DNSOverHTTPS</key>
2524 <dict>
2525 <key>Enabled</key>
2526 <true/> | <false/>
2527 <key>ProviderURL</key>
2528 <string>URL_TO_ALTERNATE_PROVIDER</string>
2529 <key>Locked</key>
2530 <true/> | <false/>
2531 <key>ExcludedDomains</key>
2532 <array>
2533 <string>example.com</string>
2534 </array>
2535 <key>Fallback</key>
2536 <true/> | <false/>
2537 </dict>
2538 </dict>
2539 ```
2540 #### policies.json
2541 ```
2542 {
2543 "policies": {
2544 "DNSOverHTTPS": {
2545 "Enabled": true | false,
2546 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2547 "Locked": true | false,
2548 "ExcludedDomains": ["example.com"],
2549 "Fallback": true | false,
2550 }
2551 }
2552 }
2553 ```
2554 ### DontCheckDefaultBrowser
2555 Don't check if Firefox is the default browser at startup.
2556
2557 **Compatibility:** Firefox 60, Firefox ESR 60\
2558 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2559 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2560
2561 #### Windows (GPO)
2562 ```
2563 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2564 ```
2565 #### Windows (Intune)
2566 OMA-URI:
2567 ```
2568 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2569 ```
2570 Value (string):
2571 ```
2572 <enabled/> or <disabled/>
2573 ```
2574 #### macOS
2575 ```
2576 <dict>
2577 <key>DontCheckDefaultBrowser</key>
2578 <true/> | <false/>
2579 </dict>
2580 ```
2581 #### policies.json
2582 ```
2583 {
2584 "policies": {
2585 "DontCheckDefaultBrowser": true | false
2586 }
2587 }
2588 ```
2589 ### DownloadDirectory
2590 Set and lock the download directory.
2591
2592 You can use ${home} for the native home directory.
2593
2594 **Compatibility:** Firefox 68, Firefox ESR 68\
2595 **CCK2 Equivalent:** N/A\
2596 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2597
2598 #### Windows (GPO)
2599 ```
2600 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2601 ```
2602 #### Windows (Intune)
2603 OMA-URI:
2604 ```
2605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2606 ```
2607 Value (string):
2608 ```
2609 <enabled/>
2610 <data id="Preferences_String" value="${home}\Downloads"/>
2611 ```
2612 #### macOS
2613 ```
2614 <dict>
2615 <key>DownloadDirectory</key>
2616 <string>${home}/Downloads</string>
2617 </dict>
2618 ```
2619 #### policies.json (macOS and Linux)
2620 ```
2621 {
2622 "policies": {
2623 "DownloadDirectory": "${home}/Downloads"
2624 }
2625 ```
2626 #### policies.json (Windows)
2627 ```
2628 {
2629 "policies": {
2630 "DownloadDirectory": "${home}\\Downloads"
2631 }
2632 ```
2633 ### EnableTrackingProtection
2634 Configure tracking protection.
2635
2636 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2637
2638 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2639
2640 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2641
2642 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2643
2644 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2645
2646 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2647
2648 `Exceptions` are origins for which tracking protection is not enabled.
2649
2650 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2651 **CCK2 Equivalent:** N/A\
2652 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2653
2654 #### Windows (GPO)
2655 ```
2656 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2657 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2658 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2659 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2660 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2661 ```
2662 #### Windows (Intune)
2663 OMA-URI:
2664 ```
2665 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2666 ```
2667 Value (string):
2668 ```
2669 <enabled/> or <disabled/>
2670 ```
2671 OMA-URI:
2672 ```
2673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2674 ```
2675 Value (string):
2676 ```
2677 <enabled/> or <disabled/>
2678 ```
2679 OMA-URI:
2680 ```
2681 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2682 ```
2683 Value (string):
2684 ```
2685 <enabled/> or <disabled/>
2686 ```
2687 OMA-URI:
2688 ```
2689 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2690 ```
2691 Value (string):
2692 ```
2693 <enabled/>
2694 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2695 ```
2696 OMA-URI:
2697 ```
2698 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2699 ```
2700 Value (string):
2701 ```
2702 <enabled/> or <disabled/>
2703 ```
2704 #### macOS
2705 ```
2706 <dict>
2707 <key>EnableTrackingProtection</key>
2708 <dict>
2709 <key>Value</key>
2710 <true/> | <false/>
2711 <key>Locked</key>
2712 <true/> | <false/>
2713 <key>Cryptomining</key>
2714 <true/> | <false/>
2715 <key>Fingerprinting</key>
2716 <true/> | <false/>
2717 <key>Exceptions</key>
2718 <array>
2719 <string>https://example.com</string>
2720 </array>
2721 </dict>
2722 </dict>
2723 ```
2724 #### policies.json
2725 ```
2726 {
2727 "policies": {
2728 "EnableTrackingProtection": {
2729 "Value": true | false,
2730 "Locked": true | false,
2731 "Cryptomining": true | false,
2732 "Fingerprinting": true | false,
2733 "Exceptions": ["https://example.com"]
2734 }
2735 }
2736 }
2737 ```
2738 ### EncryptedMediaExtensions
2739 Enable or disable Encrypted Media Extensions and optionally lock it.
2740
2741 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2742
2743 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2744
2745 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2746 **CCK2 Equivalent:** N/A\
2747 **Preferences Affected:** `media.eme.enabled`
2748
2749 #### Windows (GPO)
2750 ```
2751 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2752 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2753 ```
2754 #### Windows (Intune)
2755 OMA-URI:
2756 ```
2757 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2758 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2759 ```
2760 Value (string):
2761 ```
2762 <enabled/>or <disabled/>
2763 ```
2764 #### macOS
2765 ```
2766 <dict>
2767 <key>EncryptedMediaExtensions</key>
2768 <dict>
2769 <key>Enabled</key>
2770 <true/> | <false/>
2771 <key>Locked</key>
2772 <true/> | <false/>
2773 </dict>
2774 </dict>
2775 ```
2776 #### policies.json
2777 ```
2778 {
2779 "policies": {
2780 "EncryptedMediaExtensions": {
2781 "Enabled": true | false,
2782 "Locked": true | false
2783 }
2784 }
2785 }
2786 ```
2787 ### EnterprisePoliciesEnabled
2788 Enable policy support on macOS.
2789
2790 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2791 **CCK2 Equivalent:** N/A\
2792 **Preferences Affected:** N/A
2793
2794 #### macOS
2795 ```
2796 <dict>
2797 <key>EnterprisePoliciesEnabled</key>
2798 <true/>
2799 </dict>
2800 ```
2801 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2802
2803 Disable warnings based on file extension for specific file types on domains.
2804
2805 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2806
2807 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2808
2809 **Compatibility:** Firefox 102\
2810 **CCK2 Equivalent:** N/A\
2811 **Preferences Affected:** N/A
2812
2813 #### Windows (GPO)
2814 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2815 ```
2816 [
2817 {
2818 "file_extension": "jnlp",
2819 "domains": ["example.com"]
2820 }
2821 ]
2822 ```
2823 #### Windows (Intune)
2824 OMA-URI:
2825 ```
2826 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2827 ```
2828 Value (string):
2829 ```
2830 <enabled/>
2831 <data id="JSON" value='
2832 [
2833 {
2834 "file_extension": "jnlp",
2835 "domains": ["example.com"]
2836 }
2837 ]
2838 '/>
2839 ```
2840 #### macOS
2841 ```
2842 <dict>
2843 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2844 <array>
2845 <dict>
2846 <key>file_extension</key>
2847 <string>jnlp</string>
2848 <key>domains</key>
2849 <array>
2850 <string>example.com</string>
2851 </array>
2852 </dict>
2853 </array>
2854 </dict>
2855 ```
2856 #### policies.json
2857 ```
2858 {
2859 "policies": {
2860 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2861 "file_extension": "jnlp",
2862 "domains": ["example.com"]
2863 }]
2864 }
2865 }
2866 ```
2867 ### Extensions
2868 Control the installation, uninstallation and locking of extensions.
2869
2870 We strongly recommend that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2871
2872 This method will be deprecated in the near future.
2873
2874 `Install` is a list of URLs or native paths for extensions to be installed.
2875
2876 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2877
2878 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2879
2880 **Compatibility:** Firefox 60, Firefox ESR 60\
2881 **CCK2 Equivalent:** `addons`\
2882 **Preferences Affected:** N/A
2883
2884 #### Windows (GPO)
2885 ```
2886 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2887 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2888 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2889 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2890 ```
2891 #### Windows (Intune)
2892 OMA-URI:
2893 ```
2894 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2895 ```
2896 Value (string):
2897 ```
2898 <enabled/>
2899 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2900 ```
2901 OMA-URI:
2902 ```
2903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2904 ```
2905 Value (string):
2906 ```
2907 <enabled/>
2908 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2909 ```
2910 OMA-URI:
2911 ```
2912 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2913 ```
2914 Value (string):
2915 ```
2916 <enabled/>
2917 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2918 ```
2919 #### macOS
2920 ```
2921 <dict>
2922 <key>Extensions</key>
2923 <dict>
2924 <key>Install</key>
2925 <array>
2926 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2927 <string>//path/to/xpi</string>
2928 </array>
2929 <key>Uninstall</key>
2930 <array>
2931 <string>bad_addon_id@mozilla.org</string>
2932 </array>
2933 <key>Locked</key>
2934 <array>
2935 <string>addon_id@mozilla.org</string>
2936 </array>
2937 </dict>
2938 </dict>
2939 ```
2940 #### policies.json
2941 ```
2942 {
2943 "policies": {
2944 "Extensions": {
2945 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2946 "Uninstall": ["bad_addon_id@mozilla.org"],
2947 "Locked": ["addon_id@mozilla.org"]
2948 }
2949 }
2950 }
2951 ```
2952 ### ExtensionSettings
2953 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2954
2955 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2956
2957 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2958
2959 The configuration for each extension is another dictionary that can contain the fields documented below.
2960
2961 | Name | Description |
2962 | --- | --- |
2963 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2964 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2965 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2966 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2967 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2968 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2969 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2970 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2971 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2972 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2973 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2974 | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`.
2975
2976 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2977 **CCK2 Equivalent:** N/A\
2978 **Preferences Affected:** N/A
2979
2980 #### Windows (GPO)
2981 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2982 ```
2983 {
2984 "*": {
2985 "blocked_install_message": "Custom error message.",
2986 "install_sources": ["https://yourwebsite.com/*"],
2987 "installation_mode": "blocked",
2988 "allowed_types": ["extension"]
2989 },
2990 "uBlock0@raymondhill.net": {
2991 "installation_mode": "force_installed",
2992 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2993 },
2994 "https-everywhere@eff.org": {
2995 "installation_mode": "allowed",
2996 "updates_disabled": false
2997 }
2998 }
2999 ```
3000 #### Windows (Intune)
3001 OMA-URI:
3002 ```
3003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
3004 ```
3005 Value (string):
3006 ```
3007 <enabled/>
3008 <data id="ExtensionSettings" value='
3009 {
3010 "*": {
3011 "blocked_install_message": "Custom error message.",
3012 "install_sources": ["https://yourwebsite.com/*"],
3013 "installation_mode": "blocked",
3014 "allowed_types": ["extension"]
3015 },
3016 "uBlock0@raymondhill.net": {
3017 "installation_mode": "force_installed",
3018 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
3019 },
3020 "https-everywhere@eff.org": {
3021 "installation_mode": "allowed",
3022 "updates_disabled": false
3023 }
3024 }'/>
3025 ```
3026 #### macOS
3027 ```
3028 <dict>
3029 <key>ExtensionSettings</key>
3030 <dict>
3031 <key>*</key>
3032 <dict>
3033 <key>blocked_install_message</key>
3034 <string>Custom error message.</string>
3035 <key>install_sources</key>
3036 <array>
3037 <string>"https://yourwebsite.com/*"</string>
3038 </array>
3039 <key>installation_mode</key>
3040 <string>blocked</string>
3041 <key>allowed_types</key>
3042 <array>
3043 <string>extension</string>
3044 </array>
3045 </dict>
3046 <key>uBlock0@raymondhill.net</key>
3047 <dict>
3048 <key>installation_mode</key>
3049 <string>force_installed</string>
3050 <key>install_url</key>
3051 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
3052 </dict>
3053 <key>https-everywhere@eff.org</key>
3054 <dict>
3055 <key>installation_mode</key>
3056 <string>allowed</string>
3057 <key>updates_disabled</key>
3058 <true/> | <false/>
3059 </dict>
3060 </dict>
3061 </dict>
3062 ```
3063 #### policies.json
3064 ```
3065 {
3066 "policies": {
3067 "ExtensionSettings": {
3068 "*": {
3069 "blocked_install_message": "Custom error message.",
3070 "install_sources": ["https://yourwebsite.com/*"],
3071 "installation_mode": "blocked",
3072 "allowed_types": ["extension"]
3073 },
3074 "uBlock0@raymondhill.net": {
3075 "installation_mode": "force_installed",
3076 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
3077 },
3078 "https-everywhere@eff.org": {
3079 "installation_mode": "allowed",
3080 "updates_disabled": false
3081 }
3082 }
3083 }
3084 }
3085 ```
3086 ### ExtensionUpdate
3087 Control extension updates.
3088
3089 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3090 **CCK2 Equivalent:** N/A\
3091 **Preferences Affected:** `extensions.update.enabled`
3092
3093 #### Windows (GPO)
3094 ```
3095 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
3096 ```
3097 #### Windows (Intune)
3098 OMA-URI:
3099 ```
3100 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
3101 ```
3102 Value (string):
3103 ```
3104 <enabled/> or <disabled/>
3105 ```
3106 #### macOS
3107 ```
3108 <dict>
3109 <key>ExtensionUpdate</key>
3110 <true/> | <false/>
3111 </dict>
3112 ```
3113 #### policies.json
3114 ```
3115 {
3116 "policies": {
3117 "ExtensionUpdate": true | false
3118 }
3119 }
3120 ```
3121 ### FirefoxHome
3122 Customize the Firefox Home page.
3123
3124 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4, Snippets was deprecated in Firefox 122)
3125 **CCK2 Equivalent:** N/A\
3126 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
3127
3128 #### Windows (GPO)
3129 ```
3130 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
3131 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
3132 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
3133 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
3134 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
3135 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
3136 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
3137 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
3138 ```
3139 #### Windows (Intune)
3140 OMA-URI:
3141 ```
3142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
3143 ```
3144 Value (string):
3145 ```
3146 <enabled/>
3147 <data id="FirefoxHome_Search" value="true | false"/>
3148 <data id="FirefoxHome_TopSites" value="true | false"/>
3149 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
3150 <data id="FirefoxHome_Highlights" value="true | false"/>
3151 <data id="FirefoxHome_Pocket" value="true | false"/>
3152 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
3153 <data id="FirefoxHome_Snippets" value="true | false"/>
3154 <data id="FirefoxHome_Locked" value="true | false"/>
3155 ```
3156 #### macOS
3157 ```
3158 <dict>
3159 <key>FirefoxHome</key>
3160 <dict>
3161 <key>Search</key>
3162 <true/> | <false/>
3163 <key>TopSites</key>
3164 <true/> | <false/>
3165 <key>SponsoredTopSites</key>
3166 <true/> | <false/>
3167 <key>Highlights</key>
3168 <true/> | <false/>
3169 <key>Pocket</key>
3170 <true/> | <false/>
3171 <key>SponsoredPocket</key>
3172 <true/> | <false/>
3173 <key>Snippets</key>
3174 <true/> | <false/>
3175 <key>Locked</key>
3176 <true/> | <false/>
3177 </dict>
3178 </dict>
3179 ```
3180 #### policies.json
3181 ```
3182 {
3183 "policies": {
3184 "FirefoxHome": {
3185 "Search": true | false,
3186 "TopSites": true | false,
3187 "SponsoredTopSites": true | false,
3188 "Highlights": true | false,
3189 "Pocket": true | false,
3190 "SponsoredPocket": true | false,
3191 "Snippets": true | false,
3192 "Locked": true | false
3193 }
3194 }
3195 }
3196 ```
3197 ### FirefoxSuggest
3198 Customize Firefox Suggest (US only).
3199
3200 **Compatibility:** Firefox 118, Firefox ESR 115.3.
3201 **CCK2 Equivalent:** N/A\
3202 **Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled`
3203
3204 #### Windows (GPO)
3205 ```
3206 Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0
3207 Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0
3208 Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0
3209 Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0
3210 ```
3211 #### Windows (Intune)
3212 OMA-URI:
3213 ```
3214 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions
3215 ```
3216 Value (string):
3217 ```
3218 <enabled/> or <disabled/>
3219 ```
3220 OMA-URI:
3221 ```
3222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions
3223 ```
3224 Value (string):
3225 ```
3226 <enabled/> or <disabled/>
3227 ```
3228 OMA-URI:
3229 ```
3230 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest
3231 ```
3232 Value (string):
3233 ```
3234 <enabled/> or <disabled/>
3235 ```
3236 OMA-URI:
3237 ```
3238 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked
3239 ```
3240 Value (string):
3241 ```
3242 <enabled/> or <disabled/>
3243 ```
3244 #### macOS
3245 ```
3246 <dict>
3247 <key>FirefoxSuggest</key>
3248 <dict>
3249 <key>WebSuggestions</key>
3250 <true/> | <false/>
3251 <key>SponsoredSuggestions</key>
3252 <true/> | <false/>
3253 <key>ImproveSuggest</key>
3254 <true/> | <false/>
3255 <key>Locked</key>
3256 <true/> | <false/>
3257 </dict>
3258 </dict>
3259 ```
3260 #### policies.json
3261 ```
3262 {
3263 "policies": {
3264 "FirefoxSuggest": {
3265 "WebSuggestions": true | false,
3266 "SponsoredSuggestions": true | false,
3267 "ImproveSuggest": true | false,
3268 "Locked": true | false
3269 }
3270 }
3271 }
3272 ```
3273 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3274 Whether to always go through the DNS server before sending a single word search string to a search engine.
3275
3276 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3277
3278 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3279
3280 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3281
3282 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3283
3284 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3285
3286 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3287 **CCK2 Equivalent:** `N/A`\
3288 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3289
3290 #### Windows (GPO)
3291 ```
3292 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3293 ```
3294 #### Windows (Intune)
3295 OMA-URI:
3296 ```
3297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3298 ```
3299 Value (string):
3300 ```
3301 <enabled/> or <disabled/>
3302 ```
3303 #### macOS
3304 ```
3305 <dict>
3306 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3307 <true/> | <false/>
3308 </dict>
3309 ```
3310 #### policies.json
3311 ```
3312 {
3313 "policies": {
3314 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3315 }
3316 }
3317 ```
3318 ### Handlers
3319 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3320
3321 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3322
3323 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3324
3325 | Name | Description |
3326 | --- | --- |
3327 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3328 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3329 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3330 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3331 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3332 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3333
3334 **Compatibility:** Firefox 78, Firefox ESR 78\
3335 **CCK2 Equivalent:** N/A\
3336 **Preferences Affected:** N/A
3337
3338 #### Windows (GPO)
3339 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3340 ```
3341 {
3342 "mimeTypes": {
3343 "application/msword": {
3344 "action": "useSystemDefault",
3345 "ask": true | false
3346 }
3347 },
3348 "schemes": {
3349 "mailto": {
3350 "action": "useHelperApp",
3351 "ask": true | false,
3352 "handlers": [{
3353 "name": "Gmail",
3354 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3355 }]
3356 }
3357 },
3358 "extensions": {
3359 "pdf": {
3360 "action": "useHelperApp",
3361 "ask": true | false,
3362 "handlers": [{
3363 "name": "Adobe Acrobat",
3364 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3365 }]
3366 }
3367 }
3368 }
3369 ```
3370 #### Windows (Intune)
3371 OMA-URI:
3372 ```
3373 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3374 ```
3375 Value (string):
3376 ```
3377 <enabled/>
3378 <data id="Handlers" value='
3379 {
3380 "mimeTypes": {
3381 "application/msword": {
3382 "action": "useSystemDefault",
3383 "ask": true | false
3384 }
3385 },
3386 "schemes": {
3387 "mailto": {
3388 "action": "useHelperApp",
3389 "ask": true | false,
3390 "handlers": [{
3391 "name": "Gmail",
3392 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3393 }]
3394 }
3395 },
3396 "extensions": {
3397 "pdf": {
3398 "action": "useHelperApp",
3399 "ask": true | false,
3400 "handlers": [{
3401 "name": "Adobe Acrobat",
3402 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3403 }]
3404 }
3405 }
3406 }
3407 '/>
3408 ```
3409 #### macOS
3410 ```
3411 <dict>
3412 <key>Handlers</key>
3413 <dict>
3414 <key>mimeTypes</key>
3415 <dict>
3416 <key>application/msword</key>
3417 <dict>
3418 <key>action</key>
3419 <string>useSystemDefault</string>
3420 <key>ask</key>
3421 <true/> | <false/>
3422 </dict>
3423 </dict>
3424 <key>schemes</key>
3425 <dict>
3426 <key>mailto</key>
3427 <dict>
3428 <key>action</key>
3429 <string>useHelperApp</string>
3430 <key>ask</key>
3431 <true/> | <false/>
3432 <key>handlers</key>
3433 <array>
3434 <dict>
3435 <key>name</key>
3436 <string>Gmail</string>
3437 <key>uriTemplate</key>
3438 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3439 </dict>
3440 </array>
3441 </dict>
3442 </dict>
3443 <key>extensions</key>
3444 <dict>
3445 <key>pdf</key>
3446 <dict>
3447 <key>action</key>
3448 <string>useHelperApp</string>
3449 <key>ask</key>
3450 <true/> | <false/>
3451 <key>handlers</key>
3452 <array>
3453 <dict>
3454 <key>name</key>
3455 <string>Adobe Acrobat</string>
3456 <key>path</key>
3457 <string>/System/Applications/Preview.app</string>
3458 </dict>
3459 </array>
3460 </dict>
3461 </dict>
3462 </dict>
3463 </dict>
3464 ```
3465 #### policies.json
3466 ```
3467 {
3468 "policies": {
3469 "Handlers": {
3470 "mimeTypes": {
3471 "application/msword": {
3472 "action": "useSystemDefault",
3473 "ask": false
3474 }
3475 },
3476 "schemes": {
3477 "mailto": {
3478 "action": "useHelperApp",
3479 "ask": true | false,
3480 "handlers": [{
3481 "name": "Gmail",
3482 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3483 }]
3484 }
3485 },
3486 "extensions": {
3487 "pdf": {
3488 "action": "useHelperApp",
3489 "ask": true | false,
3490 "handlers": [{
3491 "name": "Adobe Acrobat",
3492 "path": "/usr/bin/acroread"
3493 }]
3494 }
3495 }
3496 }
3497 }
3498 }
3499 ```
3500 ### HardwareAcceleration
3501 Control hardware acceleration.
3502
3503 **Compatibility:** Firefox 60, Firefox ESR 60\
3504 **CCK2 Equivalent:** N/A\
3505 **Preferences Affected:** `layers.acceleration.disabled`
3506
3507 #### Windows (GPO)
3508 ```
3509 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3510 ```
3511 #### Windows (Intune)
3512 OMA-URI:
3513 ```
3514 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3515 ```
3516 Value (string):
3517 ```
3518 <enabled/> or <disabled/>
3519 ```
3520 #### macOS
3521 ```
3522 <dict>
3523 <key>HardwareAcceleration</key>
3524 <true/> | <false/>
3525 </dict>
3526 ```
3527 #### policies.json
3528 ```
3529 {
3530 "policies": {
3531 "HardwareAcceleration": true | false
3532 }
3533 }
3534 ```
3535 ### Homepage
3536 Configure the default homepage and how Firefox starts.
3537
3538 `URL` is the default homepage.
3539
3540 `Locked` prevents the user from changing homepage preferences.
3541
3542 `Additional` allows for more than one homepage.
3543
3544 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3545
3546 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3547
3548 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3549 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3550 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3551
3552 #### Windows (GPO)
3553 ```
3554 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3555 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3556 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3557 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3558 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3559 ```
3560 #### Windows (Intune)
3561 OMA-URI:
3562 ```
3563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3564 ```
3565 Value (string):
3566 ```
3567 <enabled/>
3568
3569 <data id="HomepageURL" value="https://example.com"/>
3570 <data id="HomepageLocked" value="true | false"/>
3571 ```
3572 OMA-URI:
3573 ```
3574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3575 ```
3576 Value (string):
3577 ```
3578 <enabled/>
3579
3580 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3581 ```
3582 OMA-URI:
3583 ```
3584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3585 ```
3586 Value (string):
3587 ```
3588 <enabled/>
3589
3590 <data id="StartPage" value="none | homepage | previous-session"/>
3591 ```
3592 #### macOS
3593 ```
3594 <dict>
3595 <key>Homepage</key>
3596 <dict>
3597 <key>URL</key>
3598 <string>http://example.com</string>
3599 <key>Locked</key>
3600 <true/> | <false/>
3601 <key>Additional</key>
3602 <array>
3603 <string>http://example.org</string>
3604 <string>http://example.edu</string>
3605 </array>
3606 <key>StartPage</key>
3607 <string>none | homepage | previous-session | homepage-locked</string>
3608 </dict>
3609 </dict>
3610 ```
3611 #### policies.json
3612 ```
3613 {
3614 "policies": {
3615 "Homepage": {
3616 "URL": "http://example.com/",
3617 "Locked": true | false,
3618 "Additional": ["http://example.org/",
3619 "http://example.edu/"],
3620 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3621 }
3622 }
3623 }
3624 ```
3625 ### InstallAddonsPermission
3626 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3627
3628 `Allow` is a list of origins where extension installs are allowed.
3629
3630 `Default` determines whether or not extension installs are allowed by default.
3631
3632 **Compatibility:** Firefox 60, Firefox ESR 60\
3633 **CCK2 Equivalent:** `permissions.install`\
3634 **Preferences Affected:** `xpinstall.enabled`
3635
3636 #### Windows (GPO)
3637 ```
3638 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3639 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3640 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3641 ```
3642 #### Windows (Intune)
3643 OMA-URI:
3644 ```
3645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3646 ```
3647 Value (string):
3648 ```
3649 <enabled/>
3650 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3651 ```
3652 OMA-URI:
3653 ```
3654 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3655 ```
3656 Value (string):
3657 ```
3658 <enabled/>
3659 ```
3660 #### macOS
3661 ```
3662 <dict>
3663 <key>InstallAddonsPermission</key>
3664 <dict>
3665 <key>Allow</key>
3666 <array>
3667 <string>http://example.org</string>
3668 <string>http://example.edu</string>
3669 </array>
3670 <key>Default</key>
3671 <true/> | <false/>
3672 </dict>
3673 </dict>
3674 ```
3675 #### policies.json
3676 ```
3677 {
3678 "policies": {
3679 "InstallAddonsPermission": {
3680 "Allow": ["http://example.org/",
3681 "http://example.edu/"],
3682 "Default": true | false
3683 }
3684 }
3685 }
3686 ```
3687 ### LegacyProfiles
3688 Disable the feature enforcing a separate profile for each installation.
3689
3690 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3691
3692 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3693
3694 This policy only work on Windows via GPO (not policies.json).
3695
3696 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3697 **CCK2 Equivalent:** N/A\
3698 **Preferences Affected:** N/A
3699
3700 #### Windows (GPO)
3701 ```
3702 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3703 ```
3704 #### Windows (Intune)
3705 OMA-URI:
3706 ```
3707 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3708 ```
3709 Value (string):
3710 ```
3711 <enabled/> or <disabled/>
3712 ```
3713 ### LegacySameSiteCookieBehaviorEnabled
3714 Enable default legacy SameSite cookie behavior setting.
3715
3716 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3717
3718 **Compatibility:** Firefox 96\
3719 **CCK2 Equivalent:** N/A\
3720 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3721
3722 #### Windows (GPO)
3723 ```
3724 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3725 ```
3726 #### Windows (Intune)
3727 OMA-URI:
3728 ```
3729 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3730 ```
3731 Value (string):
3732 ```
3733 <enabled/> or <disabled/>
3734 ```
3735 #### macOS
3736 ```
3737 <dict>
3738 <key>LegacySameSiteCookieBehaviorEnabled</key>
3739 <true/> | <false/>
3740 </dict>
3741 ```
3742 #### policies.json
3743 ```
3744 {
3745 "policies": {
3746 "LegacySameSiteCookieBehaviorEnabled": true | false
3747 }
3748 ```
3749 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3750 Revert to legacy SameSite behavior for cookies on specified sites.
3751
3752 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3753
3754 **Compatibility:** Firefox 96\
3755 **CCK2 Equivalent:** N/A\
3756 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3757
3758 #### Windows (GPO)
3759 ```
3760 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3761 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3762 ```
3763 #### Windows (Intune)
3764 OMA-URI:
3765 ```
3766 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3767 ```
3768 Value (string):
3769 ```
3770 <enabled/>
3771 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3772 ```
3773 #### macOS
3774 ```
3775 <dict>
3776 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3777 <array>
3778 <string>example.org</string>
3779 <string>example.edu</string>
3780 </array>
3781 </dict>
3782 ```
3783 #### policies.json
3784 ```
3785 {
3786 "policies": {
3787 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3788 "example.edu"]
3789 }
3790 }
3791 ```
3792 ### LocalFileLinks
3793 Enable linking to local files by origin.
3794
3795 **Compatibility:** Firefox 68, Firefox ESR 68\
3796 **CCK2 Equivalent:** N/A\
3797 **Preferences Affected:** `capability.policy.localfilelinks.*`
3798
3799 #### Windows (GPO)
3800 ```
3801 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3802 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3803 ```
3804 #### Windows (Intune)
3805 OMA-URI:
3806 ```
3807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3808 ```
3809 Value (string):
3810 ```
3811 <enabled/>
3812 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3813 ```
3814 #### macOS
3815 ```
3816 <dict>
3817 <key>LocalFileLinks</key>
3818 <array>
3819 <string>http://example.org</string>
3820 <string>http://example.edu</string>
3821 </array>
3822 </dict>
3823 ```
3824 #### policies.json
3825 ```
3826 {
3827 "policies": {
3828 "LocalFileLinks": ["http://example.org/",
3829 "http://example.edu/"]
3830 }
3831 }
3832 ```
3833 ### ManagedBookmarks
3834 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3835
3836 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3837
3838 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3839 ```
3840 {
3841 "items": {
3842 "id": "BookmarkType",
3843 "properties": {
3844 "children": {
3845 "items": {
3846 "$ref": "BookmarkType"
3847 },
3848 "type": "array"
3849 },
3850 "name": {
3851 "type": "string"
3852 },
3853 "toplevel_name": {
3854 "type": "string"
3855 },
3856 "url": {
3857 "type": "string"
3858 }
3859 },
3860 "type": "object"
3861 },
3862 "type": "array"
3863 }
3864 ```
3865 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3866 **CCK2 Equivalent:** N/A\
3867 **Preferences Affected:** N/A
3868
3869 #### Windows (GPO)
3870 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3871 ```
3872 [
3873 {
3874 "toplevel_name": "My managed bookmarks folder"
3875 },
3876 {
3877 "url": "example.com",
3878 "name": "Example"
3879 },
3880 {
3881 "name": "Mozilla links",
3882 "children": [
3883 {
3884 "url": "https://mozilla.org",
3885 "name": "Mozilla.org"
3886 },
3887 {
3888 "url": "https://support.mozilla.org/",
3889 "name": "SUMO"
3890 }
3891 ]
3892 }
3893 ]
3894 ```
3895 #### Windows (Intune)
3896 OMA-URI:
3897 ```
3898 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3899 ```
3900 Value (string):
3901 ```
3902 <enabled/>
3903 <data id="JSON" value='
3904 [
3905 {
3906 "toplevel_name": "My managed bookmarks folder"
3907 },
3908 {
3909 "url": "example.com",
3910 "name": "Example"
3911 },
3912 {
3913 "name": "Mozilla links",
3914 "children": [
3915 {
3916 "url": "https://mozilla.org",
3917 "name": "Mozilla.org"
3918 },
3919 {
3920 "url": "https://support.mozilla.org/",
3921 "name": "SUMO"
3922 }
3923 ]
3924 }
3925 ]'/>
3926 ```
3927 #### macOS
3928 ```
3929 <dict>
3930 <key>ManagedBookmarks</key>
3931 <array>
3932 <dict>
3933 <key>toplevel_name</key>
3934 <string>My managed bookmarks folder</string>
3935 <dict>
3936 <key>url</key>
3937 <string>example.com</string>
3938 <key>name</key>
3939 <string>Example</string>
3940 </dict>
3941 <dict>
3942 <key>name</key>
3943 <string>Mozilla links</string>
3944 <key>children</key>
3945 <array>
3946 <dict>
3947 <key>url</key>
3948 <string>https://mozilla.org</string>
3949 <key>name</key>
3950 <string>Mozilla</string>
3951 </dict>
3952 <dict>
3953 <key>url</key>
3954 <string>https://support.mozilla.org/</string>
3955 <key>name</key>
3956 <string>SUMO</string>
3957 </dict>
3958 </array>
3959 </dict>
3960 </array>
3961 </dict>
3962 ```
3963 #### policies.json
3964 ```
3965 {
3966 "policies": {
3967 "ManagedBookmarks": [
3968 {
3969 "toplevel_name": "My managed bookmarks folder"
3970 },
3971 {
3972 "url": "example.com",
3973 "name": "Example"
3974 },
3975 {
3976 "name": "Mozilla links",
3977 "children": [
3978 {
3979 "url": "https://mozilla.org",
3980 "name": "Mozilla.org"
3981 },
3982 {
3983 "url": "https://support.mozilla.org/",
3984 "name": "SUMO"
3985 }
3986 ]
3987 }
3988 ]
3989 }
3990 }
3991 ```
3992 ### ManualAppUpdateOnly
3993
3994 Switch to manual updates only.
3995
3996 If this policy is enabled:
3997 1. The user will never be prompted to install updates
3998 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3999 3. The update UI will work as expected, unlike when using DisableAppUpdate.
4000
4001 This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO.
4002
4003 **Compatibility:** Firefox 87\
4004 **CCK2 Equivalent:** N/A\
4005 **Preferences Affected:** N/A
4006
4007 #### Windows (GPO)
4008 ```
4009 Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0
4010 ```
4011 #### Windows (Intune)
4012 OMA-URI:
4013 ```
4014 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly
4015 ```
4016 Value (string):
4017 ```
4018 <enabled/> or <disabled/>
4019 ```
4020 #### macOS
4021 ```
4022 <dict>
4023 <key>ManualAppUpdateOnly</key>
4024 <true/> | <false/>
4025 </dict>
4026 ```
4027 #### policies.json
4028 ```
4029 {
4030 "policies": {
4031 "ManualAppUpdateOnly": true | false
4032 }
4033 }
4034 ```
4035 ### NetworkPrediction
4036 Enable or disable network prediction (DNS prefetching).
4037
4038 **Compatibility:** Firefox 67, Firefox ESR 60.7\
4039 **CCK2 Equivalent:** N/A\
4040 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
4041
4042 #### Windows (GPO)
4043 ```
4044 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
4045 ```
4046 #### Windows (Intune)
4047 OMA-URI:
4048 ```
4049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
4050 ```
4051 Value (string):
4052 ```
4053 <enabled/> or <disabled/>
4054 ```
4055 #### macOS
4056 ```
4057 <dict>
4058 <key>NetworkPrediction</key>
4059 <true/> | <false/>
4060 </dict>
4061 ```
4062 #### policies.json
4063 ```
4064 {
4065 "policies": {
4066 "NetworkPrediction": true | false
4067 }
4068 ```
4069 ### NewTabPage
4070 Enable or disable the New Tab page.
4071
4072 **Compatibility:** Firefox 68, Firefox ESR 68\
4073 **CCK2 Equivalent:** N/A\
4074 **Preferences Affected:** `browser.newtabpage.enabled`
4075
4076 #### Windows (GPO)
4077 ```
4078 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
4079 ```
4080 #### Windows (Intune)
4081 OMA-URI:
4082 ```
4083 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
4084 ```
4085 Value (string):
4086 ```
4087 <enabled/> or <disabled/>
4088 ```
4089 #### macOS
4090 ```
4091 <dict>
4092 <key>NewTabPage</key>
4093 <true/> | <false/>
4094 </dict>
4095 ```
4096 #### policies.json
4097 ```
4098 {
4099 "policies": {
4100 "NewTabPage": true | false
4101 }
4102 ```
4103 ### NoDefaultBookmarks
4104 Disable the creation of default bookmarks.
4105
4106 This policy is only effective if the user profile has not been created yet.
4107
4108 **Compatibility:** Firefox 60, Firefox ESR 60\
4109 **CCK2 Equivalent:** `removeDefaultBookmarks`\
4110 **Preferences Affected:** N/A
4111
4112 #### Windows (GPO)
4113 ```
4114 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
4115 ```
4116 #### Windows (Intune)
4117 OMA-URI:
4118 ```
4119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
4120 ```
4121 Value (string):
4122 ```
4123 <enabled/> or <disabled/>
4124 ```
4125 #### macOS
4126 ```
4127 <dict>
4128 <key>NoDefaultBookmarks</key>
4129 <true/> | <false/>
4130 </dict>
4131 ```
4132 #### policies.json
4133 ```
4134 {
4135 "policies": {
4136 "NoDefaultBookmarks": true | false
4137 }
4138 }
4139 ```
4140 ### OfferToSaveLogins
4141 Control whether or not Firefox offers to save passwords.
4142
4143 **Compatibility:** Firefox 60, Firefox ESR 60\
4144 **CCK2 Equivalent:** `dontRememberPasswords`\
4145 **Preferences Affected:** `signon.rememberSignons`
4146
4147 #### Windows (GPO)
4148 ```
4149 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
4150 ```
4151 #### Windows (Intune)
4152 OMA-URI:
4153 ```
4154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
4155 ```
4156 Value (string):
4157 ```
4158 <enabled/> or <disabled/>
4159 ```
4160 #### macOS
4161 ```
4162 <dict>
4163 <key>OfferToSaveLogins</key>
4164 <true/> | <false/>
4165 </dict>
4166 ```
4167 #### policies.json
4168 ```
4169 {
4170 "policies": {
4171 "OfferToSaveLogins": true | false
4172 }
4173 }
4174 ```
4175 ### OfferToSaveLoginsDefault
4176 Sets the default value of signon.rememberSignons without locking it.
4177
4178 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4179 **CCK2 Equivalent:** `dontRememberPasswords`\
4180 **Preferences Affected:** `signon.rememberSignons`
4181
4182 #### Windows (GPO)
4183 ```
4184 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
4185 ```
4186 #### Windows (Intune)
4187 OMA-URI:
4188 ```
4189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
4190 ```
4191 Value (string):
4192 ```
4193 <enabled/> or <disabled/>
4194 ```
4195 #### macOS
4196 ```
4197 <dict>
4198 <key>OfferToSaveLoginsDefault</key>
4199 <true/> | <false/>
4200 </dict>
4201 ```
4202 #### policies.json
4203 ```
4204 {
4205 "policies": {
4206 "OfferToSaveLoginsDefault": true | false
4207 }
4208 }
4209 ```
4210 ### OverrideFirstRunPage
4211 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
4212
4213 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
4214
4215 **Compatibility:** Firefox 60, Firefox ESR 60\
4216 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
4217 **Preferences Affected:** `startup.homepage_welcome_url`
4218
4219 #### Windows (GPO)
4220 ```
4221 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
4222 ```
4223 #### Windows (Intune)
4224 OMA-URI:
4225 ```
4226 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
4227 ```
4228 Value (string):
4229 ```
4230 <enabled/>
4231 <data id="OverridePage" value="https://example.com"/>
4232 ```
4233 #### macOS
4234 ```
4235 <dict>
4236 <key>OverrideFirstRunPage</key>
4237 <string>http://example.org</string>
4238 </dict>
4239 ```
4240 #### policies.json
4241 ```
4242 {
4243 "policies": {
4244 "OverrideFirstRunPage": "http://example.org"
4245 }
4246 }
4247 ```
4248 ### OverridePostUpdatePage
4249 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
4250
4251 **Compatibility:** Firefox 60, Firefox ESR 60\
4252 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4253 **Preferences Affected:** `startup.homepage_override_url`
4254
4255 #### Windows (GPO)
4256 ```
4257 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4258 ```
4259 #### Windows (Intune)
4260 OMA-URI:
4261 ```
4262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4263 ```
4264 Value (string):
4265 ```
4266 <enabled/>
4267 <data id="OverridePage" value="https://example.com"/>
4268 ```
4269 #### macOS
4270 ```
4271 <dict>
4272 <key>OverridePostUpdatePage</key>
4273 <string>http://example.org</string>
4274 </dict>
4275 ```
4276 #### policies.json
4277 ```
4278 {
4279 "policies": {
4280 "OverridePostUpdatePage": "http://example.org"
4281 }
4282 }
4283 ```
4284 ### PasswordManagerEnabled
4285 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4286
4287 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4288 **CCK2 Equivalent:** N/A\
4289 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4290
4291 #### Windows (GPO)
4292 ```
4293 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4294 ```
4295 #### Windows (Intune)
4296 OMA-URI:
4297 ```
4298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4299 ```
4300 Value (string):
4301 ```
4302 <enabled/> or <disabled/>
4303 ```
4304 #### macOS
4305 ```
4306 <dict>
4307 <key>PasswordManagerEnabled</key>
4308 <true/> | <false/>
4309 </dict>
4310 ```
4311 #### policies.json
4312 ```
4313 {
4314 "policies": {
4315 "PasswordManagerEnabled": true | false
4316 }
4317 }
4318 ```
4319 ### PasswordManagerExceptions
4320 Prevent Firefox from saving passwords for specific sites.
4321
4322 The sites are specified as a list of origins.
4323
4324 **Compatibility:** Firefox 101\
4325 **CCK2 Equivalent:** N/A\
4326 **Preferences Affected:** N/A
4327
4328 #### Windows (GPO)
4329 ```
4330 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4331 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4332 ```
4333 #### Windows (Intune)
4334 OMA-URI:
4335 ```
4336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4337 ```
4338 Value (string):
4339 ```
4340 <enabled/>
4341 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4342 ```
4343 #### macOS
4344 ```
4345 <dict>
4346 <key>PasswordManagerExceptions</key>
4347 <array>
4348 <string>https://example.org</string>
4349 <string>https://example.edu</string>
4350 </array>
4351 </dict>
4352 ```
4353 #### policies.json
4354 ```
4355 {
4356 "policies": {
4357 "PasswordManagerExceptions": ["https://example.org",
4358 "https://example.edu"]
4359 }
4360 }
4361 ```
4362
4363 ### PDFjs
4364 Disable or configure PDF.js, the built-in PDF viewer.
4365
4366 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4367
4368 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4369
4370 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4371
4372 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4373 **CCK2 Equivalent:** N/A\
4374 **Preferences Affected:** `pdfjs.disabled`, `pdfjs.enablePermissions`
4375
4376 #### Windows (GPO)
4377 ```
4378 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4379 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4380 ```
4381 #### Windows (Intune)
4382 OMA-URI:
4383 ```
4384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4385 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4386 ```
4387 Value (string):
4388 ```
4389 <enabled/>or <disabled/>
4390 ```
4391 #### macOS
4392 ```
4393 <dict>
4394 <key>PDFjs</key>
4395 <dict>
4396 <key>Enabled</key>
4397 <true/> | <false/>
4398 <key>EnablePermissions</key>
4399 <true/> | <false/>
4400 </dict>
4401 </dict>
4402 ```
4403 #### policies.json
4404 ```
4405 {
4406 "policies": {
4407 "PDFjs": {
4408 "Enabled": true | false,
4409 "EnablePermissions": true | false
4410 }
4411 }
4412 }
4413 ```
4414 ### Permissions
4415 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4416
4417 `Allow` is a list of origins where the feature is allowed.
4418
4419 `Block` is a list of origins where the feature is not allowed.
4420
4421 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4422
4423 `Locked` prevents the user from changing preferences for the feature.
4424
4425 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4426
4427 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4428 **CCK2 Equivalent:** N/A\
4429 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4430
4431 #### Windows (GPO)
4432 ```
4433 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4434 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4435 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4436 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4437 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4438 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4439 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4440 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4441 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4442 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4443 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4444 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4445 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4446 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4447 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4448 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4449 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4450 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4451 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4452 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4453 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4454 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4455 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4456 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4457 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4458 ```
4459 #### Windows (Intune)
4460 OMA-URI:
4461 ```
4462 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4463 ```
4464 Value (string):
4465 ```
4466 <enabled/> or <disabled/>
4467 ```
4468 OMA-URI:
4469 ```
4470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4471 ```
4472 Value (string):
4473 ```
4474 <enabled/> or <disabled/>
4475 ```
4476 OMA-URI:
4477 ```
4478 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4479 ```
4480 Value (string):
4481 ```
4482 <enabled/>
4483 <data id="Permissions" value="1&#xF000;https://example.org"/>
4484 ```
4485 OMA-URI:
4486 ```
4487 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4488 ```
4489 Value (string):
4490 ```
4491 <enabled/> or <disabled/>
4492 ```
4493 OMA-URI:
4494 ```
4495 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4496 ```
4497 Value (string):
4498 ```
4499 <enabled/> or <disabled/>
4500 ```
4501 OMA-URI:
4502 ```
4503 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4504 ```
4505 Value (string):
4506 ```
4507 <enabled/>
4508 <data id="Permissions" value="1&#xF000;https://example.org"/>
4509 ```
4510 OMA-URI:
4511 ```
4512 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4513 ```
4514 Value (string):
4515 ```
4516 <enabled/>
4517 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4518 ```
4519 OMA-URI:
4520 ```
4521 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4522 ```
4523 Value (string):
4524 ```
4525 <enabled/>
4526 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4527 ```
4528 OMA-URI:
4529 ```
4530 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4531 ```
4532 Value (string):
4533 ```
4534 <enabled/> or <disabled/>
4535 ```
4536 OMA-URI:
4537 ```
4538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4539 ```
4540 Value (string):
4541 ```
4542 <enabled/>
4543 <data id="Permissions" value="1&#xF000;https://example.org"/>
4544 ```
4545 OMA-URI:
4546 ```
4547 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4548 ```
4549 Value (string):
4550 ```
4551 <enabled/>
4552 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4553 ```
4554 OMA-URI:
4555 ```
4556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4557 ```
4558 Value (string):
4559 ```
4560 <enabled/> or <disabled/>
4561 ```
4562 OMA-URI:
4563 ```
4564 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4565 ```
4566 Value (string):
4567 ```
4568 <enabled/> or <disabled/>
4569 ```
4570 #### macOS
4571 ```
4572 <dict>
4573 <key>Permissions</key>
4574 <dict>
4575 <key>Camera</key>
4576 <dict>
4577 <key>Allow</key>
4578 <array>
4579 <string>https://example.org</string>
4580 <string>https://example.org:1234</string>
4581 </array>
4582 <key>Block</key>
4583 <array>
4584 <string>https://example.edu</string>
4585 </array>
4586 <key>BlockNewRequests</key>
4587 <true/> | <false/>
4588 <key>Locked</key>
4589 <true/> | <false/>
4590 </dict>
4591 <key>Microphone</key>
4592 <dict>
4593 <key>Allow</key>
4594 <array>
4595 <string>https://example.org</string>
4596 </array>
4597 <key>Block</key>
4598 <array>
4599 <string>https://example.edu</string>
4600 </array>
4601 <key>BlockNewRequests</key>
4602 <true/> | <false/>
4603 <key>Locked</key>
4604 <true/> | <false/>
4605 </dict>
4606 <key>Location</key>
4607 <dict>
4608 <key>Allow</key>
4609 <array>
4610 <string>https://example.org</string>
4611 </array>
4612 <key>Block</key>
4613 <array>
4614 <string>https://example.edu</string>
4615 </array>
4616 <key>BlockNewRequests</key>
4617 <true/> | <false/>
4618 <key>Locked</key>
4619 <true/> | <false/>
4620 </dict>
4621 <key>Notifications</key>
4622 <dict>
4623 <key>Allow</key>
4624 <array>
4625 <string>https://example.org</string>
4626 </array>
4627 <key>Block</key>
4628 <array>
4629 <string>https://example.edu</string>
4630 </array>
4631 <key>BlockNewRequests</key>
4632 <true/>
4633 <key>Locked</key>
4634 <true/>
4635 </dict>
4636 <key>Autoplay</key>
4637 <dict>
4638 <key>Allow</key>
4639 <array>
4640 <string>https://example.org</string>
4641 </array>
4642 <key>Block</key>
4643 <array>
4644 <string>https://example.edu</string>
4645 </array>
4646 <key>Default</key>
4647 <string>allow-audio-video | block-audio | block-audio-video</string>
4648 <key>Locked</key>
4649 <true/> | <false/>
4650 </dict>
4651 </dict>
4652 </dict>
4653 ```
4654 #### policies.json
4655 ```
4656 {
4657 "policies": {
4658 "Permissions": {
4659 "Camera": {
4660 "Allow": ["https://example.org","https://example.org:1234"],
4661 "Block": ["https://example.edu"],
4662 "BlockNewRequests": true | false,
4663 "Locked": true | false
4664 },
4665 "Microphone": {
4666 "Allow": ["https://example.org"],
4667 "Block": ["https://example.edu"],
4668 "BlockNewRequests": true | false,
4669 "Locked": true | false
4670 },
4671 "Location": {
4672 "Allow": ["https://example.org"],
4673 "Block": ["https://example.edu"],
4674 "BlockNewRequests": true | false,
4675 "Locked": true | false
4676 },
4677 "Notifications": {
4678 "Allow": ["https://example.org"],
4679 "Block": ["https://example.edu"],
4680 "BlockNewRequests": true | false,
4681 "Locked": true | false
4682 },
4683 "Autoplay": {
4684 "Allow": ["https://example.org"],
4685 "Block": ["https://example.edu"],
4686 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4687 "Locked": true | false
4688 }
4689 }
4690 }
4691 }
4692 ```
4693 ### PictureInPicture
4694
4695 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4696
4697 **Compatibility:** Firefox 78, Firefox ESR 78\
4698 **CCK2 Equivalent:** N/A\
4699 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4700
4701 #### Windows (GPO)
4702 ```
4703 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4704 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4705
4706 ```
4707 #### Windows (Intune)
4708 OMA-URI:
4709 ```
4710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4712 ```
4713 Value (string):
4714 ```
4715 <enabled/> or <disabled/>
4716 ```
4717 #### macOS
4718 ```
4719 <dict>
4720 <key>PictureInPicture</key>
4721 <dict>
4722 <key>Enabled</key>
4723 <true/> | <false/>
4724 <key>Locked</key>
4725 <true/> | <false/>
4726 </dict>
4727 </dict>
4728 ```
4729 #### policies.json
4730 ```
4731 {
4732 "policies": {
4733 "PictureInPicture": {
4734 "Enabled": true | false,
4735 "Locked": true | false
4736 }
4737 }
4738 }
4739 ```
4740 ### PopupBlocking
4741 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4742
4743 `Allow` is a list of origins where popup-windows are allowed.
4744
4745 `Default` determines whether or not pop-up windows are allowed by default.
4746
4747 `Locked` prevents the user from changing pop-up preferences.
4748
4749 **Compatibility:** Firefox 60, Firefox ESR 60\
4750 **CCK2 Equivalent:** `permissions.popup`\
4751 **Preferences Affected:** `dom.disable_open_during_load`
4752
4753 #### Windows (GPO)
4754 ```
4755 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4756 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4757 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4758 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4759 ```
4760 #### Windows (Intune)
4761 OMA-URI:
4762 ```
4763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4764 ```
4765 Value (string):
4766 ```
4767 <enabled/>
4768 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4769 ```
4770 OMA-URI:
4771 ```
4772 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4773 ```
4774 Value (string):
4775 ```
4776 <enabled/> or <disabled/>
4777 ```
4778 OMA-URI:
4779 ```
4780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4781 ```
4782 Value (string):
4783 ```
4784 <enabled/> or <disabled/>
4785 ```
4786 #### macOS
4787 ```
4788 <dict>
4789 <key>PopupBlocking</key>
4790 <dict>
4791 <key>Allow</key>
4792 <array>
4793 <string>http://example.org</string>
4794 <string>http://example.edu</string>
4795 </array>
4796 <key>Default</key>
4797 <true/> | <false/>
4798 <key>Locked</key>
4799 <true/> | <false/>
4800 </dict>
4801 </dict>
4802 ```
4803 #### policies.json
4804 ```
4805 {
4806 "policies": {
4807 "PopupBlocking": {
4808 "Allow": ["http://example.org/",
4809 "http://example.edu/"],
4810 "Default": true | false,
4811 "Locked": true | false
4812 }
4813 }
4814 }
4815 ```
4816 ### Preferences
4817 Set and lock preferences.
4818
4819 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section in group policy.
4820
4821 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4822
4823 Preferences that start with the following prefixes are supported:
4824 ```
4825 accessibility.
4826 alerts.* (Firefox 122, Firefox ESR 115.7)
4827 app.update.* (Firefox 86, Firefox ESR 78.8)
4828 browser.
4829 datareporting.policy.
4830 dom.
4831 extensions.
4832 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4833 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4834 geo.
4835 gfx.
4836 intl.
4837 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4838 layers.
4839 layout.
4840 media.
4841 network.
4842 pdfjs. (Firefox 84, Firefox ESR 78.6)
4843 places.
4844 pref.
4845 print.
4846 signon. (Firefox 83, Firefox ESR 78.5)
4847 spellchecker. (Firefox 84, Firefox ESR 78.6)
4848 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4849 ui.
4850 widget.
4851 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4852 xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3)
4853 ```
4854 as well as the following security preferences:
4855
4856 | Preference | Type | Default
4857 | --- | --- | --- |
4858 | security.default_personal_cert | string | Ask Every Time
4859 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4860 | security.disable_button.openCertManager | string | N/A
4861 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4862 | security.disable_button.openDeviceManager | string | N/A
4863 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4864 | security.insecure_connection_text.enabled | bool | false
4865 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4866 | security.insecure_connection_text.pbmode.enabled | bool | false
4867 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4868 | security.mixed_content.block_active_content | boolean | true
4869 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4870 | security.osclientcerts.autoload | boolean | false
4871 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4872 | security.OCSP.enabled | integer | 1
4873 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates.
4874 | security.OCSP.require | boolean | false
4875 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4876 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4877 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12)
4878 | security.ssl.enable_ocsp_stapling | boolean | true
4879 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4880 | security.ssl.errorReporting.enabled | boolean | true
4881 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4882 | security.ssl.require_safe_negotiation | boolean | false
4883 | &nbsp;&nbsp;&nbsp;&nbsp;If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3)
4884 | security.tls.enable_0rtt_data | boolean | true
4885 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15)
4886 | security.tls.hello_downgrade_check | boolean | true
4887 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4888 | security.tls.version.enable-deprecated | boolean | false
4889 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8)
4890 | security.warn_submit_secure_to_insecure | boolean | true
4891 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4892
4893 Using the preference as the key, set the `Value` to the corresponding preference value.
4894
4895 `Status` can be "default", "locked", "user" or "clear"
4896
4897 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4898 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4899 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4900 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4901
4902 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4903
4904 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4905
4906 You can also set the `Type` starting in Firefox 123 and Firefox ESR 115.8. It can be `number`, `boolean` or `string`. This is especially useful if you are seeing 0 or 1 values being converted to booleans when set as user preferences.
4907
4908 See the examples below for more detail.
4909
4910 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4911
4912 Status
4913 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4914 **CCK2 Equivalent:** `preferences`\
4915 **Preferences Affected:** Many
4916
4917 #### Windows (GPO)
4918 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4919 ```
4920 {
4921 "accessibility.force_disabled": {
4922 "Value": 1,
4923 "Status": "default",
4924 "Type": "number"
4925
4926 },
4927 "browser.cache.disk.parent_directory": {
4928 "Value": "SOME_NATIVE_PATH",
4929 "Status": "user"
4930 },
4931 "browser.tabs.warnOnClose": {
4932 "Value": false,
4933 "Status": "locked"
4934 }
4935 }
4936 ```
4937 #### Windows (Intune)
4938 OMA-URI:
4939 ```
4940 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4941 ```
4942 Value (string):
4943 ```
4944 <enabled/>
4945 <data id="JSON" value='
4946 {
4947 "accessibility.force_disabled": {
4948 "Value": 1,
4949 "Status": "default",
4950 "Type": "number"
4951 },
4952 "browser.cache.disk.parent_directory": {
4953 "Value": "SOME_NATIVE_PATH",
4954 "Status": "user"
4955 },
4956 "browser.tabs.warnOnClose": {
4957 "Value": false,
4958 "Status": "locked"
4959 }
4960 }'/>
4961 ```
4962 #### macOS
4963 ```
4964 <dict>
4965 <key>Preferences</key>
4966 <dict>
4967 <key>accessibility.force_disabled</key>
4968 <dict>
4969 <key>Value</key>
4970 <integer>1</integer>
4971 <key>Status</key>
4972 <string>default</string>
4973 <key>Type</key>
4974 <string>number</string>
4975 </dict>
4976 <key>browser.cache.disk.parent_directory</key>
4977 <dict>
4978 <key>Value</key>
4979 <string>SOME_NATIVE_PATH</string>
4980 <key>Status</key>
4981 <string>user</string>
4982 </dict>
4983 <key>browser.tabs.warnOnClose</key>
4984 <dict>
4985 <key>Value</key>
4986 <false/>
4987 <key>Status</key>
4988 <string>locked</string>
4989 </dict>
4990 </dict>
4991 </dict>
4992 ```
4993 #### policies.json
4994 ```
4995 {
4996 "policies": {
4997 "Preferences": {
4998 "accessibility.force_disabled": {
4999 "Value": 1,
5000 "Status": "default"
5001 "Type": "number"
5002 },
5003 "browser.cache.disk.parent_directory": {
5004 "Value": "SOME_NATIVE_PATH",
5005 "Status": "user"
5006 },
5007 "browser.tabs.warnOnClose": {
5008 "Value": false,
5009 "Status": "locked"
5010 }
5011 }
5012 }
5013 }
5014 ```
5015 ### PrimaryPassword
5016 Require or prevent using a primary (formerly master) password.
5017
5018 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
5019
5020 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
5021
5022 **Compatibility:** Firefox 79, Firefox ESR 78.1\
5023 **CCK2 Equivalent:** `noMasterPassword`\
5024 **Preferences Affected:** N/A
5025
5026 #### Windows (GPO)
5027 ```
5028 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
5029 ```
5030 #### Windows (Intune)
5031 OMA-URI:
5032 ```
5033 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
5034 ```
5035 Value (string):
5036 ```
5037 <enabled/> or <disabled/>
5038 ```
5039 #### macOS
5040 ```
5041 <dict>
5042 <key>PrimaryPassword</key>
5043 <true/> | <false/>
5044 </dict>
5045 ```
5046 #### policies.json
5047 ```
5048 {
5049 "policies": {
5050 "PrimaryPassword": true | false
5051 }
5052 }
5053 ```
5054 ### PrintingEnabled
5055 Enable or disable printing.
5056
5057 **Compatibility:** Firefox 120, Firefox ESR 115.5\
5058 **CCK2 Equivalent:** N/A\
5059 **Preferences Affected:** `print.enabled`
5060
5061 #### Windows (GPO)
5062 ```
5063 Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0
5064 ```
5065 #### Windows (Intune)
5066 OMA-URI:
5067 ```
5068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled
5069 ```
5070 Value (string):
5071 ```
5072 <enabled/> or <disabled/>
5073 ```
5074 #### macOS
5075 ```
5076 <dict>
5077 <key>PrintingEnabled</key>
5078 <true/> | <false/>
5079 </dict>
5080 ```
5081 #### policies.json
5082 ```
5083 {
5084 "policies": {
5085 "PrintingEnabled": true | false
5086 }
5087 }
5088 ```
5089 ### PromptForDownloadLocation
5090 Ask where to save each file before downloading.
5091
5092 **Compatibility:** Firefox 68, Firefox ESR 68\
5093 **CCK2 Equivalent:** N/A\
5094 **Preferences Affected:** `browser.download.useDownloadDir`
5095
5096 #### Windows (GPO)
5097 ```
5098 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
5099 ```
5100 #### Windows (Intune)
5101 OMA-URI:
5102 ```
5103 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
5104 ```
5105 Value (string):
5106 ```
5107 <enabled/> or <disabled/>
5108 ```
5109 #### macOS
5110 ```
5111 <dict>
5112 <key>PromptForDownloadLocation</key>
5113 <true/> | <false/>
5114 </dict>
5115 ```
5116 #### policies.json
5117 ```
5118 {
5119 "policies": {
5120 "PromptForDownloadLocation": true | false
5121 }
5122 }
5123 ```
5124 ### Proxy
5125 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
5126 To specify ports, append them to the hostnames with a colon (:).
5127
5128 Unless you lock this policy, changes the user already has in place will take effect.
5129
5130 `Mode` is the proxy method being used.
5131
5132 `Locked` is whether or not proxy settings can be changed.
5133
5134 `HTTPProxy` is the HTTP proxy server.
5135
5136 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
5137
5138 `SSLProxy` is the SSL proxy server.
5139
5140 `FTPProxy` is the FTP proxy server.
5141
5142 `SOCKSProxy` is the SOCKS proxy server
5143
5144 `SOCKSVersion` is the SOCKS version (4 or 5)
5145
5146 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
5147
5148 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
5149
5150 `AutoLogin` means do not prompt for authentication if password is saved.
5151
5152 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
5153
5154 **Compatibility:** Firefox 60, Firefox ESR 60\
5155 **CCK2 Equivalent:** `networkProxy*`\
5156 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
5157
5158 #### Windows (GPO)
5159 ```
5160 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
5161 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
5162 Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com
5163 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
5164 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
5165 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
5166 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
5167 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
5168 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
5169 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
5170 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
5171 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
5172 ```
5173 #### Windows (Intune)
5174 **Note**
5175 These setttings were moved to a category to make them easier to configure via Intune.
5176
5177 OMA-URI:
5178 ```
5179 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
5180 ```
5181 Value (string):
5182 ```
5183 <enabled/> or <disabled/>
5184 ```
5185 OMA-URI:
5186 ```
5187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
5188 ```
5189 Value (string):
5190 ```
5191 <enabled/>
5192 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5193 ```
5194 OMA-URI:
5195 ```
5196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5197 ```
5198 Value (string):
5199 ```
5200 <enabled/>
5201 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5202 ```
5203 OMA-URI:
5204 ```
5205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5206 ```
5207 Value (string):
5208 ```
5209 <enabled/> or <disabled/>
5210 ```
5211 OMA-URI:
5212 ```
5213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5214 ```
5215 Value (string):
5216 ```
5217 <enabled/>
5218 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5219 ```
5220 OMA-URI:
5221 ```
5222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5223 ```
5224 Value (string):
5225 ```
5226 <enabled/>
5227 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5228 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5229 ```
5230 OMA-URI:
5231 ```
5232 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5233 ```
5234 Value (string):
5235 ```
5236 <enabled/>
5237 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5238 ```
5239 OMA-URI:
5240 ```
5241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5242 ```
5243 Value (string):
5244 ```
5245 <enabled/>
5246 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5247 ```
5248 OMA-URI:
5249 ```
5250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5251 ```
5252 Value (string):
5253 ```
5254 <enabled/> or <disabled/>
5255 ```
5256 OMA-URI:
5257 ```
5258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5259 ```
5260 Value (string):
5261 ```
5262 <enabled/> or <disabled/>
5263 ```
5264 OMA-URI (Old way):
5265 ```
5266 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5267 ```
5268 Value (string):
5269 ```
5270 <enabled/>
5271 <data id="ProxyLocked" value="true | false"/>
5272 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5273 <data id="HTTPProxy" value="httpproxy.example.com"/>
5274 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5275 <data id="SSLProxy" value="sslproxy.example.com"/>
5276 <data id="FTPProxy" value="ftpproxy.example.com"/>
5277 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5278 <data id="SOCKSVersion" value="4 | 5"/>
5279 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5280 <data id="Passthrough" value="<local>"/>
5281 <data id="AutoLogin" value="true | false"/>
5282 <data id="UseProxyForDNS" value="true | false"/>
5283 ```
5284 #### macOS
5285 ```
5286 <dict>
5287 <key>Proxy</key>
5288 <dict>
5289 <key>Mode</key>
5290 <string>none | system | manual | autoDetect | autoConfig</string>
5291 <key>Locked</key>
5292 <true> | </false>
5293 <key>HTTPProxy</key>
5294 <string>https://httpproxy.example.com</string>
5295 <key>UseHTTPProxyForAllProtocols</key>
5296 <true> | </false>
5297 <key>SSLProxy</key>
5298 <string>https://sslproxy.example.com</string>
5299 <key>FTPProxy</key>
5300 <string>https://ftpproxy.example.com</string>
5301 <key>SOCKSProxy</key>
5302 <string>https://socksproxy.example.com</string>
5303 <key>SOCKSVersion</key>
5304 <string>4 | 5</string>
5305 <key>Passthrough</key>
5306 <string>&lt;local>&gt;</string>
5307 <key>AutoConfigURL</key>
5308 <string>URL_TO_AUTOCONFIG</string>
5309 <key>AutoLogin</key>
5310 <true> | </false>
5311 <key>UseProxyForDNS</key>
5312 <true> | </false>
5313 </dict>
5314 </dict>
5315 ```
5316 #### policies.json
5317 ```
5318 {
5319 "policies": {
5320 "Proxy": {
5321 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5322 "Locked": true | false,
5323 "HTTPProxy": "hostname",
5324 "UseHTTPProxyForAllProtocols": true | false,
5325 "SSLProxy": "hostname",
5326 "FTPProxy": "hostname",
5327 "SOCKSProxy": "hostname",
5328 "SOCKSVersion": 4 | 5,
5329 "Passthrough": "<local>",
5330 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5331 "AutoLogin": true | false,
5332 "UseProxyForDNS": true | false
5333 }
5334 }
5335 }
5336 ```
5337 ### RequestedLocales
5338 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5339
5340 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5341
5342 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5343 **CCK2 Equivalent:** N/A\
5344 **Preferences Affected:** N/A
5345 #### Windows (GPO)
5346 ```
5347 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5348 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5349
5350 or
5351
5352 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5353 ```
5354 #### Windows (Intune)
5355 OMA-URI:
5356 ```
5357 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5358 ```
5359 Value (string):
5360 ```
5361 <enabled/>
5362 <data id="Preferences_String" value="de,en-US"/>
5363 ```
5364 #### macOS
5365 ```
5366 <dict>
5367 <key>RequestedLocales</key>
5368 <array>
5369 <string>de</string>
5370 <string>en-US</string>
5371 </array>
5372 </dict>
5373
5374 or
5375
5376 <dict>
5377 <key>RequestedLocales</key>
5378 <string>de,en-US</string>
5379 </dict>
5380
5381 ```
5382 #### policies.json
5383 ```
5384 {
5385 "policies": {
5386 "RequestedLocales": ["de", "en-US"]
5387 }
5388 }
5389
5390 or
5391
5392 {
5393 "policies": {
5394 "RequestedLocales": "de,en-US"
5395 }
5396 }
5397 ```
5398 <a name="SanitizeOnShutdown"></a>
5399
5400 ### SanitizeOnShutdown (Selective)
5401 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5402
5403 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5404
5405 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5406 **CCK2 Equivalent:** N/A\
5407 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5408 #### Windows (GPO)
5409 ```
5410 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5411 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5412 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5413 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5414 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5415 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5416 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5417 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5418 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5419 ```
5420 #### Windows (Intune)
5421 OMA-URI:
5422 ```
5423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5424 ```
5425 Value (string):
5426 ```
5427 <enabled/> or <disabled/>
5428 ```
5429 OMA-URI:
5430 ```
5431 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5432 ```
5433 Value (string):
5434 ```
5435 <enabled/> or <disabled/>
5436 ```
5437 OMA-URI:
5438 ```
5439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5440 ```
5441 Value (string):
5442 ```
5443 <enabled/> or <disabled/>
5444 ```
5445 OMA-URI:
5446 ```
5447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5448 ```
5449 Value (string):
5450 ```
5451 <enabled/> or <disabled/>
5452 ```
5453 OMA-URI:
5454 ```
5455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5456 ```
5457 Value (string):
5458 ```
5459 <enabled/> or <disabled/>
5460 ```
5461 OMA-URI:
5462 ```
5463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5464 ```
5465 Value (string):
5466 ```
5467 <enabled/> or <disabled/>
5468 ```
5469 OMA-URI:
5470 ```
5471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5472 ```
5473 Value (string):
5474 ```
5475 <enabled/> or <disabled/>
5476 ```
5477 OMA-URI:
5478 ```
5479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5480 ```
5481 Value (string):
5482 ```
5483 <enabled/> or <disabled/>
5484 ```
5485 OMA-URI:
5486 ```
5487 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5488 ```
5489 Value (string):
5490 ```
5491 <enabled/> or <disabled/>
5492 ```
5493 #### macOS
5494 ```
5495 <dict>
5496 <key>SanitizeOnShutdown</key>
5497 <dict>
5498 <key>Cache</key>
5499 <true/> | <false/>
5500 <key>Cookies</key>
5501 <true/> | <false/>
5502 <key>Downloads</key>
5503 <true/> | <false/>
5504 <key>FormData</key>
5505 <true/> | <false/>
5506 <key>History</key>
5507 <true/> | <false/>
5508 <key>Sessions</key>
5509 <true/> | <false/>
5510 <key>SiteSettings</key>
5511 <true/> | <false/>
5512 <key>OfflineApps</key>
5513 <true/> | <false/>
5514 <key>Locked</key>
5515 <true/> | <false/>
5516 </dict>
5517 </dict>
5518 ```
5519 #### policies.json
5520 ```
5521 {
5522 "policies": {
5523 "SanitizeOnShutdown": {
5524 "Cache": true | false,
5525 "Cookies": true | false,
5526 "Downloads": true | false,
5527 "FormData": true | false,
5528 "History": true | false,
5529 "Sessions": true | false,
5530 "SiteSettings": true | false,
5531 "OfflineApps": true | false,
5532 "Locked": true | false
5533 }
5534 }
5535 }
5536 ```
5537 ### SanitizeOnShutdown (All)
5538 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5539
5540 **Compatibility:** Firefox 60, Firefox ESR 60\
5541 **CCK2 Equivalent:** N/A\
5542 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5543 #### Windows (GPO)
5544 ```
5545 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5546 ```
5547 #### Windows (Intune)
5548 OMA-URI:
5549 ```
5550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5551 ```
5552 Value (string):
5553 ```
5554 <enabled/> or <disabled/>
5555 ```
5556 #### macOS
5557 ```
5558 <dict>
5559 <key>SanitizeOnShutdown</key>
5560 <true/> | <false/>
5561 </dict>
5562 ```
5563 #### policies.json
5564 ```
5565 {
5566 "policies": {
5567 "SanitizeOnShutdown": true | false
5568 }
5569 }
5570 ```
5571 ### SearchBar
5572 Set whether or not search bar is displayed.
5573
5574 **Compatibility:** Firefox 60, Firefox ESR 60\
5575 **CCK2 Equivalent:** `showSearchBar`\
5576 **Preferences Affected:** N/A
5577
5578 #### Windows (GPO)
5579 ```
5580 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5581 ```
5582
5583 #### Windows (Intune)
5584 OMA-URI:
5585 ```
5586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5587 ```
5588 Value (string):
5589 ```
5590 <enabled/>
5591 <data id="SearchBar" value="unified | separate"/>
5592 ```
5593 #### macOS
5594 ```
5595 <dict>
5596 <key>SearchBar</key>
5597 <string>unified | separate</string>
5598 </dict>
5599 ```
5600 #### policies.json
5601 ```
5602 {
5603 "policies": {
5604 "SearchBar": "unified" | "separate"
5605 }
5606 }
5607 ```
5608 <a name="SearchEngines"></a>
5609
5610 ### SearchEngines (This policy is only available on the ESR.)
5611
5612 ### SearchEngines | Add
5613
5614 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5615
5616 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5617
5618 `Name` is the name of the search engine.
5619
5620 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5621
5622 `Method` is either GET or POST
5623
5624 `IconURL` is a URL for the icon to use.
5625
5626 `Alias` is a keyword to use for the engine.
5627
5628 `Description` is a description of the search engine.
5629
5630 `PostData` is the POST data as name value pairs separated by &.
5631
5632 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5633
5634 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5635
5636 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5637 **CCK2 Equivalent:** `searchplugins`\
5638 **Preferences Affected:** N/A
5639
5640 #### Windows (GPO)
5641 ```
5642 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5643 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5644 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5645 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5646 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5647 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5648 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5649 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5650 ```
5651 #### Windows (Intune)
5652 OMA-URI:
5653 ```
5654 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5655 ```
5656 Value (string):
5657 ```
5658 <enabled/>
5659 <data id="SearchEngine_Name" value="Example1"/>
5660 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5661 <data id="SearchEngine_Method" value="GET | POST"/>
5662 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5663 <data id="SearchEngine_Alias" value="example"/>
5664 <data id="SearchEngine_Description" value="Example Description"/>
5665 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5666 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5667 ```
5668 #### macOS
5669 ```
5670 <dict>
5671 <key>SearchEngines</key>
5672 <dict>
5673 <key>Add</key>
5674 <array>
5675 <dict>
5676 <key>Name</key>
5677 <string>Example1</string>
5678 <key>URLTemplate</key>
5679 <string>https://www.example.org/q={searchTerms}</string>
5680 <key>Method</key>
5681 <string>GET | POST </string>
5682 <key>IconURL</key>
5683 <string>https://www.example.org/favicon.ico</string>
5684 <key>Alias</key>
5685 <string>example</string>
5686 <key>Description</key>
5687 <string>Example Description</string>
5688 <key>SuggestURLTemplate</key>
5689 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5690 <key>PostData</key>
5691 <string>name=value&q={searchTerms}</string>
5692 </dict>
5693 <array>
5694 </dict>
5695 </dict>
5696 ```
5697 #### policies.json
5698 ```
5699 {
5700 "policies": {
5701 "SearchEngines": {
5702 "Add": [
5703 {
5704 "Name": "Example1",
5705 "URLTemplate": "https://www.example.org/q={searchTerms}",
5706 "Method": "GET" | "POST",
5707 "IconURL": "https://www.example.org/favicon.ico",
5708 "Alias": "example",
5709 "Description": "Description",
5710 "PostData": "name=value&q={searchTerms}",
5711 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5712 }
5713 ]
5714 }
5715 }
5716 }
5717 ```
5718 ### SearchEngines | Default
5719
5720 Set the default search engine. This policy is only available on the ESR.
5721
5722 **Compatibility:** Firefox ESR 60\
5723 **CCK2 Equivalent:** `defaultSearchEngine`\
5724 **Preferences Affected:** N/A
5725
5726 #### Windows (GPO)
5727 ```
5728 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5729 ```
5730 #### Windows (Intune)
5731 OMA-URI:
5732 ```
5733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5734 ```
5735 Value (string):
5736 ```
5737 <enabled/>
5738 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5739 ```
5740 #### macOS
5741 ```
5742 <dict>
5743 <key>SearchEngines</key>
5744 <dict>
5745 <key>Default</key>
5746 <string>NAME_OF_SEARCH_ENGINE</string>
5747 </dict>
5748 </dict>
5749 ```
5750 #### policies.json
5751 ```
5752 {
5753 "policies": {
5754 "SearchEngines": {
5755 "Default": "NAME_OF_SEARCH_ENGINE"
5756 }
5757 }
5758 }
5759 ```
5760 ### SearchEngines | PreventInstalls
5761
5762 Prevent installing search engines from webpages.
5763
5764 **Compatibility:** Firefox ESR 60\
5765 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5766 **Preferences Affected:** N/A
5767
5768 #### Windows (GPO)
5769 ```
5770 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5771 ```
5772 #### Windows (Intune)
5773 OMA-URI:
5774 ```
5775 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5776 ```
5777 Value (string):
5778 ```
5779 <enabled/> or <disabled/>
5780 ```
5781 #### macOS
5782 ```
5783 <dict>
5784 <key>SearchEngines</key>
5785 <dict>
5786 <key>PreventInstalls</key>
5787 <true/> | <false/>
5788 </dict>
5789 </dict>
5790 ```
5791 #### policies.json
5792 ```
5793 {
5794 "policies": {
5795 "SearchEngines": {
5796 "PreventInstalls": true | false
5797 }
5798 }
5799 }
5800 ```
5801 ### SearchEngines | Remove
5802
5803 Hide built-in search engines. This policy is only available on the ESR.
5804
5805 **Compatibility:** Firefox ESR 60.2\
5806 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5807 **Preferences Affected:** N/A
5808
5809 #### Windows (GPO)
5810 ```
5811 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5812 ```
5813 #### Windows (Intune)
5814 OMA-URI:
5815 ```
5816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5817 ```
5818 Value (string):
5819 ```
5820 <enabled/>
5821 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5822 ```
5823 #### macOS
5824 ```
5825 <dict>
5826 <key>SearchEngines</key>
5827 <dict>
5828 <key>Remove</key>
5829 <array>
5830 <string>NAME_OF_SEARCH_ENGINE</string>
5831 </array>
5832 </dict>
5833 </dict>
5834 ```
5835 #### policies.json
5836 ```
5837 {
5838 "policies": {
5839 "SearchEngines": {
5840 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5841 }
5842 }
5843 }
5844 ```
5845 ### SearchSuggestEnabled
5846
5847 Enable search suggestions.
5848
5849 **Compatibility:** Firefox 68, Firefox ESR 68\
5850 **CCK2 Equivalent:** N/A\
5851 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5852
5853 #### Windows (GPO)
5854 ```
5855 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5856 ```
5857 #### Windows (Intune)
5858 OMA-URI:
5859 ```
5860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5861 ```
5862 Value (string):
5863 ```
5864 <enabled/> or <disabled/>
5865 ```
5866 #### macOS
5867 ```
5868 <dict>
5869 <key>SearchSuggestEnabled</key>
5870 <true/> | <false/>
5871 </dict>
5872 ```
5873 #### policies.json
5874 ```
5875 {
5876 "policies": {
5877 "SearchSuggestEnabled": true | false
5878 }
5879 }
5880 ```
5881 ### SecurityDevices
5882
5883 Add or delete PKCS #11 modules.
5884
5885 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5886 **CCK2 Equivalent:** N/A\
5887 **Preferences Affected:** N/A
5888
5889 #### Windows (GPO)
5890 ```
5891 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5892 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5893 ```
5894 #### Windows (Intune)
5895 OMA-URI:
5896 ```
5897 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5898 ```
5899 Value (string):
5900 ```
5901 <enabled/>
5902 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5903 ```
5904 OMA-URI:
5905 ```
5906 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5907 ```
5908 Value (string):
5909 ```
5910 <enabled/>
5911 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5912 ```
5913 #### macOS
5914 ```
5915 <dict>
5916 <key>SecurityDevices</key>
5917 <dict>
5918 <key>Add<key>
5919 <dict>
5920 <key>NAME_OF_DEVICE_TO_ADD</key>
5921 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5922 </dict>
5923 <key>Delete</add>
5924 <array>
5925 <string>NAME_OF_DEVICE_TO_DELETE</string>
5926 </array>
5927 </dict>
5928 </dict>
5929 ```
5930 #### policies.json
5931 ```
5932 {
5933 "policies": {
5934 "SecurityDevices": {
5935 "Add": {
5936 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5937 },
5938 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5939 }
5940 }
5941 }
5942 ```
5943 ### SecurityDevices (Deprecated)
5944
5945 Install PKCS #11 modules.
5946
5947 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5948 **CCK2 Equivalent:** `certs.devices`\
5949 **Preferences Affected:** N/A
5950
5951 #### Windows (GPO)
5952 ```
5953 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5954 ```
5955 #### Windows (Intune)
5956 OMA-URI:
5957 ```
5958 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5959 ```
5960 Value (string):
5961 ```
5962 <enabled/>
5963 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5964 ```
5965 #### macOS
5966 ```
5967 <dict>
5968 <key>SecurityDevices</key>
5969 <dict>
5970 <key>NAME_OF_DEVICE</key>
5971 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5972 </dict>
5973 </dict>
5974 ```
5975 #### policies.json
5976 ```
5977 {
5978 "policies": {
5979 "SecurityDevices": {
5980 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5981 }
5982 }
5983 }
5984 ```
5985 ### ShowHomeButton
5986 Show the home button on the toolbar.
5987
5988 Future versions of Firefox will not show the home button by default.
5989
5990 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5991 **CCK2 Equivalent:** N/A\
5992 **Preferences Affected:** N/A
5993
5994 #### Windows (GPO)
5995 ```
5996 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5997 ```
5998 #### Windows (Intune)
5999 OMA-URI:
6000 ```
6001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
6002 ```
6003 Value (string):
6004 ```
6005 <enabled/> or <disabled/>
6006 ```
6007 #### macOS
6008 ```
6009 <dict>
6010 <key>ShowHomeButton</key>
6011 <true/> | <false/>
6012 </dict>
6013 ```
6014 #### policies.json
6015 ```
6016 {
6017 "policies": {
6018 "ShowHomeButton": true | false
6019 }
6020 }
6021 ```
6022 ### SSLVersionMax
6023
6024 Set and lock the maximum version of TLS. (Firefox defaults to a maximum of TLS 1.3.)
6025
6026 **Compatibility:** Firefox 66, Firefox ESR 60.6\
6027 **CCK2 Equivalent:** N/A\
6028 **Preferences Affected:** `security.tls.version.max`
6029
6030 #### Windows (GPO)
6031 ```
6032 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6033 ```
6034 #### Windows (Intune)
6035 OMA-URI:
6036 ```
6037 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
6038 ```
6039 Value (string):
6040 ```
6041 <enabled/>
6042 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
6043 ```
6044 #### macOS
6045 ```
6046 <dict>
6047 <key>SSLVersionMax</key>
6048 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
6049 </dict>
6050 ```
6051
6052 #### policies.json
6053 ```
6054 {
6055 "policies": {
6056 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6057 }
6058 }
6059 ```
6060 ### SSLVersionMin
6061
6062 Set and lock the minimum version of TLS. (Firefox defaults to a minimum of TLS 1.2.)
6063
6064 **Compatibility:** Firefox 66, Firefox ESR 60.6\
6065 **CCK2 Equivalent:** N/A\
6066 **Preferences Affected:** `security.tls.version.min`
6067
6068 #### Windows (GPO)
6069 ```
6070 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6071 ```
6072 #### Windows (Intune)
6073 OMA-URI:
6074 ```
6075 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
6076 ```
6077 Value (string):
6078 ```
6079 <enabled/>
6080 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
6081 ```
6082 #### macOS
6083 ```
6084 <dict>
6085 <key>SSLVersionMin</key>
6086 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
6087 </dict>
6088 ```
6089
6090 #### policies.json
6091 ```
6092 {
6093 "policies": {
6094 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6095 }
6096 }
6097 ```
6098 ### SupportMenu
6099 Add a menuitem to the help menu for specifying support information.
6100
6101 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
6102 **CCK2 Equivalent:** helpMenu\
6103 **Preferences Affected:** N/A
6104
6105 #### Windows (GPO)
6106 ```
6107 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
6108 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
6109 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
6110 ```
6111 #### Windows (Intune)
6112 OMA-URI:
6113 ```
6114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
6115 ```
6116 Value (string):
6117 ```
6118 <enabled/>
6119 <data id="SupportMenuTitle" value="Support Menu"/>
6120 <data id="SupportMenuURL" value="http://example.com/support"/>
6121 <data id="SupportMenuAccessKey" value="S"/>
6122 ```
6123 #### macOS
6124 ```
6125 <dict>
6126 <key>SupportMenu</key>
6127 <dict>
6128 <key>Title</key>
6129 <string>SupportMenu</string>
6130 <key>URL</key>
6131 <string>http://example.com/support</string>
6132 <key>AccessKey</key>
6133 <string>S</string>
6134 </dict>
6135 </dict>
6136 ```
6137 #### policies.json
6138 ```
6139 {
6140 "policies": {
6141 "SupportMenu": {
6142 "Title": "Support Menu",
6143 "URL": "http://example.com/support",
6144 "AccessKey": "S"
6145 }
6146 }
6147 }
6148 ```
6149 ### StartDownloadsInTempDirectory
6150 Force downloads to start off in a local, temporary location rather than the default download directory.
6151
6152 **Compatibility:** Firefox 102\
6153 **CCK2 Equivalent:** N/A\
6154 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
6155
6156 #### Windows (GPO)
6157 ```
6158 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
6159 ```
6160 #### Windows (Intune)
6161 OMA-URI:
6162 ```
6163 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
6164 ```
6165 Value (string):
6166 ```
6167 <enabled/> or <disabled/>
6168 ```
6169 #### macOS
6170 ```
6171 <dict>
6172 <key>StartDownloadsInTempDirectory</key>
6173 <true/> | <false/>
6174 </dict>
6175 ```
6176 #### policies.json
6177 ```
6178 {
6179 "policies": {
6180 "StartDownloadsInTempDirectory": true | false
6181 }
6182 ```
6183 ### UserMessaging
6184
6185 Prevent Firefox from messaging the user in certain situations.
6186
6187 `WhatsNew` Remove the "What's New" icon and menuitem.
6188
6189 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
6190
6191 `FeatureRecommendations` If false, don't recommend browser features.
6192
6193 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
6194
6195 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6196
6197 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6198
6199 `Locked` prevents the user from changing user messaging preferences.
6200
6201 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6202 **CCK2 Equivalent:** N/A\
6203 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6204
6205 #### Windows (GPO)
6206 ```
6207 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
6208 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6209 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6210 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6211 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6212 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6213 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6214 ```
6215 #### Windows (Intune)
6216 OMA-URI:
6217 ```
6218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
6219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6221 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6225 ```
6226 Value (string):
6227 ```
6228 <enabled/> or <disabled/>
6229 ```
6230 #### macOS
6231 ```
6232 <dict>
6233 <key>UserMessaging</key>
6234 <dict>
6235 <key>WhatsNew</key>
6236 <true/> | <false/>
6237 <key>ExtensionRecommendations</key>
6238 <true/> | <false/>
6239 <key>FeatureRecommendations</key>
6240 <true/> | <false/>
6241 <key>UrlbarInterventions</key>
6242 <true/> | <false/>
6243 <key>SkipOnboarding</key>
6244 <true/> | <false/>
6245 <key>MoreFromMozilla</key>
6246 <true/> | <false/>
6247 <key>Locked</key>
6248 <true/> | <false/>
6249 </dict>
6250 </dict>
6251 ```
6252 #### policies.json
6253 ```
6254 {
6255 "policies": {
6256 "UserMessaging": {
6257 "WhatsNew": true | false,
6258 "ExtensionRecommendations": true | false,
6259 "FeatureRecommendations": true | false,
6260 "UrlbarInterventions": true | false,
6261 "SkipOnboarding": true | false,
6262 "MoreFromMozilla": true | false,
6263 "Locked": true | false
6264 }
6265 }
6266 }
6267 ```
6268 ### UseSystemPrintDialog
6269 Use the system print dialog instead of the print preview window.
6270
6271 **Compatibility:** Firefox 102\
6272 **CCK2 Equivalent:** N/A\
6273 **Preferences Affected:** `print.prefer_system_dialog`
6274
6275 #### Windows (GPO)
6276 ```
6277 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6278 ```
6279 #### Windows (Intune)
6280 OMA-URI:
6281 ```
6282 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6283 ```
6284 Value (string):
6285 ```
6286 <enabled/> or <disabled/>
6287 ```
6288 #### macOS
6289 ```
6290 <dict>
6291 <key>UseSystemPrintDialog</key>
6292 <true/> | <false/>
6293 </dict>
6294 ```
6295 #### policies.json
6296 ```
6297 {
6298 "policies": {
6299 "UseSystemPrintDialog": true | false
6300 }
6301 }
6302 ```
6303 ### WebsiteFilter
6304 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6305 The arrays are limited to 1000 entries each.
6306
6307 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6308
6309 For specific protocols, use `https://*/*` or `http://*/*`.
6310
6311 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6312
6313 **Compatibility:** Firefox 60, Firefox ESR 60\
6314 **CCK2 Equivalent:** N/A\
6315 **Preferences Affected:** N/A
6316
6317 #### Windows (GPO)
6318 ```
6319 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6320 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6321 ```
6322 #### Windows (Intune)
6323 OMA-URI:
6324 ```
6325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6326 ```
6327 Value (string):
6328 ```
6329 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6330 ```
6331 OMA-URI:
6332 ```
6333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6334 ```
6335 Value (string):
6336 ```
6337 <enabled/>
6338 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6339 ```
6340 #### macOS
6341 ```
6342 <dict>
6343 <key>WebsiteFilter</key>
6344 <dict>
6345 <key>Block</key>
6346 <array>
6347 <string><all_urls></string>
6348 </array>
6349 <key>Exceptions</key>
6350 <array>
6351 <string>http://example.org/*</string>
6352 </array>
6353 </dict>
6354
6355 </dict>
6356 ```
6357 #### policies.json
6358 ```
6359 {
6360 "policies": {
6361 "WebsiteFilter": {
6362 "Block": ["<all_urls>"],
6363 "Exceptions": ["http://example.org/*"]
6364 }
6365 }
6366 }
6367 ```
6368 ### WindowsSSO
6369 Allow Windows single sign-on for Microsoft, work, and school accounts.
6370
6371 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6372
6373 **Compatibility:** Firefox 91\
6374 **CCK2 Equivalent:** N/A\
6375 **Preferences Affected:** `network.http.windows-sso.enabled`
6376
6377 #### Windows (GPO)
6378 ```
6379 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6380 ```
6381 #### Windows (Intune)
6382 OMA-URI:
6383 ```
6384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6385 ```
6386 Value (string):
6387 ```
6388 <enabled/> or <disabled/>
6389 ```
6390 #### policies.json
6391 ```
6392 {
6393 "policies": {
6394 "WindowsSSO": true | false
6395 }
6396 }
6397 ```

patrick-canterino.de