]> git.p6c8.net - policy-templates.git/blob - README.md
e8f1148c07379a2bdaca2135601ad94e9fb3dbd7
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
65 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
66 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
67 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
68 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
69 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
70 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
71 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
72 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
73 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
74 | **[`Preferences`](#preferences)** | Set and lock some preferences.
75 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
76 | **[`Proxy`](#proxy)** | Configure proxy settings.
77 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
78 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
79 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
80 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
81 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
82 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
83 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
84 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
85 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
86 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
87 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
88 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
89 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
90 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
91 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
92 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
93
94 ### AppAutoUpdate
95
96 Enable or disable **automatic** application update.
97
98 If set to true, application updates are installed without user approval.
99
100 If set to false, application updates are downloaded but the user can choose when to install the update.
101
102 If you have disabled updates via DisableAppUpdate, this policy has no effect.
103
104 **Compatibility:** Firefox 75, Firefox ESR 68.7\
105 **CCK2 Equivalent:** N/A\
106 **Preferences Affected:** app.update.auto
107
108 #### Windows (GPO)
109 ```
110 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
111 ```
112 #### Windows (Intune)
113 OMA-URI:
114 ```
115 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
116 ```
117 Value (string):
118 ```
119 <enabled/> or <disabled/>
120 ```
121 #### macOS
122 ```
123 <dict>
124 <key>AppAutoUpdate</key>
125 <true/> | <false/>
126 </dict>
127 ```
128 #### policies.json
129 ```
130 {
131 "policies": {
132 "AppAutoUpdate": true | false
133 }
134 }
135 ```
136 ### AppUpdateURL
137
138 Change the URL for application update.
139
140 **Compatibility:** Firefox 62, Firefox ESR 60.2\
141 **CCK2 Equivalent:** N/A\
142 **Preferences Affected:** `app.update.url`
143
144 #### Windows (GPO)
145 ```
146 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
147 ```
148 #### Windows (Intune)
149 OMA-URI:
150 ```
151 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
152 ```
153 Value (string):
154 ```
155 <enabled/>
156 <data id="AppUpdateURL" value="https://yoursite.com"/>
157 ```
158 #### macOS
159 ```
160 <dict>
161 <key>AppUpdateURL</key>
162 <string>https://yoursite.com</string>
163 </dict>
164 ```
165 #### policies.json
166 ```
167 {
168 "policies": {
169 "AppUpdateURL": "https://yoursite.com"
170 }
171 }
172 ```
173 ### Authentication
174
175 Configure sites that support integrated authentication.
176
177 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
178
179 `PrivateBrowsing` enables integrated authentication in prviate browsing.
180
181 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
182 **CCK2 Equivalent:** N/A\
183 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
184
185 #### Windows (GPO)
186 ```
187 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
194 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
195 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
196 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
199 ```
200 #### Windows (Intune)
201 OMA-URI:
202 ```
203 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
204 ```
205 Value (string):
206 ```
207 <enabled/>
208 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
209 ```
210 OMA-URI:
211 ```
212 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
213 ```
214 Value (string):
215 ```
216 <enabled/>
217 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
218 ```
219 OMA-URI:
220 ```
221 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
222 ```
223 Value (string):
224 ```
225 <enabled/>
226 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
227 ```
228 OMA-URI:
229 ```
230 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
231 ```
232 Value (string):
233 ```
234 <enabled/>
235 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
236 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
237 ```
238 OMA-URI:
239 ```
240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
241 ```
242 Value (string):
243 ```
244 <enabled/> or <disabled/>
245 ```
246 OMA-URI:
247 ```
248 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
249 ```
250 Value (string):
251 ```
252 <enabled/> or <disabled/>
253 ```
254 #### macOS
255 ```
256 <dict>
257 <key>Authentication</key>
258 <dict>
259 <key>SPNEGO</key>
260 <array>
261 <string>mydomain.com</string>
262 <string>https://myotherdomain.com</string>
263 </array>
264 <key>Delegated</key>
265 <array>
266 <string>mydomain.com</string>
267 <string>https://myotherdomain.com</string>
268 </array>
269 <key>NTLM</key>
270 <array>
271 <string>mydomain.com</string>
272 <string>https://myotherdomain.com</string>
273 </array>
274 <key>AllowNonFQDN</key>
275 <dict>
276 <key>SPNEGO</key>
277 <true/> | <false/>
278 <key>NTLM</key>
279 <true/> | <false/>
280 </dict>
281 <key>AllowProxies</key>
282 <dict>
283 <key>SPNEGO</key>
284 <true/> | <false/>
285 <key>NTLM</key>
286 <true/> | <false/>
287 </dict>
288 <key>Locked</key>
289 <true/> | <false/>
290 <key>PrivateBrowsing</key>
291 <true/> | <false/>
292 </dict>
293 </dict>
294 ```
295 #### policies.json
296 ```
297 {
298 "policies": {
299 "Authentication": {
300 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
301 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
302 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
303 "AllowNonFQDN": {
304 "SPNEGO": true | false,
305 "NTLM": true | false
306 },
307 "AllowProxies": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "Locked": true | false,
312 "PrivateBrowsing": true | false
313 }
314 }
315 }
316 ```
317 ### BlockAboutAddons
318
319 Block access to the Add-ons Manager (about:addons).
320
321 **Compatibility:** Firefox 60, Firefox ESR 60\
322 **CCK2 Equivalent:** `disableAddonsManager`\
323 **Preferences Affected:** N/A
324
325 #### Windows (GPO)
326 ```
327 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
328 ```
329 #### Windows (Intune)
330 OMA-URI:
331 ```
332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
333 ```
334 Value (string):
335 ```
336 <enabled/> or <disabled/>
337 ```
338 #### macOS
339 ```
340 <dict>
341 <key>BlockAboutAddons</key>
342 <true/> | <false/>
343 </dict>
344 ```
345 #### policies.json
346 ```
347 {
348 "policies": {
349 "BlockAboutAddons": true | false
350 }
351 }
352 ```
353 ### BlockAboutConfig
354
355 Block access to about:config.
356
357 **Compatibility:** Firefox 60, Firefox ESR 60\
358 **CCK2 Equivalent:** `disableAboutConfig`\
359 **Preferences Affected:** N/A
360
361 #### Windows (GPO)
362 ```
363 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
364 ```
365 #### Windows (Intune)
366 OMA-URI:
367 ```
368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
369 ```
370 Value (string):
371 ```
372 <enabled/> or <disabled/>
373 ```
374 #### macOS
375 ```
376 <dict>
377 <key>BlockAboutConfig</key>
378 <true/> | <false/>
379 </dict>
380 ```
381 #### policies.json
382 ```
383 {
384 "policies": {
385 "BlockAboutConfig": true | false
386 }
387 }
388 ```
389 ### BlockAboutProfiles
390
391 Block access to About Profiles (about:profiles).
392
393 **Compatibility:** Firefox 60, Firefox ESR 60\
394 **CCK2 Equivalent:** `disableAboutProfiles`\
395 **Preferences Affected:** N/A
396
397 #### Windows (GPO)
398 ```
399 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
400 ```
401 #### Windows (Intune)
402 OMA-URI:
403 ```
404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
405 ```
406 Value (string):
407 ```
408 <enabled/> or <disabled/>
409 ```
410 #### macOS
411 ```
412 <dict>
413 <key>BlockAboutProfiles</key>
414 <true/> | <false/>
415 </dict>
416 ```
417 #### policies.json
418 ```
419 {
420 "policies": {
421 "BlockAboutProfiles": true | false
422 }
423 }
424 ```
425 ### BlockAboutSupport
426
427 Block access to Troubleshooting Information (about:support).
428
429 **Compatibility:** Firefox 60, Firefox ESR 60\
430 **CCK2 Equivalent:** `disableAboutSupport`\
431 **Preferences Affected:** N/A
432
433 #### Windows (GPO)
434 ```
435 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
436 ```
437 #### Windows (Intune)
438 OMA-URI:
439 ```
440 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
441 ```
442 Value (string):
443 ```
444 <enabled/> or <disabled/>
445 ```
446 #### macOS
447 ```
448 <dict>
449 <key>BlockAboutSupport</key>
450 <true/> | <false/>
451 </dict>
452 ```
453 #### policies.json
454 ```
455 {
456 "policies": {
457 "BlockAboutSupport": true | false
458 }
459 }
460 ```
461 ### Bookmarks
462
463 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
464
465 **Compatibility:** Firefox 60, Firefox ESR 60\
466 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
467 **Preferences Affected:** N/A
468
469 #### Windows (GPO)
470 ```
471 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
472 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
473 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
476 ```
477 #### Windows (Intune)
478 OMA-URI:
479 ```
480 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
481 ```
482 Value (string):
483 ```
484 <enabled/>
485 <data id="BookmarkTitle" value="Example"/>
486 <data id="BookmarkURL" value="https://example.com"/>
487 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
488 <data id="BookmarkPlacement" value="toolbar | menu"/>
489 <data id="BookmarkFolder" value="FolderName"/>
490 ```
491 #### macOS
492 ```
493 <dict>
494 <key>Bookmarks</key>
495 <array>
496 <dict>
497 <key>Title</key>
498 <string>Example</string>
499 <key>URL</key>
500 <string>https://example.com</string>
501 <key>Favicon</key>
502 <string>https://example.com/favicon.ico</string>
503 <key>Placement</key>
504 <string>toolbar | menu</string>
505 <key>Folder</key>
506 <string>FolderName</string>
507 </dict>
508 </array>
509 </dict>
510 ```
511 #### policies.json
512 ```
513 {
514 "policies": {
515 "Bookmarks": [
516 {
517 "Title": "Example",
518 "URL": "https://example.com",
519 "Favicon": "https://example.com/favicon.ico",
520 "Placement": "toolbar" | "menu",
521 "Folder": "FolderName"
522 }
523 ]
524 }
525 }
526 ```
527 ### CaptivePortal
528 Enable or disable the detection of captive portals.
529
530 **Compatibility:** Firefox 67, Firefox ESR 60.7\
531 **CCK2 Equivalent:** N/A\
532 **Preferences Affected:** `network.captive-portal-service.enabled`
533
534 #### Windows (GPO)
535 ```
536 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
537 ```
538 #### Windows (Intune)
539 OMA-URI:
540 ```
541 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
542 ```
543 Value (string):
544 ```
545 <enabled/> or <disabled/>
546 ```
547 #### macOS
548 ```
549 <dict>
550 <key>CaptivePortal</key>
551 <true/> | <false/>
552 </dict>
553 ```
554 #### policies.json
555 ```
556 {
557 "policies": {
558 "CaptivePortal": true | false
559 }
560 }
561 ```
562 ### Certificates
563
564 ### Certificates | ImportEnterpriseRoots
565
566 Trust certificates that have been added to the operating system certificate store by a user or administrator.
567
568 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
569
570 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
571 **CCK2 Equivalent:** N/A\
572 **Preferences Affected:** `security.enterprise_roots.enabled`
573
574 #### Windows (GPO)
575 ```
576 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
577 ```
578 #### Windows (Intune)
579 OMA-URI:
580 ```
581 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
582 ```
583 Value (string):
584 ```
585 <enabled/> or <disabled/>
586 ```
587 #### macOS
588 ```
589 <dict>
590 <key>Certificates</key>
591 <dict>
592 <key>ImportEnterpriseRoots</key>
593 <true/> | <false/>
594 </dict>
595 </dict>
596 ```
597 #### policies.json
598 ```
599 {
600 "policies": {
601 "Certificates": {
602 "ImportEnterpriseRoots": true | false
603 }
604 }
605 }
606 ```
607 ### Certificates | Install
608
609 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
610
611 - Windows
612 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
613 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
614 - macOS
615 - /Library/Application Support/Mozilla/Certificates
616 - ~/Library/Application Support/Mozilla/Certificates
617 - Linux
618 - /usr/lib/mozilla/certificates
619 - /usr/lib64/mozilla/certificates
620 - ~/.mozilla/certificates
621
622 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
623
624 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
625
626 Certificates are installed using the trust string `CT,CT,`.
627
628 Binary (DER) and ASCII (PEM) certificates are both supported.
629
630 **Compatibility:** Firefox 64, Firefox ESR 64\
631 **CCK2 Equivalent:** `certs.ca`\
632 **Preferences Affected:** N/A
633
634 #### Windows (GPO)
635 ```
636 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
637 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
638 ```
639 #### Windows (Intune)
640 OMA-URI:
641 ```
642 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
643 ```
644 Value (string):
645 ```
646 <enabled/>
647 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
648 ```
649 #### macOS
650 ```
651 <dict>
652 <key>Certificates</key>
653 <dict>
654 <key>Install</key>
655 <array>
656 <string>cert1.der</string>
657 <string>/Users/username/cert2.pem</string>
658 </array>
659 </dict>
660 </dict>
661 ```
662 #### policies.json
663 ```
664 {
665 "policies": {
666 "Certificates": {
667 "Install": ["cert1.der", "/home/username/cert2.pem"]
668 }
669 }
670 }
671 ```
672 ### Cookies
673 Configure cookie preferences.
674
675 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
676
677 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
678
679 `Default` determines whether cookies are accepted at all.
680
681 `AcceptThirdParty` determines how third-party cookies are handled.
682
683 `ExpireAtSessionEnd` determines when cookies expire.
684
685 `RejectTracker` only rejects cookies for trackers.
686
687 `Locked` prevents the user from changing cookie preferences.
688
689 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
690 **CCK2 Equivalent:** N/A\
691 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
692
693 #### Windows (GPO)
694 ```
695 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
696 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
697 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
698 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
699 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
700 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
701 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
702 ```
703 #### Windows (Intune)
704 OMA-URI:
705 ```
706 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
707 ```
708 Value (string):
709 ```
710 <enabled/>
711 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
712 ```
713 OMA-URI:
714 ```
715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
716 ```
717 Value (string):
718 ```
719 <enabled/>
720 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
721 ```
722 OMA-URI:
723 ```
724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
725 ```
726 Value (string):
727 ```
728 <enabled/> or <disabled/>
729 ```
730 OMA-URI:
731 ```
732 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
733 ```
734 Value (string):
735 ```
736 <enabled/>
737 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
738 ```
739 OMA-URI:
740 ```
741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
742 ```
743 Value (string):
744 ```
745 <enabled/> or <disabled/>
746 ```
747 OMA-URI:
748 ```
749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
750 ```
751 Value (string):
752 ```
753 <enabled/> or <disabled/>
754 ```
755 OMA-URI:
756 ```
757 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
758 ```
759 Value (string):
760 ```
761 <enabled/> or <disabled/>
762 ```
763 #### macOS
764 ```
765 <dict>
766 <key>Cookies</key>
767 <dict>
768 <key>Allow</key>
769 <array>
770 <string>http://example.com</string>
771 </array>
772 <key>Block</key>
773 <array>
774 <string>http://example.org</string>
775 </array>
776 <key>Default</key>
777 <true/> | <false/>
778 <key>AcceptThirdParty</key>
779 <string>always | never | from-visited</string>
780 <key>ExpireAtSessionEnd</key>
781 <true/> | <false/>
782 <key>RejectTracker</key>
783 <true/> | <false/>
784 <key>Locked</key>
785 <true/> | <false/>
786 </dict>
787 </dict>
788 ```
789 #### policies.json
790 ```
791 {
792 "policies": {
793 "Cookies": {
794 "Allow": ["http://example.org/"],
795 "Block": ["http://example.edu/"],
796 "Default": true | false,
797 "AcceptThirdParty": "always" | "never" | "from-visited",
798 "ExpireAtSessionEnd": true | false,
799 "RejectTracker": true | false,
800 "Locked": true | false
801 }
802 }
803 }
804 ```
805 ### DisableSetDesktopBackground
806 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
807
808 **Compatibility:** Firefox 60, Firefox ESR 60\
809 **CCK2 Equivalent:** `removeSetDesktopBackground`\
810 **Preferences Affected:** N/A
811
812 #### Windows (GPO)
813 ```
814 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
815 ```
816 #### Windows (Intune)
817 OMA-URI:
818 ```
819 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
820 ```
821 Value (string):
822 ```
823 <enabled/> or <disabled/>
824 ```
825 #### macOS
826 ```
827 <dict>
828 <key>DisableSetDesktopBackground</key>
829 <true/> | <false/>
830 </dict>
831 ```
832 #### policies.json
833 ```
834 {
835 "policies": {
836 "DisableSetDesktopBackground": true | false
837 }
838 }
839 ```
840 ### DisableMasterPasswordCreation
841 Remove the master password functionality.
842
843 **Compatibility:** Firefox 60, Firefox ESR 60\
844 **CCK2 Equivalent:** `noMasterPassword`\
845 **Preferences Affected:** N/A
846
847 #### Windows (GPO)
848 ```
849 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
850 ```
851 #### Windows (Intune)
852 OMA-URI:
853 ```
854 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
855 ```
856 Value (string):
857 ```
858 <enabled/> or <disabled/>
859 ```
860 #### macOS
861 ```
862 <dict>
863 <key>DisableMasterPasswordCreation</key>
864 <true/> | <false/>
865 </dict>
866 ```
867 #### policies.json
868 ```
869 {
870 "policies": {
871 "DisableMasterPasswordCreation": true | false
872 }
873 }
874 ```
875 ### DisableAppUpdate
876 Turn off application updates.
877
878 **Compatibility:** Firefox 60, Firefox ESR 60\
879 **CCK2 Equivalent:** `disableFirefoxUpdates`\
880 **Preferences Affected:** N/A
881
882 #### Windows (GPO)
883 ```
884 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
885 ```
886 #### Windows (Intune)
887 OMA-URI:
888 ```
889 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
890 ```
891 Value (string):
892 ```
893 <enabled/> or <disabled/>
894 ```
895 #### macOS
896 ```
897 <dict>
898 <key>DisableAppUpdate</key>
899 <true/> | <false/>
900 </dict>
901 ```
902 #### policies.json
903 ```
904 {
905 "policies": {
906 "DisableAppUpdate": true | false
907 }
908 }
909 ```
910 ### DisableBuiltinPDFViewer
911 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
912
913 **Compatibility:** Firefox 60, Firefox ESR 60\
914 **CCK2 Equivalent:** `disablePDFjs`\
915 **Preferences Affected:** `pdfjs.disabled`
916
917 #### Windows (GPO)
918 ```
919 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
920 ```
921 #### Windows (Intune)
922 OMA-URI:
923 ```
924 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
925 ```
926 Value (string):
927 ```
928 <enabled/> or <disabled/>
929 ```
930 #### macOS
931 ```
932 <dict>
933 <key>DisableBuiltinPDFViewer</key>
934 <true/> | <false/>
935 </dict>
936 ```
937 #### policies.json
938 ```
939 {
940 "policies": {
941 "DisableBuiltinPDFViewer": true | false
942 }
943 }
944 ```
945 ### DisabledCiphers
946 Disable specific cryptographic ciphers.
947
948 **Compatibility:** Firefox 76, Firefox ESR 68.8\
949 **CCK2 Equivalent:** N/A\
950 **Preferences Affected:** N/A
951
952 #### Windows (GPO)
953 ```
954 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
955 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
956 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
957 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
958 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
959 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
961 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
962 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
963 ```
964 #### Windows (Intune)
965 OMA-URI:
966 ```
967 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
968 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
972 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
976 ```
977 Value (string):
978 ```
979 <enabled/> or <disabled/>
980 ```
981 #### macOS
982 ```
983 <dict>
984 <key>DisabledCiphers</key>
985 <dict>
986 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
987 <true/> | <false/>
988 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
989 <true/> | <false/>
990 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
991 <true/> | <false/>
992 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
993 <true/> | <false/>
994 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
995 <true/> | <false/>
996 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
997 <true/> | <false/>
998 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
999 <true/> | <false/>
1000 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1003 <true/> | <false/>
1004 </dict>
1005 </dict>
1006 ```
1007 #### policies.json
1008 ```
1009 {
1010 "policies": {
1011 "DisabledCiphers" {
1012 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1013 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1014 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1015 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1016 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1017 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1018 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1019 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1020 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1021 }
1022 }
1023 }
1024 ```
1025 ### DisableDefaultBrowserAgent
1026 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1027
1028 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1029 **CCK2 Equivalent:** N/A\
1030 **Preferences Affected:** N/A
1031
1032 #### Windows (GPO)
1033 ```
1034 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1035 ```
1036 #### Windows (Intune)
1037 OMA-URI:
1038 ```
1039 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1040 ```
1041 Value (string):
1042 ```
1043 <enabled/> or <disabled/>
1044 ```
1045 #### policies.json
1046 ```
1047 {
1048 "policies": {
1049 "DisableDefaultBrowserAgent": true | false
1050 }
1051 }
1052 ```
1053 ### DisableDeveloperTools
1054 Remove access to all developer tools.
1055
1056 **Compatibility:** Firefox 60, Firefox ESR 60\
1057 **CCK2 Equivalent:** `removeDeveloperTools`\
1058 **Preferences Affected:** `devtools.policy.disabled`
1059
1060 #### Windows (GPO)
1061 ```
1062 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1063 ```
1064 #### Windows (Intune)
1065 OMA-URI:
1066 ```
1067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1068 ```
1069 Value (string):
1070 ```
1071 <enabled/> or <disabled/>
1072 ```
1073 #### macOS
1074 ```
1075 <dict>
1076 <key>DisableDeveloperTools</key>
1077 <true/> | <false/>
1078 </dict>
1079 ```
1080 #### policies.json
1081 ```
1082 {
1083 "policies": {
1084 "DisableDeveloperTools": true | false
1085 }
1086 }
1087 ```
1088 ### DisableFeedbackCommands
1089 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1090
1091 **Compatibility:** Firefox 60, Firefox ESR 60\
1092 **CCK2 Equivalent:** N/A\
1093 **Preferences Affected:** N/A
1094
1095 #### Windows (GPO)
1096 ```
1097 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1098 ```
1099 #### Windows (Intune)
1100 OMA-URI:
1101 ```
1102 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1103 ```
1104 Value (string):
1105 ```
1106 <enabled/> or <disabled/>
1107 ```
1108 #### macOS
1109 ```
1110 <dict>
1111 <key>DisableFeedbackCommands</key>
1112 <true/> | <false/>
1113 </dict>
1114 ```
1115 #### policies.json
1116 ```
1117 {
1118 "policies": {
1119 "DisableFeedbackCommands": true | false
1120 }
1121 }
1122 ```
1123 ### DisableFirefoxScreenshots
1124 Remove access to Firefox Screenshots.
1125
1126 **Compatibility:** Firefox 60, Firefox ESR 60\
1127 **CCK2 Equivalent:** N/A\
1128 **Preferences Affected:** `extensions.screenshots.disabled`
1129
1130 #### Windows (GPO)
1131 ```
1132 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1133 ```
1134 #### Windows (Intune)
1135 OMA-URI:
1136 ```
1137 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1138 ```
1139 Value (string):
1140 ```
1141 <enabled/> or <disabled/>
1142 ```
1143 #### macOS
1144 ```
1145 <dict>
1146 <key>DisableFirefoxScreenshots</key>
1147 <true/> | <false/>
1148 </dict>
1149 ```
1150 #### policies.json
1151 ```
1152 {
1153 "policies": {
1154 "DisableFirefoxScreenshots": true | false
1155 }
1156 }
1157 ```
1158 ### DisableFirefoxAccounts
1159 Disable Firefox Accounts integration (Sync).
1160
1161 **Compatibility:** Firefox 60, Firefox ESR 60\
1162 **CCK2 Equivalent:** `disableSync`\
1163 **Preferences Affected:** `identity.fxaccounts.enabled`
1164
1165 #### Windows (GPO)
1166 ```
1167 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1168 ```
1169 #### Windows (Intune)
1170 OMA-URI:
1171 ```
1172 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1173 ```
1174 Value (string):
1175 ```
1176 <enabled/> or <disabled/>
1177 ```
1178 #### macOS
1179 ```
1180 <dict>
1181 <key>DisableFirefoxAccounts</key>
1182 <true/> | <false/>
1183 </dict>
1184 ```
1185 #### policies.json
1186 ```
1187 {
1188 "policies": {
1189 "DisableFirefoxAccounts": true | false
1190 }
1191 }
1192 ```
1193 ### DisableFirefoxStudies
1194 Disable Firefox studies (Shield).
1195
1196 **Compatibility:** Firefox 60, Firefox ESR 60\
1197 **CCK2 Equivalent:** N/A\
1198 **Preferences Affected:** N/A
1199
1200 #### Windows (GPO)
1201 ```
1202 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1203 ```
1204 #### Windows (Intune)
1205 OMA-URI:
1206 ```
1207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1208 ```
1209 Value (string):
1210 ```
1211 <enabled/> or <disabled/>
1212 ```
1213 #### macOS
1214 ```
1215 <dict>
1216 <key>DisableFirefoxStudies</key>
1217 <true/> | <false/>
1218 </dict>
1219 ```
1220 #### policies.json
1221 ```
1222 {
1223 "policies": {
1224 "DisableFirefoxStudies": true | false
1225 }
1226 }
1227 ```
1228 ### DisableForgetButton
1229 Disable the "Forget" button.
1230
1231 **Compatibility:** Firefox 60, Firefox ESR 60\
1232 **CCK2 Equivalent:** `disableForget`\
1233 **Preferences Affected:** N/A
1234
1235 #### Windows (GPO)
1236 ```
1237 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1238 ```
1239 #### Windows (Intune)
1240 OMA-URI:
1241 ```
1242 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1243 ```
1244 Value (string):
1245 ```
1246 <enabled/> or <disabled/>
1247 ```
1248 #### macOS
1249 ```
1250 <dict>
1251 <key>DisableForgetButton</key>
1252 <true/> | <false/>
1253 </dict>
1254 ```
1255 #### policies.json
1256 ```
1257 {
1258 "policies": {
1259 "DisableForgetButton": true | false
1260 }
1261 }
1262 ```
1263 ### DisableFormHistory
1264 Turn off saving information on web forms and the search bar.
1265
1266 **Compatibility:** Firefox 60, Firefox ESR 60\
1267 **CCK2 Equivalent:** `disableFormFill`\
1268 **Preferences Affected:** ` browser.formfill.enable`
1269
1270 #### Windows (GPO)
1271 ```
1272 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1273 ```
1274 #### Windows (Intune)
1275 OMA-URI:
1276 ```
1277 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1278 ```
1279 Value (string):
1280 ```
1281 <enabled/> or <disabled/>
1282 ```
1283 #### macOS
1284 ```
1285 <dict>
1286 <key>DisableFormHistory</key>
1287 <true/> | <false/>
1288 </dict>
1289 ```
1290 #### policies.json
1291 ```
1292 {
1293 "policies": {
1294 "DisableFormHistory": true | false
1295 }
1296 }
1297 ```
1298 ### DisablePasswordReveal
1299 Do not allow passwords to be shown in saved logins
1300
1301 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1302 **CCK2 Equivalent:** N/A
1303 **Preferences Affected:** N/A
1304
1305 #### Windows (GPO)
1306 ```
1307 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1308 ```
1309 #### Windows (Intune)
1310 OMA-URI:
1311 ```
1312 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1313 ```
1314 Value (string):
1315 ```
1316 <enabled/> or <disabled/>
1317 ```
1318 #### macOS
1319 ```
1320 <dict>
1321 <key>DisablePasswordReveal</key>
1322 <true/> | <false/>
1323 </dict>
1324 ```
1325 #### policies.json
1326 ```
1327 {
1328 "policies": {
1329 "DisablePasswordReveal": true | false
1330 }
1331 }
1332 ```
1333 ### DisablePocket
1334 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1335
1336 **Compatibility:** Firefox 60, Firefox ESR 60\
1337 **CCK2 Equivalent:** `disablePocket`\
1338 **Preferences Affected:** `extensions.pocket.enabled`
1339
1340 #### Windows (GPO)
1341 ```
1342 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1343 ```
1344 #### Windows (Intune)
1345 OMA-URI:
1346 ```
1347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1348 ```
1349 Value (string):
1350 ```
1351 <enabled/> or <disabled/>
1352 ```
1353 #### macOS
1354 ```
1355 <dict>
1356 <key>DisablePocket</key>
1357 <true/> | <false/>
1358 </dict>
1359 ```
1360 #### policies.json
1361 ```
1362 {
1363 "policies": {
1364 "DisablePocket": true | false
1365 }
1366 }
1367 ```
1368 ### DisablePrivateBrowsing
1369 Remove access to private browsing.
1370
1371 **Compatibility:** Firefox 60, Firefox ESR 60\
1372 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1373 **Preferences Affected:** N/A
1374
1375 #### Windows (GPO)
1376 ```
1377 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1378 ```
1379 #### Windows (Intune)
1380 OMA-URI:
1381 ```
1382 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1383 ```
1384 Value (string):
1385 ```
1386 <enabled/> or <disabled/>
1387 ```
1388 #### macOS
1389 ```
1390 <dict>
1391 <key>DisablePrivateBrowsing</key>
1392 <true/> | <false/>
1393 </dict>
1394 ```
1395 #### policies.json
1396 ```
1397 {
1398 "policies": {
1399 "DisablePrivateBrowsing": true | false
1400 }
1401 }
1402 ```
1403 ### DisableProfileImport
1404 Disables the "Import data from another browser" option in the bookmarks window.
1405
1406 **Compatibility:** Firefox 60, Firefox ESR 60\
1407 **CCK2 Equivalent:** N/A\
1408 **Preferences Affected:** N/A
1409
1410 #### Windows (GPO)
1411 ```
1412 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1413 ```
1414 #### Windows (Intune)
1415 OMA-URI:
1416 ```
1417 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1418 ```
1419 Value (string):
1420 ```
1421 <enabled/> or <disabled/>
1422 ```
1423 #### macOS
1424 ```
1425 <dict>
1426 <key>DisableProfileImport</key>
1427 <true/> | <false/>
1428 </dict>
1429 ```
1430 #### policies.json
1431 ```
1432 {
1433 "policies": {
1434 "DisableProfileImport": true | false
1435 }
1436 }
1437 ```
1438 ### DisableProfileRefresh
1439 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1440
1441 **Compatibility:** Firefox 60, Firefox ESR 60\
1442 **CCK2 Equivalent:** `disableResetFirefox`\
1443 **Preferences Affected:** `browser.disableResetPrompt`
1444
1445 #### Windows (GPO)
1446 ```
1447 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1448 ```
1449 #### Windows (Intune)
1450 OMA-URI:
1451 ```
1452 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1453 ```
1454 Value (string):
1455 ```
1456 <enabled/> or <disabled/>
1457 ```
1458 #### macOS
1459 ```
1460 <dict>
1461 <key>DisableProfileRefresh</key>
1462 <true/> | <false/>
1463 </dict>
1464 ```
1465 #### policies.json
1466 ```
1467 {
1468 "policies": {
1469 "DisableProfileRefresh": true | false
1470 }
1471 }
1472 ```
1473 ### DisableSafeMode
1474 Disable safe mode within the browser.
1475
1476 On Windows, this disables safe mode via the command line as well.
1477
1478 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1479 **CCK2 Equivalent:** `disableSafeMode`\
1480 **Preferences Affected:** N/A
1481
1482 #### Windows (GPO)
1483 ```
1484 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1485 ```
1486 #### Windows (Intune)
1487 OMA-URI:
1488 ```
1489 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1490 ```
1491 Value (string):
1492 ```
1493 <enabled/> or <disabled/>
1494 ```
1495 #### macOS
1496 ```
1497 <dict>
1498 <key>DisableSafeMode</key>
1499 <true/> | <false/>
1500 </dict>
1501 ```
1502 #### policies.json
1503 ```
1504 {
1505 "policies": {
1506 "DisableSafeMode": true | false
1507 }
1508 }
1509 ```
1510 ### DisableSecurityBypass
1511 Prevent the user from bypassing security in certain cases.
1512
1513 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1514
1515 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1516
1517 **Compatibility:** Firefox 60, Firefox ESR 60\
1518 **CCK2 Equivalent:** N/A\
1519 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1520
1521 #### Windows (GPO)
1522 ```
1523 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1524 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1525 ```
1526 #### Windows (Intune)
1527 OMA-URI:
1528 ```
1529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1530 ```
1531 Value (string):
1532 ```
1533 <enabled/> or <disabled/>
1534 ```
1535 OMA-URI:
1536 ```
1537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1538 ```
1539 Value (string):
1540 ```
1541 <enabled/> or <disabled/>
1542 ```
1543
1544 #### macOS
1545 ```
1546 <dict>
1547 <key>DisableSecurityBypass</key>
1548 <dict>
1549 <key>InvalidCertificate</key>
1550 <true/> | <false/>
1551 <key><SafeBrowsing/key>
1552 <true/> | <false/>
1553 </dict>
1554 </dict>
1555 ```
1556 #### policies.json
1557 ```
1558 {
1559 "policies": {
1560 "DisableSecurityBypass": {
1561 "InvalidCertificate": true false,
1562 "SafeBrowsing": true false
1563 }
1564 }
1565 }
1566 ```
1567 ### DisableSystemAddonUpdate
1568 Prevent system add-ons from being installed or update.
1569
1570 **Compatibility:** Firefox 60, Firefox ESR 60\
1571 **CCK2 Equivalent:** N/A\
1572 **Preferences Affected:** N/A
1573
1574 #### Windows (GPO)
1575 ```
1576 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1577 ```
1578 #### Windows (Intune)
1579 OMA-URI:
1580 ```
1581 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1582 ```
1583 Value (string):
1584 ```
1585 <enabled/> or <disabled/>
1586 ```
1587 #### macOS
1588 ```
1589 <dict>
1590 <key>DisableSystemAddonUpdate</key>
1591 <true/> | <false/>
1592 </dict>
1593 ```
1594 #### policies.json
1595 ```
1596 {
1597 "policies": {
1598 "DisableSystemAddonUpdate": true | false
1599 }
1600 }
1601 ```
1602 ### DisableTelemetry
1603 Prevent the upload of telemetry data.
1604
1605 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1606
1607 **Compatibility:** Firefox 60, Firefox ESR 60\
1608 **CCK2 Equivalent:** `disableTelemetry`\
1609 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1610
1611 #### Windows (GPO)
1612 ```
1613 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1614 ```
1615 #### Windows (Intune)
1616 OMA-URI:
1617 ```
1618 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1619 ```
1620 Value (string):
1621 ```
1622 <enabled/> or <disabled/>
1623 ```
1624 #### macOS
1625 ```
1626 <dict>
1627 <key>DisableTelemetry</key>
1628 <true/> | <false/>
1629 </dict>
1630 ```
1631 #### policies.json
1632 ```
1633 {
1634 "policies": {
1635 "DisableTelemetry": true | false
1636 }
1637 }
1638 ```
1639 ### DisplayBookmarksToolbar
1640 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1641
1642 **Compatibility:** Firefox 60, Firefox ESR 60\
1643 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1644 **Preferences Affected:** N/A
1645
1646 #### Windows (GPO)
1647 ```
1648 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1649 ```
1650 #### Windows (Intune)
1651 OMA-URI:
1652 ```
1653 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1654 ```
1655 Value (string):
1656 ```
1657 <enabled/> or <disabled/>
1658 ```
1659 #### macOS
1660 ```
1661 <dict>
1662 <key>DisplayBookmarksToolbar</key>
1663 <true/> | <false/>
1664 </dict>
1665 ```
1666 #### policies.json
1667 ```
1668 {
1669 "policies": {
1670 "DisplayBookmarksToolbar": true | false
1671 }
1672 }
1673 ```
1674 ### DisplayMenuBar (Deprecated)
1675 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1676
1677 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1678 **CCK2 Equivalent:** `displayMenuBar`\
1679 **Preferences Affected:** N/A
1680
1681 #### Windows (GPO)
1682 ```
1683 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1684 ```
1685 #### macOS
1686 ```
1687 <dict>
1688 <key>DisplayMenuBar</key>
1689 <true/> | <false/>
1690 </dict>
1691 ```
1692 #### policies.json
1693 ```
1694 {
1695 "policies": {
1696 "DisplayMenuBar": true | false
1697 }
1698 }
1699 ```
1700 ### DisplayMenuBar
1701 Set the state of the menubar.
1702
1703 `always` means the menubar is shown and cannot be hidden.
1704
1705 `never` means the menubar is hidden and cannot be shown.
1706
1707 `default-on` means the menubar is on by default but can be hidden.
1708
1709 `default-off` means the menubar is off by default but can be shown.
1710
1711 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1712 **CCK2 Equivalent:** `displayMenuBar`\
1713 **Preferences Affected:** N/A
1714
1715 #### Windows (GPO)
1716 ```
1717 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1718 ```
1719 #### Windows (Intune)
1720 OMA-URI:
1721 ```
1722 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1723 ```
1724 Value (string):
1725 ```
1726 <enabled/>
1727 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1728 ```
1729 #### macOS
1730 ```
1731 <dict>
1732 <key>DisplayMenuBar</key>
1733 <string>always | never | default-on | default-off</string>
1734 </dict>
1735 ```
1736 #### policies.json
1737 ```
1738 {
1739 "policies": {
1740 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1741 }
1742 }
1743 ```
1744 ### DNSOverHTTPS
1745 Configure DNS over HTTPS.
1746
1747 `Enabled` determines whether DNS over HTTPS is enabled
1748
1749 `ProviderURL` is a URL to another provider.
1750
1751 `Locked` prevents the user from changing DNS over HTTPS preferences.
1752
1753 `ExcludedDomains` excludes domains from DNS over HTTPS.
1754
1755 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1756 **CCK2 Equivalent:** N/A\
1757 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1758
1759 #### Windows (GPO)
1760 ```
1761 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1762 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1763 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1764 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1765 ```
1766 #### Windows (Intune)
1767 OMA-URI:
1768 ```
1769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1770 ```
1771 Value (string):
1772 ```
1773 <enabled/> or <disabled/>
1774 ```
1775 OMA-URI:
1776 ```
1777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1778 ```
1779 Value (string):
1780 ```
1781 <enabled/>
1782 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1783 ```
1784 OMA-URI:
1785 ```
1786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1787 ```
1788 Value (string):
1789 ```
1790 <enabled/> or <disabled/>
1791 ```
1792 OMA-URI:
1793 ```
1794 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1795 ```
1796 Value (string):
1797 ```
1798 <enabled/>
1799 <data id="List" value="1&#xF000;example.com"/>
1800 ```
1801 #### macOS
1802 ```
1803 <dict>
1804 <key>DNSOverHTTPS</key>
1805 <dict>
1806 <key>Enabled</key>
1807 <true/> | <false/>
1808 <key>ProviderURL</key>
1809 <string>URL_TO_ALTERNATE_PROVIDER</string>
1810 <key>Locked</key>
1811 <true/> | <false/>
1812 <key>ExcludedDomains</key>
1813 <array>
1814 <string>example.com</string>
1815 </array>
1816 </dict>
1817 </dict>
1818 ```
1819 #### policies.json
1820 ```
1821 {
1822 "policies": {
1823 "DNSOverHTTPS": {
1824 "Enabled": true | false,
1825 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1826 "Locked": true | false,
1827 "ExcludedDomains": ["example.com"]
1828 }
1829 }
1830 }
1831 ```
1832 ### DontCheckDefaultBrowser
1833 Don't check if Firefox is the default browser at startup.
1834
1835 **Compatibility:** Firefox 60, Firefox ESR 60\
1836 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1837 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1838
1839 #### Windows (GPO)
1840 ```
1841 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1842 ```
1843 #### Windows (Intune)
1844 OMA-URI:
1845 ```
1846 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1847 ```
1848 Value (string):
1849 ```
1850 <enabled/> or <disabled/>
1851 ```
1852 #### macOS
1853 ```
1854 <dict>
1855 <key>DontCheckDefaultBrowser</key>
1856 <true/> | <false/>
1857 </dict>
1858 ```
1859 #### policies.json
1860 ```
1861 {
1862 "policies": {
1863 "DontCheckDefaultBrowser": true | false
1864 }
1865 }
1866 ```
1867 ### DefaultDownloadDirectory
1868 Set the default download directory.
1869
1870 You can use ${home} for the native home directory.
1871
1872 **Compatibility:** Firefox 68, Firefox ESR 68\
1873 **CCK2 Equivalent:** N/A\
1874 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1875
1876 #### Windows (GPO)
1877 ```
1878 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1879 ```
1880 #### Windows (Intune)
1881 OMA-URI:
1882 ```
1883 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1884 ```
1885 Value (string):
1886 ```
1887 <enabled/>
1888 <data id="Preferences_String" value="${home}\Downloads"/>
1889 ```
1890 #### macOS
1891 ```
1892 <dict>
1893 <key>DefaultDownloadDirectory</key>
1894 <string>${home}/Downloads</string>
1895 </dict>
1896 ```
1897 #### policies.json (macOS and Linux)
1898 ```
1899 {
1900 "policies": {
1901 "DefaultDownloadDirectory": "${home}/Downloads"
1902 }
1903 ```
1904 #### policies.json (Windows)
1905 ```
1906 {
1907 "policies": {
1908 "DefaultDownloadDirectory": "${home}\\Downloads"
1909 }
1910 ```
1911 ### DownloadDirectory
1912 Set and lock the download directory.
1913
1914 You can use ${home} for the native home directory.
1915
1916 **Compatibility:** Firefox 68, Firefox ESR 68\
1917 **CCK2 Equivalent:** N/A\
1918 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1919
1920 #### Windows (GPO)
1921 ```
1922 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1923 ```
1924 #### Windows (Intune)
1925 OMA-URI:
1926 ```
1927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1928 ```
1929 Value (string):
1930 ```
1931 <enabled/>
1932 <data id="Preferences_String" value="${home}\Downloads"/>
1933 ```
1934 #### macOS
1935 ```
1936 <dict>
1937 <key>DownloadDirectory</key>
1938 <string>${home}/Downloads</string>
1939 </dict>
1940 ```
1941 #### policies.json (macOS and Linux)
1942 ```
1943 {
1944 "policies": {
1945 "DownloadDirectory": "${home}/Downloads"
1946 }
1947 ```
1948 #### policies.json (Windows)
1949 ```
1950 {
1951 "policies": {
1952 "DownloadDirectory": "${home}\\Downloads"
1953 }
1954 ```
1955 ### EnableTrackingProtection
1956 Configure tracking protection.
1957
1958 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1959
1960 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1961
1962 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1963
1964 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1965
1966 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1967
1968 `Exceptions` are origins for which tracking protection is not enabled.
1969
1970 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1971 **CCK2 Equivalent:** N/A\
1972 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1973
1974 #### Windows (GPO)
1975 ```
1976 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1977 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1978 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1979 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1980 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1981 ```
1982 #### Windows (Intune)
1983 OMA-URI:
1984 ```
1985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1986 ```
1987 Value (string):
1988 ```
1989 <enabled/>
1990 <data id="TrackingProtectionLocked" value="true | false"/>
1991 <data id="Cryptomining" value="true | false"/>
1992 <data id="Fingerprinting" value="true | false"/>
1993 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1994 ```
1995 #### macOS
1996 ```
1997 <dict>
1998 <key>EnableTrackingProtection</key>
1999 <dict>
2000 <key>Value</key>
2001 <true/> | <false/>
2002 <key><Locked</key>
2003 <true/> | <false/>
2004 <key><Cryptomining</key>
2005 <true/> | <false/>
2006 <key><Fingerprinting</key>
2007 <true/> | <false/>
2008 <key>Exceptions</key>
2009 <array>
2010 <string>https://example.com</string>
2011 </array>
2012 </dict>
2013 </dict>
2014 ```
2015 #### policies.json
2016 ```
2017 {
2018 "policies": {
2019 "EnableTrackingProtection": {
2020 "Value": [true, false],
2021 "Locked": [true, false],
2022 "Cryptomining": [true, false],
2023 "Fingerprinting": [true, false],
2024 "Exceptions": ["https://example.com"]
2025 }
2026 }
2027 ```
2028 ### EncryptedMediaExtensions
2029 Enable or disable Encrypted Media Extensions and optionally lock it.
2030
2031 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2032
2033 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2034
2035 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2036 **CCK2 Equivalent:** N/A\
2037 **Preferences Affected:** `media.eme.enabled`
2038
2039 #### Windows (GPO)
2040 ```
2041 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2042 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2043 ```
2044 #### Windows (Intune)
2045 OMA-URI:
2046 ```
2047 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2048 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2049 ```
2050 Value (string):
2051 ```
2052 <enabled/>or <disabled/>
2053 ```
2054 #### macOS
2055 ```
2056 <dict>
2057 <key>EncryptedMediaExtensions</key>
2058 <dict>
2059 <key>Enabled</key>
2060 <true/> | <false/>
2061 <key><Locked</key>
2062 <true/> | <false/>
2063 </dict>
2064 </dict>
2065 ```
2066 #### policies.json
2067 ```
2068 {
2069 "policies": {
2070 "EncryptedMediaExtensions": {
2071 "Enabled": [true, false],
2072 "Locked": [true, false]
2073 }
2074 }
2075 ```
2076 ### EnterprisePoliciesEnabled
2077 Enable policy support on macOS.
2078
2079 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2080 **CCK2 Equivalent:** N/A\
2081 **Preferences Affected:** N/A
2082
2083 #### macOS
2084 ```
2085 <dict>
2086 <key>EnterprisePoliciesEnabled</key>
2087 <true/>
2088 </dict>
2089 ```
2090 ### Extensions
2091 Control the installation, uninstallation and locking of extensions.
2092
2093 `Install` is a list of URLs or native paths for extensions to be installed.
2094
2095 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2096
2097 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2098
2099 **Compatibility:** Firefox 60, Firefox ESR 60\
2100 **CCK2 Equivalent:** `addons`\
2101 **Preferences Affected:** N/A
2102
2103 #### Windows (GPO)
2104 ```
2105 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2106 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2107 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2108 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2109 ```
2110 #### macOS
2111 ```
2112 <dict>
2113 <key>Extensions</key>
2114 <dict>
2115 <key>Install</key>
2116 <array>
2117 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2118 <string>//path/to/xpi</string>
2119 </array>
2120 <key>Uninstall</key>
2121 <array>
2122 <string>bad_addon_id@mozilla.org</string>
2123 </array>
2124 <key>Locked</key>
2125 <array>
2126 <string>addon_id@mozilla.org</string>
2127 </array>
2128 </dict>
2129 </dict>
2130 ```
2131 #### policies.json
2132 ```
2133 {
2134 "policies": {
2135 "Extensions": {
2136 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2137 "Uninstall": ["bad_addon_id@mozilla.org"],
2138 "Locked": ["addon_id@mozilla.org"]
2139 }
2140 }
2141 }
2142 ```
2143 ### ExtensionSettings
2144 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2145
2146 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2147
2148 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2149
2150 The configuration for each extension is another dictionary that can contain the fields documented below.
2151
2152 | Name | Description |
2153 | --- | --- |
2154 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2155 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2156 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2157 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2158 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2159 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2160 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2161 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2162 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2163
2164 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2165 **CCK2 Equivalent:** N/A\
2166 **Preferences Affected:** N/A
2167
2168 #### Windows (GPO)
2169 ```
2170 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2171 {
2172 "*": {
2173 "blocked_install_message": "Custom error message.",
2174 "install_sources": ["https://addons.mozilla.org/"],
2175 "installation_mode": "blocked",
2176 "allowed_types": ["extension"]
2177 },
2178 "uBlock0@raymondhill.net": {
2179 "installation_mode": "force_installed",
2180 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2181 }
2182 }
2183 ```
2184 #### Windows (Intune)
2185 OMA-URI:
2186 ```
2187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2188 ```
2189 Value (string):
2190 ```
2191 <enabled/>
2192 <data id="ExtensionSettings" value='
2193 "*": {
2194 "blocked_install_message": "Custom error message.",
2195 "install_sources": ["https://addons.mozilla.org/"],
2196 "installation_mode": "blocked",
2197 "allowed_types": ["extension"]
2198 },
2199 "uBlock0@raymondhill.net": {
2200 "installation_mode": "force_installed",
2201 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2202 }'/>
2203 ```
2204 #### macOS
2205 ```
2206 <dict>
2207 <key>ExtensionSettings</key>
2208 <dict>
2209 <key>*</key>
2210 <dict>
2211 <key>blocked_install_message</key>
2212 <string>Custom error message.</string>
2213 <key>install_sources</key>
2214 <array>
2215 <string>https://addons.mozilla.org/</string>
2216 </array>
2217 <key>installation_mode</key>
2218 <string>blocked</string>
2219 <key>allowed_types</key>
2220 <array>
2221 <string>extension</string>
2222 </array>
2223 </dict>
2224 <key>uBlock0@raymondhill.net</key>
2225 <dict>
2226 <key>installation_mode</key>
2227 <string>force_installed</string>
2228 <key>install_url</key>
2229 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2230 </dict>
2231 </dict>
2232 </dict>
2233 ```
2234 #### policies.json
2235 ```
2236 {
2237 "policies": {
2238 "ExtensionSettings": {
2239 "*": {
2240 "blocked_install_message": "Custom error message.",
2241 "install_sources": ["https://addons.mozilla.org/"],
2242 "installation_mode": "blocked",
2243 "allowed_types": ["extension"]
2244 },
2245 "uBlock0@raymondhill.net": {
2246 "installation_mode": "force_installed",
2247 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2248 }
2249 }
2250 }
2251 }
2252 ```
2253 ### ExtensionUpdate
2254 Control extension updates.
2255
2256 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2257 **CCK2 Equivalent:** N/A\
2258 **Preferences Affected:** `extensions.update.enabled`
2259
2260 #### Windows (GPO)
2261 ```
2262 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2263 ```
2264 #### Windows (Intune)
2265 OMA-URI:
2266 ```
2267 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2268 ```
2269 Value (string):
2270 ```
2271 <enabled/> or <disabled/>
2272 ```
2273 #### macOS
2274 ```
2275 <dict>
2276 <key>ExtensionUpdate</key>
2277 <true/> | <false/>
2278 </dict>
2279 ```
2280 #### policies.json
2281 ```
2282 {
2283 "policies": {
2284 "ExtensionUpdate": true | false
2285 }
2286 }
2287 ```
2288 ### FlashPlugin
2289 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2290
2291 `Allow` is a list of origins where Flash are allowed.
2292
2293 `Block` is a list of origins where Flash is not allowed.
2294
2295 `Default` determines whether or not Flash is allowed by default.
2296
2297 `Locked` prevents the user from changing Flash preferences.
2298
2299 **Compatibility:** Firefox 60, Firefox ESR 60\
2300 **CCK2 Equivalent:** `permissions.plugin`\
2301 **Preferences Affected:** `plugin.state.flash`
2302
2303 #### Windows (GPO)
2304 ```
2305 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2306 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2307 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2308 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2309 ```
2310 #### Windows (Intune)
2311 OMA-URI:
2312 ```
2313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2314 ```
2315 Value (string):
2316 ```
2317 <enabled/>
2318 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2319 ```
2320 OMA-URI:
2321 ```
2322 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2323 ```
2324 Value (string):
2325 ```
2326 <enabled/> or <disabled/>
2327 ```
2328 OMA-URI:
2329 ```
2330 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2331 ```
2332 Value (string):
2333 ```
2334 <enabled/> or <disabled/>
2335 ```
2336 #### macOS
2337 ```
2338 <dict>
2339 <key>FlashPlugin</key>
2340 <dict>
2341 <key>Allow</key>
2342 <array>
2343 <string>http://example.org</string>
2344 </array>
2345 <key>Block</key>
2346 <array>
2347 <string>http://example.edu</string>
2348 </array>
2349 <key>Default</key>
2350 <true/> | <false/>
2351 <key>Locked</key>
2352 <true/> | <false/>
2353 </dict>
2354 </dict>
2355 ```
2356 #### policies.json
2357 ```
2358 {
2359 "policies": {
2360 "FlashPlugin": {
2361 "Allow": ["http://example.org/"],
2362 "Block": ["http://example.edu/"],
2363 "Default": true | false,
2364 "Locked": true | false
2365 }
2366 }
2367 }
2368 ```
2369 ### FirefoxHome
2370 Customize the Firefox Home page.
2371
2372 **Compatibility:** Firefox 68, Firefox ESR 68\
2373 **CCK2 Equivalent:** N/A\
2374 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2375
2376 #### Windows (GPO)
2377 ```
2378 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2379 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2380 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2381 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2382 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2383 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2384 ```
2385 #### Windows (Intune)
2386 OMA-URI:
2387 ```
2388 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2389 ```
2390 Value (string):
2391 ```
2392 <enabled/>
2393 <data id="FirefoxHome_Search" value="true | false"/>
2394 <data id="FirefoxHome_TopSites" value="true | false"/>
2395 <data id="FirefoxHome_Highlights" value="true | false"/>
2396 <data id="FirefoxHome_Pocket" value="true | false"/>
2397 <data id="FirefoxHome_Snippets" value="true | false"/>
2398 <data id="FirefoxHome_Locked" value="true | false"/>
2399 ```
2400 #### macOS
2401 ```
2402 <dict>
2403 <key>FirefoxHome</key>
2404 <dict>
2405 <key>Search</key>
2406 <true/> | <false/>
2407 <key>TopSites</key>
2408 <true/> | <false/>
2409 <key>Highlights</key>
2410 <true/> | <false/>
2411 <key>Pocket</key>
2412 <true/> | <false/>
2413 <key>Snippets</key>
2414 <true/> | <false/>
2415 <key>Locked</key>
2416 <true/> | <false/>
2417 </dict>
2418 </dict>
2419 ```
2420 #### policies.json
2421 ```
2422 {
2423 "policies": {
2424 "FirefoxHome": {
2425 "Search": true | false,
2426 "TopSites": true | false,
2427 "Highlights": true | false,
2428 "Pocket": true | false,
2429 "Snippets": true | false,
2430 "Locked": true | false
2431 }
2432 }
2433 }
2434 ```
2435 ### HardwareAcceleration
2436 Control hardware acceleration.
2437
2438 **Compatibility:** Firefox 60, Firefox ESR 60\
2439 **CCK2 Equivalent:** N/A\
2440 **Preferences Affected:** `layers.acceleration.disabled`
2441
2442 #### Windows (GPO)
2443 ```
2444 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2445 ```
2446 #### Windows (Intune)
2447 OMA-URI:
2448 ```
2449 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2450 ```
2451 Value (string):
2452 ```
2453 <enabled/> or <disabled/>
2454 ```
2455 #### macOS
2456 ```
2457 <dict>
2458 <key>HardwareAcceleration</key>
2459 <true/> | <false/>
2460 </dict>
2461 ```
2462 #### policies.json
2463 ```
2464 {
2465 "policies": {
2466 "HardwareAcceleration": true | false
2467 }
2468 }
2469 ```
2470 ### Homepage
2471 Configure the default homepage and how Firefox starts.
2472
2473 `URL` is the default homepage.
2474
2475 `Locked` prevents the user from changing homepage preferences.
2476
2477 `Additional` allows for more than one homepage.
2478
2479 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2480
2481 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2482 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2483 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2484
2485 #### Windows (GPO)
2486 ```
2487 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2488 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2489 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2490 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2491 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2492 ```
2493 #### Windows (Intune)
2494 OMA-URI:
2495 ```
2496 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2497 ```
2498 Value (string):
2499 ```
2500 <enabled/>
2501
2502 <data id="HomepageURL" value="https://example.com"/>
2503 <data id="HomepageLocked" value="true | false"/>
2504 ```
2505 OMA-URI:
2506 ```
2507 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2508 ```
2509 Value (string):
2510 ```
2511 <enabled/>
2512
2513 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2514 ```
2515 OMA-URI:
2516 ```
2517 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2518 ```
2519 Value (string):
2520 ```
2521 <enabled/>
2522
2523 <data id="StartPage" value="none | homepage | previous-session"/>
2524 ```
2525 #### macOS
2526 ```
2527 <dict>
2528 <key>Homepage</key>
2529 <dict>
2530 <key>URL</key>
2531 <string>http://example.com</string>
2532 <key>Locked</key>
2533 <true/> | <false/>
2534 <key>Additional</key>
2535 <array>
2536 <string>http://example.org</string>
2537 <string>http://example.edu</string>
2538 </array>
2539 <key>StartPage</key>
2540 <string>none | homepage | previous-session</string>
2541 </dict>
2542 </dict>
2543 ```
2544 #### policies.json
2545 ```
2546 {
2547 "policies": {
2548 "Homepage": {
2549 "URL": "http://example.com/",
2550 "Locked": true | false,
2551 "Additional": ["http://example.org/",
2552 "http://example.edu/"],
2553 "StartPage": "none" | "homepage" | "previous-session"
2554 }
2555 }
2556 }
2557 ```
2558 ### InstallAddonsPermission
2559 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2560
2561 `Allow` is a list of origins where extension installs are allowed.
2562
2563 `Default` determines whether or not extension installs are allowed by default.
2564
2565 **Compatibility:** Firefox 60, Firefox ESR 60\
2566 **CCK2 Equivalent:** `permissions.install`\
2567 **Preferences Affected:** `xpinstall.enabled`
2568
2569 #### Windows (GPO)
2570 ```
2571 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2572 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2573 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2574 ```
2575 #### Windows (Intune)
2576 OMA-URI:
2577 ```
2578 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2579 ```
2580 Value (string):
2581 ```
2582 <enabled/>
2583 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2584 ```
2585 OMA-URI:
2586 ```
2587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2588 ```
2589 Value (string):
2590 ```
2591 <enabled/>
2592 ```
2593 #### macOS
2594 ```
2595 <dict>
2596 <key>InstallAddonsPermission</key>
2597 <dict>
2598 <key>Allow</key>
2599 <array>
2600 <string>http://example.org</string>
2601 <string>http://example.edu</string>
2602 </array>
2603 <key>Default</key>
2604 <true/> | <false/>
2605 </dict>
2606 </dict>
2607 ```
2608 #### policies.json
2609 ```
2610 {
2611 "policies": {
2612 "InstallAddonsPermission": {
2613 "Allow": ["http://example.org/",
2614 "http://example.edu/"],
2615 "Default": true | false
2616 }
2617 }
2618 }
2619 ```
2620 ### LegacyProfiles
2621 Disable the feature enforcing a separate profile for each installation.
2622
2623 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2624
2625 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2626
2627 This policy only work on Windows via GPO (not policies.json).
2628
2629 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2630 **CCK2 Equivalent:** N/A\
2631 **Preferences Affected:** N/A
2632
2633 #### Windows (GPO)
2634 ```
2635 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2636 ```
2637 #### Windows (Intune)
2638 OMA-URI:
2639 ```
2640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2641 ```
2642 Value (string):
2643 ```
2644 <enabled/> or <disabled/>
2645 ```
2646 ### LocalFileLinks
2647 Enable linking to local files by origin.
2648
2649 **Compatibility:** Firefox 68, Firefox ESR 68\
2650 **CCK2 Equivalent:** N/A\
2651 **Preferences Affected:** `capability.policy.localfilelinks.*`
2652
2653 #### Windows (GPO)
2654 ```
2655 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2656 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2657 ```
2658 #### Windows (Intune)
2659 OMA-URI:
2660 ```
2661 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2662 ```
2663 Value (string):
2664 ```
2665 <enabled/>
2666 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2667 ```
2668 #### macOS
2669 ```
2670 <dict>
2671 <key>LocalFileLinks</key>
2672 <array>
2673 <string>http://example.org</string>
2674 <string>http://example.edu</string>
2675 </array>
2676 </dict>
2677 ```
2678 #### policies.json
2679 ```
2680 {
2681 "policies": {
2682 "LocalFileLinks": ["http://example.org/",
2683 "http://example.edu/"]
2684 }
2685 }
2686 ```
2687 ### NetworkPrediction
2688 Enable or disable network prediction (DNS prefetching).
2689
2690 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2691 **CCK2 Equivalent:** N/A\
2692 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2693
2694 #### Windows (GPO)
2695 ```
2696 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2697 ```
2698 #### Windows (Intune)
2699 OMA-URI:
2700 ```
2701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2702 ```
2703 Value (string):
2704 ```
2705 <enabled/> or <disabled/>
2706 ```
2707 #### macOS
2708 ```
2709 <dict>
2710 <key>NetworkPrediction</key>
2711 <true/> | <false/>
2712 </dict>
2713 ```
2714 #### policies.json
2715 ```
2716 {
2717 "policies": {
2718 "NetworkPrediction": true | false
2719 }
2720 ```
2721 ### NewTabPage
2722 Enable or disable the New Tab page.
2723
2724 **Compatibility:** Firefox 68, Firefox ESR 68\
2725 **CCK2 Equivalent:** N/A\
2726 **Preferences Affected:** `browser.newtabpage.enabled`
2727
2728 #### Windows (GPO)
2729 ```
2730 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2731 ```
2732 #### Windows (Intune)
2733 OMA-URI:
2734 ```
2735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2736 ```
2737 Value (string):
2738 ```
2739 <enabled/> or <disabled/>
2740 ```
2741 #### macOS
2742 ```
2743 <dict>
2744 <key>NewTabPage</key>
2745 <true/> | <false/>
2746 </dict>
2747 ```
2748 #### policies.json
2749 ```
2750 {
2751 "policies": {
2752 "NewTabPage": true | false
2753 }
2754 ```
2755 ### NoDefaultBookmarks
2756 Disable the creation of default bookmarks.
2757
2758 This policy is only effective if the user profile has not been created yet.
2759
2760 **Compatibility:** Firefox 60, Firefox ESR 60\
2761 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2762 **Preferences Affected:** N/A
2763
2764 #### Windows (GPO)
2765 ```
2766 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2767 ```
2768 #### Windows (Intune)
2769 OMA-URI:
2770 ```
2771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2772 ```
2773 Value (string):
2774 ```
2775 <enabled/> or <disabled/>
2776 ```
2777 #### macOS
2778 ```
2779 <dict>
2780 <key>NoDefaultBookmarks</key>
2781 <true/> | <false/>
2782 </dict>
2783 ```
2784 #### policies.json
2785 ```
2786 {
2787 "policies": {
2788 "NoDefaultBookmarks": true | false
2789 }
2790 }
2791 ```
2792 ### OfferToSaveLogins
2793 Control whether or not Firefox offers to save passwords.
2794
2795 **Compatibility:** Firefox 60, Firefox ESR 60\
2796 **CCK2 Equivalent:** `dontRememberPasswords`\
2797 **Preferences Affected:** `signon.rememberSignons`
2798
2799 #### Windows (GPO)
2800 ```
2801 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2802 ```
2803 #### Windows (Intune)
2804 OMA-URI:
2805 ```
2806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2807 ```
2808 Value (string):
2809 ```
2810 <enabled/> or <disabled/>
2811 ```
2812 #### macOS
2813 ```
2814 <dict>
2815 <key>OfferToSaveLogins</key>
2816 <true/> | <false/>
2817 </dict>
2818 ```
2819 #### policies.json
2820 ```
2821 {
2822 "policies": {
2823 "OfferToSaveLogins": true | false
2824 }
2825 }
2826 ```
2827 ### OfferToSaveLoginsDefault
2828 Sets the default value of signon.rememberSignons without locking it.
2829
2830 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2831 **CCK2 Equivalent:** `dontRememberPasswords`\
2832 **Preferences Affected:** `signon.rememberSignons`
2833
2834 #### Windows (GPO)
2835 ```
2836 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2837 ```
2838 #### Windows (Intune)
2839 OMA-URI:
2840 ```
2841 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2842 ```
2843 Value (string):
2844 ```
2845 <enabled/> or <disabled/>
2846 ```
2847 #### macOS
2848 ```
2849 <dict>
2850 <key>OfferToSaveLoginsDefault</key>
2851 <true/> | <false/>
2852 </dict>
2853 ```
2854 #### policies.json
2855 ```
2856 {
2857 "policies": {
2858 "OfferToSaveLoginsDefault": true | false
2859 }
2860 }
2861 ```
2862 ### OverrideFirstRunPage
2863 Override the first run page. If the value is blank, no first run page is displayed.
2864
2865 **Compatibility:** Firefox 60, Firefox ESR 60\
2866 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2867 **Preferences Affected:** `startup.homepage_welcome_url`
2868
2869 #### Windows (GPO)
2870 ```
2871 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2872 ```
2873 #### Windows (Intune)
2874 OMA-URI:
2875 ```
2876 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2877 ```
2878 Value (string):
2879 ```
2880 <enabled/>
2881 <data id="OverridePage" value="https://example.com"/>
2882 ```
2883 #### macOS
2884 ```
2885 <dict>
2886 <key>OverrideFirstRunPage</key>
2887 <string>http://example.org</string>
2888 </dict>
2889 ```
2890 #### policies.json
2891 ```
2892 {
2893 "policies": {
2894 "OverrideFirstRunPage": "http://example.org"
2895 }
2896 ```
2897 ### OverridePostUpdatePage
2898 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2899
2900 **Compatibility:** Firefox 60, Firefox ESR 60\
2901 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2902 **Preferences Affected:** `startup.homepage_override_url`
2903
2904 #### Windows (GPO)
2905 ```
2906 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2907 ```
2908 #### Windows (Intune)
2909 OMA-URI:
2910 ```
2911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2912 ```
2913 Value (string):
2914 ```
2915 <enabled/>
2916 <data id="OverridePage" value="https://example.com"/>
2917 ```
2918 #### macOS
2919 ```
2920 <dict>
2921 <key>OverridePostUpdatePage</key>
2922 <string>http://example.org</string>
2923 </dict>
2924 ```
2925 #### policies.json
2926 ```
2927 {
2928 "policies": {
2929 "OverridePostUpdatePage": "http://example.org"
2930 }
2931 ```
2932 ### PasswordManagerEnabled
2933 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2934
2935 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2936 **CCK2 Equivalent:** N/A\
2937 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2938
2939 #### Windows (GPO)
2940 ```
2941 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2942 ```
2943 #### Windows (Intune)
2944 OMA-URI:
2945 ```
2946 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2947 ```
2948 Value (string):
2949 ```
2950 <enabled/> or <disabled/>
2951 ```
2952 #### macOS
2953 ```
2954 <dict>
2955 <key>PasswordManagerEnabled</key>
2956 <true/> | <false/>
2957 </dict>
2958 ```
2959 #### policies.json
2960 ```
2961 {
2962 "policies": {
2963 "PasswordManagerEnabled": true | false
2964 }
2965 }
2966 ```
2967 ### Permissions
2968 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2969
2970 `Allow` is a list of origins where the feature is allowed.
2971
2972 `Block` is a list of origins where the feature is not allowed.
2973
2974 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2975
2976 `Locked` prevents the user from changing preferences for the feature.
2977
2978 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2979
2980 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2981 **CCK2 Equivalent:** N/A\
2982 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2983
2984 #### Windows (GPO)
2985 ```
2986 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2987 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2988 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2989 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2990 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2991 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2992 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2993 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2994 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2995 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2996 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2997 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2998 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2999 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3000 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3001 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3002 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3003 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3004 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3005 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3006 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3007 ```
3008 #### Windows (Intune)
3009 OMA-URI:
3010 ```
3011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3012 ```
3013 Value (string):
3014 ```
3015 <enabled/> or <disabled/>
3016 ```
3017 OMA-URI:
3018 ```
3019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3020 ```
3021 Value (string):
3022 ```
3023 <enabled/> or <disabled/>
3024 ```
3025 OMA-URI:
3026 ```
3027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3028 ```
3029 Value (string):
3030 ```
3031 <enabled/>
3032 <data id="Permissions" value="1&#xF000;https://example.org"/>
3033 ```
3034 OMA-URI:
3035 ```
3036 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3037 ```
3038 Value (string):
3039 ```
3040 <enabled/> or <disabled/>
3041 ```
3042 OMA-URI:
3043 ```
3044 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3045 ```
3046 Value (string):
3047 ```
3048 <enabled/> or <disabled/>
3049 ```
3050 OMA-URI:
3051 ```
3052 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3053 ```
3054 Value (string):
3055 ```
3056 <enabled/>
3057 <data id="Permissions" value="1&#xF000;https://example.org"/>
3058 ```
3059 OMA-URI:
3060 ```
3061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3062 ```
3063 Value (string):
3064 ```
3065 <enabled/>
3066 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3067 ```
3068 OMA-URI:
3069 ```
3070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3071 ```
3072 Value (string):
3073 ```
3074 <enabled/>
3075 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3076 ```
3077 OMA-URI:
3078 ```
3079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3080 ```
3081 Value (string):
3082 ```
3083 <enabled/> or <disabled/>
3084 ```
3085 #### macOS
3086 ```
3087 <dict>
3088 <key>Permissions</key>
3089 <dict>
3090 <key>Camera</key>
3091 <dict>
3092 <key>Allow</key>
3093 <array>
3094 <string>https://example.org</string>
3095 <string>https://example.org:1234</string>
3096 </array>
3097 <key>Block</key>
3098 <array>
3099 <string>https://example.edu</string>
3100 </array>
3101 <key>BlockNewRequests</key>
3102 <true/> | <false/>
3103 <key>Locked</key>
3104 <true/> | <false/>
3105 </dict>
3106 <key>Microphone</key>
3107 <dict>
3108 <key>Allow</key>
3109 <array>
3110 <string>https://example.org</string>
3111 </array>
3112 <key>Block</key>
3113 <array>
3114 <string>https://example.edu</string>
3115 </array>
3116 <key>BlockNewRequests</key>
3117 <true/> | <false/>
3118 <key>Locked</key>
3119 <true/> | <false/>
3120 </dict>
3121 <key>Location</key>
3122 <dict>
3123 <key>Allow</key>
3124 <array>
3125 <string>https://example.org</string>
3126 </array>
3127 <key>Block</key>
3128 <array>
3129 <string>https://example.edu</string>
3130 </array>
3131 <key>BlockNewRequests</key>
3132 <true/> | <false/>
3133 <key>Locked</key>
3134 <true/> | <false/>
3135 </dict>
3136 <key>Notifications</key>
3137 <dict>
3138 <key>Allow</key>
3139 <array>
3140 <string>https://example.org</string>
3141 </array>
3142 <key>Block</key>
3143 <array>
3144 <string>https://example.edu</string>
3145 </array>
3146 <key>BlockNewRequests</key>
3147 <true/>
3148 <key>Locked</key>
3149 <true/>
3150 </dict>
3151 <key>Autoplay</key>
3152 <dict>
3153 <key>Allow</key>
3154 <array>
3155 <string>https://example.org</string>
3156 </array>
3157 <key>Block</key>
3158 <array>
3159 <string>https://example.edu</string>
3160 </array>
3161 <key>Default</key>
3162 <string>allow-audio-video | block-audio | block-audio-video</string>
3163 <key>Locked</key>
3164 <true/> | <false/>
3165 </dict>
3166 </dict>
3167 </dict>
3168 ```
3169 #### policies.json
3170 ```
3171 {
3172 "policies": {
3173 "Permissions": {
3174 "Camera": {
3175 "Allow": ["https://example.org","https://example.org:1234"],
3176 "Block": ["https://example.edu"],
3177 "BlockNewRequests": true | false,
3178 "Locked": true | false
3179 },
3180 "Microphone": {
3181 "Allow": ["https://example.org"],
3182 "Block": ["https://example.edu"],
3183 "BlockNewRequests": true | false,
3184 "Locked": true | false
3185 },
3186 "Location": {
3187 "Allow": ["https://example.org"],
3188 "Block": ["https://example.edu"],
3189 "BlockNewRequests": true | false,
3190 "Locked": true | false
3191 },
3192 "Notifications": {
3193 "Allow": ["https://example.org"],
3194 "Block": ["https://example.edu"],
3195 "BlockNewRequests": true | false,
3196 "Locked": true | false
3197 },
3198 "Autoplay": {
3199 "Allow": ["https://example.org"],
3200 "Block": ["https://example.edu"],
3201 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3202 "Locked": true | false
3203 }
3204 }
3205 }
3206 }
3207 ```
3208 ### PopupBlocking
3209 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3210
3211 `Allow` is a list of origins where popup-windows are allowed.
3212
3213 `Default` determines whether or not pop-up windows are allowed by default.
3214
3215 `Locked` prevents the user from changing pop-up preferences.
3216
3217 **Compatibility:** Firefox 60, Firefox ESR 60\
3218 **CCK2 Equivalent:** `permissions.popup`\
3219 **Preferences Affected:** `dom.disable_open_during_load`
3220
3221 #### Windows (GPO)
3222 ```
3223 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3224 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3225 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3226 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3227 ```
3228 #### Windows (Intune)
3229 OMA-URI:
3230 ```
3231 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3232 ```
3233 Value (string):
3234 ```
3235 <enabled/>
3236 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3237 ```
3238 OMA-URI:
3239 ```
3240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3241 ```
3242 Value (string):
3243 ```
3244 <enabled/> or <disabled/>
3245 ```
3246 OMA-URI:
3247 ```
3248 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3249 ```
3250 Value (string):
3251 ```
3252 <enabled/> or <disabled/>
3253 ```
3254 #### macOS
3255 ```
3256 <dict>
3257 <key>PopupBlocking</key>
3258 <dict>
3259 <key>Allow</key>
3260 <array>
3261 <string>http://example.org</string>
3262 <string>http://example.edu</string>
3263 </array>
3264 <key>Default</key>
3265 <true/> | <false/>
3266 <key>Locked</key>
3267 <true/> | <false/>
3268 </dict>
3269 </dict>
3270 ```
3271 #### policies.json
3272 ```
3273 {
3274 "policies": {
3275 "PopupBlocking": {
3276 "Allow": ["http://example.org/",
3277 "http://example.edu/"],
3278 "Default": true | false,
3279 "Locked": true | false
3280 }
3281 }
3282 }
3283 ```
3284 ### Preferences
3285 Set and lock certain preferences.
3286
3287 **Compatibility:** See below\
3288 **CCK2 Equivalent:** `preferences`\
3289 **Preferences Affected:** See below
3290
3291 | Preference | Type | Compatibility | Default
3292 | --- | --- | --- | ---
3293 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3294 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3295 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3296 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3297 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3298 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3299 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3300 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3301 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3302 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3303 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3304 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3305 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3306 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3307 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3308 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3309 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3310 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3311 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3312 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3313 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3314 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3315 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3316 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3317 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3318 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3319 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3320 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3321 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3323 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3324 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3325 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3327 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3328 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3329 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3330 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3331 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3332 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3333 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3334 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3335 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3336 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3337 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3338 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3339 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3340 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3341 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3342 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3343 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3344 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3345 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3346 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3347 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3348 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3349 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3350 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3351 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3352 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3353 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3354 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3355 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3356 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3357 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3358 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3359 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3360 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3361 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3362 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3363 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3364 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3365 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3366 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3367 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3368 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3369 disabled
3370 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3371 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3372 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3373 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3374 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3376 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3378 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3379 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3380 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3382 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3383 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3384 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3386 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3387 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3388 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3389 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3390 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3391 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3392 #### Windows (GPO)
3393 ```
3394 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3395 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3396 ```
3397 #### Windows (Intune)
3398 OMA-URI: (periods are replaced by underscores)
3399 ```
3400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3401 ```
3402 Value (string):
3403 ```
3404 <enabled/> or <disabled/>
3405 ```
3406 #### macOS
3407 ```
3408 <dict>
3409 <key>Preferences</key>
3410 <dict>
3411 <key>boolean_preference_name</key>
3412 <true/> | <false/>
3413 <key>string_preference_name</key>
3414 <string>string_value</string>
3415 </dict>
3416 </dict>
3417 ```
3418 #### policies.json
3419 ```
3420 {
3421 "policies": {
3422 "Preferences": {
3423 "boolean_preference_name": true | false,
3424 "string_preference_name": "string_value"
3425 }
3426 }
3427 }
3428 ```
3429 ### PromptForDownloadLocation
3430 Ask where to save each file before downloading.
3431
3432 **Compatibility:** Firefox 68, Firefox ESR 68\
3433 **CCK2 Equivalent:** N/A\
3434 **Preferences Affected:** `browser.download.useDownloadDir`
3435
3436 #### Windows (GPO)
3437 ```
3438 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3439 ```
3440 #### Windows (Intune)
3441 OMA-URI:
3442 ```
3443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3444 ```
3445 Value (string):
3446 ```
3447 <enabled/> or <disabled/>
3448 ```
3449 #### macOS
3450 ```
3451 <dict>
3452 <key>PromptForDownloadLocation</key>
3453 <true/> | <false/>
3454 </dict>
3455 ```
3456 #### policies.json
3457 ```
3458 {
3459 "policies": {
3460 "PromptForDownloadLocation": true | false
3461 }
3462 }
3463 ```
3464 ### Proxy
3465 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3466 To specify ports, append them to the hostnames with a colon (:).
3467
3468 `Mode` is the proxy method being used.
3469
3470 `Locked` is whether or not proxy settings can be changed.
3471
3472 `HTTPProxy` is the HTTP proxy server.
3473
3474 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3475
3476 `SSLProxy` is the SSL proxy server.
3477
3478 `FTPProxy` is the FTP proxy server.
3479
3480 `SOCKSProxy` is the SOCKS proxy server
3481
3482 `SOCKSVersion` is the SOCKS version (4 or 5)
3483
3484 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3485
3486 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3487
3488 `AutoLogin` means do not prompt for authentication if password is saved.
3489
3490 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3491
3492 **Compatibility:** Firefox 60, Firefox ESR 60\
3493 **CCK2 Equivalent:** `networkProxy*`\
3494 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3495
3496 #### Windows (GPO)
3497 ```
3498 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3499 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3500 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3501 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3502 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3503 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3504 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3505 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3506 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3507 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3508 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3509 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3510 ```
3511 #### Windows (Intune)
3512 OMA-URI:
3513 ```
3514 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3515 ```
3516 Value (string):
3517 ```
3518 <enabled/>
3519 <data id="ProxyLocked" value="true | false"/>
3520 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3521 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3522 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3523 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3524 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3525 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3526 <data id="SOCKSVersion" value="4 | 5"/>
3527 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3528 <data id="Passthrough" value="<local>"/>
3529 <data id="AutoLogin" value="true | false"/>
3530 <data id="UseProxyForDNS" value="true | false"/>
3531 ```
3532 #### macOS
3533 ```
3534 <dict>
3535 <key>Proxy</key>
3536 <dict>
3537 <key>Mode</key>
3538 <string>none | system | manual | autoDetect | autoConfig</string>
3539 <key>Locked</key>
3540 <true> | </false>
3541 <key>HTTPProxy</key>
3542 <string>https://httpproxy.example.com</string>
3543 <key>UseHTTPProxyForAllProtocols</key>
3544 <true> | </false>
3545 <key>SSLProxy</key>
3546 <string>https://sslproxy.example.com</string>
3547 <key>FTPProxy</key>
3548 <string>https://ftpproxy.example.com</string>
3549 <key>SOCKSProxy</key>
3550 <string>https://socksproxy.example.com</string>
3551 <key>SOCKSVersion</key>
3552 <string>4 | 5</string>
3553 <key>Passthrough</key>
3554 <string>&lt;local>&gt;</string>
3555 <key>AutoConfigURL</key>
3556 <string>URL_TO_AUTOCONFIG</string>
3557 <key>AutoLogin</key>
3558 <true> | </false>
3559 <key>UseProxyForDNS</key>
3560 <true> | </false>
3561 </dict>
3562 </dict>
3563 ```
3564 #### policies.json
3565 ```
3566 {
3567 "policies": {
3568 "Proxy": {
3569 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3570 "Locked": [true, false],
3571 "HTTPProxy": "hostname",
3572 "UseHTTPProxyForAllProtocols": [true, false],
3573 "SSLProxy": "hostname",
3574 "FTPProxy": "hostname",
3575 "SOCKSProxy": "hostname",
3576 "SOCKSVersion": 4 | 5
3577 "Passthrough": "<local>",
3578 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3579 "AutoLogin": [true, false],
3580 "UseProxyForDNS": [true, false]
3581 }
3582 }
3583 }
3584 ```
3585 ### RequestedLocales
3586 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3587
3588 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3589
3590 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3591 **CCK2 Equivalent:** N/A\
3592 **Preferences Affected:** N/A
3593 #### Windows (GPO)
3594 ```
3595 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3596 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3597
3598 or
3599
3600 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3601 ```
3602 #### Windows (Intune)
3603 OMA-URI:
3604 ```
3605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3606 ```
3607 Value (string):
3608 ```
3609 <enabled/>
3610 <data id="Preferences_String" value="de,en-US"/>
3611 ```
3612 #### macOS
3613 ```
3614 <dict>
3615 <key>RequestedLocales</key>
3616 <array>
3617 <string>de</string>
3618 <string>en-US</string>
3619 </array>
3620 </dict>
3621
3622 or
3623
3624 <dict>
3625 <key>RequestedLocales</key>
3626 <string>de,en-US</string>
3627 </dict>
3628
3629 ```
3630 #### policies.json
3631 ```
3632 {
3633 "policies": {
3634 "RequestedLocales": ["de", "en-US"]
3635 }
3636 }
3637
3638 or
3639
3640 {
3641 "policies": {
3642 "RequestedLocales": "de,en-US"
3643 }
3644 }
3645 ```
3646 <a name="SanitizeOnShutdown"></a>
3647
3648 ### SanitizeOnShutdown (Selective)
3649 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3650
3651 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3652
3653 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3654 **CCK2 Equivalent:** N/A\
3655 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3656 #### Windows (GPO)
3657 ```
3658 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3659 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3660 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3661 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3662 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3663 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3664 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3665 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3666 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3667 ```
3668 #### Windows (Intune)
3669 OMA-URI:
3670 ```
3671 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3672 ```
3673 Value (string):
3674 ```
3675 <enabled/> or <disabled/>
3676 ```
3677 #### macOS
3678 ```
3679 <dict>
3680 <key>SanitizeOnShutdown</key>
3681 <dict>
3682 <key>Cache</key>
3683 <true/> | <false/>
3684 <key>Cookies</key>
3685 <true/> | <false/>
3686 <key>Downloads</key>
3687 <true/> | <false/>
3688 <key>FormData</key>
3689 <true/> | <false/>
3690 <key>History</key>
3691 <true/> | <false/>
3692 <key>Sessions</key>
3693 <true/> | <false/>
3694 <key>SiteSettings</key>
3695 <true/> | <false/>
3696 <key>OfflineApps</key>
3697 <true/> | <false/>
3698 <key>Locked</key>
3699 <true/> | <false/>
3700 </dict>
3701 </dict>
3702 ```
3703 #### policies.json
3704 ```
3705 {
3706 "policies": {
3707 "SanitizeOnShutdown": {
3708 "Cache": true | false,
3709 "Cookies": true | false,
3710 "Downloads": true | false,
3711 "FormData": true | false,
3712 "History": true | false,
3713 "Sessions": true | false,
3714 "SiteSettings": true | false,
3715 "OfflineApps": true | false,
3716 "Locked": true | false
3717 }
3718 }
3719 }
3720 ```
3721 ### SanitizeOnShutdown (All)
3722 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3723
3724 **Compatibility:** Firefox 60, Firefox ESR 60\
3725 **CCK2 Equivalent:** N/A\
3726 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3727 #### Windows (GPO)
3728 ```
3729 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3730 ```
3731 #### Windows (Intune)
3732 OMA-URI:
3733 ```
3734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3735 ```
3736 Value (string):
3737 ```
3738 <enabled/> or <disabled/>
3739 ```
3740 #### macOS
3741 ```
3742 <dict>
3743 <key>SanitizeOnShutdown</key>
3744 <true/> | <false/>
3745 </dict>
3746 ```
3747 #### policies.json
3748 ```
3749 {
3750 "policies": {
3751 "SanitizeOnShutdown": true | false
3752 }
3753 }
3754 ```
3755 ### SearchBar
3756 Set whether or not search bar is displayed.
3757
3758 **Compatibility:** Firefox 60, Firefox ESR 60\
3759 **CCK2 Equivalent:** `showSearchBar`\
3760 **Preferences Affected:** N/A
3761
3762 #### Windows (GPO)
3763 ```
3764 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3765 ```
3766
3767 #### Windows (Intune)
3768 OMA-URI:
3769 ```
3770 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3771 ```
3772 Value (string):
3773 ```
3774 <enabled/>
3775 <data id="Permissions" value="unified | separate"/>
3776 #### macOS
3777 ```
3778 <dict>
3779 <key>SearchBar</key>
3780 <string>unified | separate</string>
3781 </dict>
3782 ```
3783 #### policies.json
3784 ```
3785 {
3786 "policies": {
3787 "SearchBar": "unified" | "separate"
3788 }
3789 }
3790 ```
3791 <a name="SearchEngines"></a>
3792
3793 ### SearchEngines (This policy is only available on the ESR.)
3794
3795 ### SearchEngines | Default
3796
3797 Set the default search engine. This policy is only available on the ESR.
3798
3799 **Compatibility:** Firefox ESR 60\
3800 **CCK2 Equivalent:** `defaultSearchEngine`\
3801 **Preferences Affected:** N/A
3802
3803 #### Windows (GPO)
3804 ```
3805 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3806 ```
3807 #### Windows (Intune)
3808 OMA-URI:
3809 ```
3810 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3811 ```
3812 Value (string):
3813 ```
3814 <enabled/>
3815 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3816 ```
3817 #### macOS
3818 ```
3819 <dict>
3820 <key>SearchEngines</key>
3821 <dict>
3822 <key>Default</key>
3823 <string>NAME_OF_SEARCH_ENGINE</string>
3824 </dict>
3825 </dict>
3826 ```
3827 #### policies.json
3828 ```
3829 {
3830 "policies": {
3831 "SearchEngines": {
3832 "Default": "NAME_OF_SEARCH_ENGINE"
3833 }
3834 }
3835 }
3836 ```
3837 ### SearchEngines | PreventInstalls
3838
3839 Prevent installing search engines from webpages.
3840
3841 **Compatibility:** Firefox ESR 60\
3842 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3843 **Preferences Affected:** N/A
3844
3845 #### Windows (GPO)
3846 ```
3847 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3848 ```
3849 #### Windows (Intune)
3850 OMA-URI:
3851 ```
3852 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3853 ```
3854 Value (string):
3855 ```
3856 <enabled/> or <disabled/>
3857 ```
3858 #### macOS
3859 ```
3860 <dict>
3861 <key>SearchEngines</key>
3862 <dict>
3863 <key>PreventInstalls</key>
3864 <true/> | <false/>
3865 </dict>
3866 </dict>
3867 ```
3868 #### policies.json
3869 ```
3870 {
3871 "policies": {
3872 "SearchEngines": {
3873 "PreventInstalls": true | false
3874 }
3875 }
3876 }
3877 ```
3878 ### SearchEngines | Remove
3879
3880 Hide built-in search engines. This policy is only available on the ESR.
3881
3882 **Compatibility:** Firefox ESR 60.2\
3883 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3884 **Preferences Affected:** N/A
3885
3886 #### Windows (GPO)
3887 ```
3888 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3889 ```
3890 #### Windows (Intune)
3891 OMA-URI:
3892 ```
3893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3894 ```
3895 Value (string):
3896 ```
3897 <enabled/>
3898 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3899 ```
3900 #### macOS
3901 ```
3902 <dict>
3903 <key>SearchEngines</key>
3904 <dict>
3905 <key>Remove</key>
3906 <array>
3907 <string>NAME_OF_SEARCH_ENGINE</string>
3908 </array>
3909 </dict>
3910 </dict>
3911 ```
3912 #### policies.json
3913 ```
3914 {
3915 "policies": {
3916 "SearchEngines": {
3917 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3918 }
3919 }
3920 }
3921 ```
3922 ### SearchEngines | Add
3923
3924 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3925
3926 `Name` is the name of the search engine.
3927
3928 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3929
3930 `Method` is either GET or POST
3931
3932 `IconURL` is a URL for the icon to use.
3933
3934 `Alias` is a keyword to use for the engine.
3935
3936 `Description` is a description of the search engine.
3937
3938 `PostData` is the POST data as name value pairs separated by &.
3939
3940 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3941
3942 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3943 **CCK2 Equivalent:** `searchplugins`\
3944 **Preferences Affected:** N/A
3945
3946 #### Windows (GPO)
3947 ```
3948 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3949 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3950 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3951 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3952 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3953 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3954 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3955 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3956 ```
3957 #### Windows (Intune)
3958 OMA-URI:
3959 ```
3960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
3961 ```
3962 Value (string):
3963 ```
3964 <enabled/>
3965 <data id="SearchEngine_Name" value="Example1"/>
3966 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
3967 <data id="SearchEngine_Method" value="GET | POST"/>
3968 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
3969 <data id="SearchEngine_Alias" value="example"/>
3970 <data id="SearchEngine_Description" value="Example Description"/>
3971 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
3972 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
3973 ```
3974 #### macOS
3975 ```
3976 <dict>
3977 <key>SearchEngines</key>
3978 <dict>
3979 <key>Add</key>
3980 <array>
3981 <dict>
3982 <key>Name</key>
3983 <string>Example1</string>
3984 <key>URLTemplate</key>
3985 <string>https://www.example.org/q={searchTerms}</string>
3986 <key>Method</key>
3987 <string>GET | POST </string>
3988 <key>IconURL</key>
3989 <string>https://www.example.org/favicon.ico</string>
3990 <key>Alias</key>
3991 <string>example</string>
3992 <key>Description</key>
3993 <string>Example Description</string>
3994 <key>SuggestURLTemplate</key>
3995 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3996 <key>PostData</key>
3997 <string>name=value&q={searchTerms}</string>
3998 </dict>
3999 <array>
4000 </dict>
4001 </dict>
4002 ```
4003 #### policies.json
4004 ```
4005 {
4006 "policies": {
4007 "SearchEngines": {
4008 "Add": [
4009 {
4010 "Name": "Example1",
4011 "URLTemplate": "https://www.example.org/q={searchTerms}",
4012 "Method": "GET" | "POST",
4013 "IconURL": "https://www.example.org/favicon.ico",
4014 "Alias": "example",
4015 "Description": "Description",
4016 "PostData": "name=value&q={searchTerms}",
4017 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4018 }
4019 ]
4020 }
4021 }
4022 }
4023 ```
4024 ### SearchSuggestEnabled
4025
4026 Enable search suggestions.
4027
4028 **Compatibility:** Firefox 68, Firefox ESR 68\
4029 **CCK2 Equivalent:** N/A\
4030 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4031
4032 #### Windows (GPO)
4033 ```
4034 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4035 ```
4036 #### Windows (Intune)
4037 OMA-URI:
4038 ```
4039 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4040 ```
4041 Value (string):
4042 ```
4043 <enabled/> or <disabled/>
4044 ```
4045 #### macOS
4046 ```
4047 <dict>
4048 <key>SearchSuggestEnabled</key>
4049 <true/> | <false/>
4050 </dict>
4051 ```
4052 #### policies.json
4053 ```
4054 {
4055 "policies": {
4056 "SearchSuggestEnabled": true | false
4057 }
4058 }
4059 ```
4060 ### SecurityDevices
4061
4062 Install PKCS #11 modules.
4063
4064 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4065 **CCK2 Equivalent:** `certs.devices`\
4066 **Preferences Affected:** N/A
4067
4068 #### Windows (GPO)
4069 ```
4070 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4071 ```
4072 #### Windows (Intune)
4073 OMA-URI:
4074 ```
4075 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4076 ```
4077 Value (string):
4078 ```
4079 <enabled/>
4080 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4081 ```
4082 #### macOS
4083 ```
4084 <dict>
4085 <key>SecurityDevices</key>
4086 <dict>
4087 <key>NAME_OF_DEVICE</key>
4088 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4089 </dict>
4090 </dict>
4091 ```
4092
4093 #### policies.json
4094 ```
4095 {
4096 "policies": {
4097 "SecurityDevices": {
4098 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4099 }
4100 }
4101 }
4102 ```
4103 ### SSLVersionMax
4104
4105 Set and lock the maximum version of TLS.
4106
4107 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4108 **CCK2 Equivalent:** N/A\
4109 **Preferences Affected:** `security.tls.version.max`
4110
4111 #### Windows (GPO)
4112 ```
4113 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4114 ```
4115 #### Windows (Intune)
4116 OMA-URI:
4117 ```
4118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4119 ```
4120 Value (string):
4121 ```
4122 <enabled/>
4123 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4124 ```
4125 #### macOS
4126 ```
4127 <dict>
4128 <key>SSLVersionMax</key>
4129 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4130 </dict>
4131 ```
4132
4133 #### policies.json
4134 ```
4135 {
4136 "policies": {
4137 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4138 }
4139 }
4140 ```
4141 ### SSLVersionMin
4142
4143 Set and lock the minimum version of TLS.
4144
4145 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4146 **CCK2 Equivalent:** N/A\
4147 **Preferences Affected:** `security.tls.version.min`
4148
4149 #### Windows (GPO)
4150 ```
4151 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4152 ```
4153 #### Windows (Intune)
4154 OMA-URI:
4155 ```
4156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4157 ```
4158 Value (string):
4159 ```
4160 <enabled/>
4161 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4162 ```
4163 #### macOS
4164 ```
4165 <dict>
4166 <key>SSLVersionMin</key>
4167 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4168 </dict>
4169 ```
4170
4171 #### policies.json
4172 ```
4173 {
4174 "policies": {
4175 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4176 }
4177 }
4178 ```
4179 ### SupportMenu
4180 Add a menuitem to the help menu for specifying support information.
4181
4182 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4183 **CCK2 Equivalent:** helpMenu\
4184 **Preferences Affected:** N/A
4185
4186 #### Windows (GPO)
4187 ```
4188 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4189 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4190 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4191 ```
4192 #### Windows (Intune)
4193 OMA-URI:
4194 ```
4195 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4196 ```
4197 Value (string):
4198 ```
4199 <enabled/>
4200 <data id="SupportMenuTitle" value="Support Menu"/>
4201 <data id="SupportMenuURL" value="http://example.com/support"/>
4202 <data id="SupportMenuAccessKey" value="S">
4203 ```
4204 #### macOS
4205 ```
4206 <dict>
4207 <key>SupportMenu</key>
4208 <dict>
4209 <key>Title</key>
4210 <string>SupportMenu</string>
4211 <key>URL</key>
4212 <string>http://example.com/support</string>
4213 <key>AccessKey</key>
4214 <string>S</string>
4215 </dict>
4216 </dict>
4217 ```
4218 #### policies.json
4219 ```
4220 {
4221 "policies": {
4222 "SupportMenu": {
4223 "Title": "Support Menu",
4224 "URL": "http://example.com/support",
4225 "AccessKey": "S"
4226 }
4227 }
4228 }
4229 ```
4230 ### UserMessaging
4231
4232 Prevent installing search engines from webpages.
4233
4234 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4235
4236 `ExtensionRecommendations` Don't recommend extensions.
4237
4238 `FeatureRecommendations` Don't recommend browser features.
4239
4240 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4241
4242 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4243 **CCK2 Equivalent:** N/A\
4244 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4245
4246 #### Windows (GPO)
4247 ```
4248 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4249 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4250 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4251 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4252 ```
4253 #### Windows (Intune)
4254 OMA-URI:
4255 ```
4256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4259 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4260 ```
4261 Value (string):
4262 ```
4263 <enabled/> or <disabled/>
4264 ```
4265 #### macOS
4266 ```
4267 <dict>
4268 <key>UserMessaging</key>
4269 <dict>
4270 <key>WhatsNew</key>
4271 <true/> | <false/>
4272 <key>ExtensionRecommendations</key>
4273 <true/> | <false/>
4274 <key>FeatureRecommendations</key>
4275 <true/> | <false/>
4276 <key>UrlbarInterventions</key>
4277 <true/> | <false/>
4278 </dict>
4279 </dict>
4280 ```
4281 #### policies.json
4282 ```
4283 {
4284 "policies": {
4285 "UserMessaging": {
4286 "WhatsNew": true | false,
4287 "ExtensionRecommendations": true | false,
4288 "FeatureRecommendations": true | false,
4289 "UrlbarInterventions": true | false
4290 }
4291 }
4292 }
4293 ```
4294 ### WebsiteFilter
4295 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4296
4297 **Compatibility:** Firefox 60, Firefox ESR 60\
4298 **CCK2 Equivalent:** N/A\
4299 **Preferences Affected:** N/A
4300
4301 #### Windows (GPO)
4302 ```
4303 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4304 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4305 ```
4306 #### Windows (Intune)
4307 OMA-URI:
4308 ```
4309 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4310 ```
4311 Value (string):
4312 ```
4313 <enabled/>
4314 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4315 ```
4316 OMA-URI:
4317 ```
4318 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4319 ```
4320 Value (string):
4321 ```
4322 <enabled/>
4323 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4324 ```
4325 #### macOS
4326 ```
4327 <dict>
4328 <key>WebsiteFilter</key>
4329 <dict>
4330 <key>Block</key>
4331 <array>
4332 <string><all_urls></string>
4333 </array>
4334 <key>Exceptions</key>
4335 <array>
4336 <string>http://example.org/*</string>
4337 </array>
4338 </dict>
4339
4340 </dict>
4341 ```
4342 #### policies.json
4343 ```
4344 {
4345 "policies": {
4346 "WebsiteFilter": {
4347 "Block": ["<all_urls>"],
4348 "Exceptions": ["http://example.org/*"]
4349 }
4350 }
4351 }
4352 ```

patrick-canterino.de