]> git.p6c8.net - policy-templates.git/blob - README.md
Cleanup ExtensionSettings
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar`](#displaymenubar)** | Set the initial state of the menubar.
42 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
43 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
44 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
45 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
46 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
47 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
48 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
49 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
50 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
51 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
52 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
53 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
54 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
55 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
56 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
57 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
58 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
59 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
60 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
61 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
62 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
63 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
64 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
65 | **[`Preferences`](#preferences)** | Set and lock some preferences.
66 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
67 | **[`Proxy`](#proxy)** | Configure proxy settings.
68 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
69 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
70 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
71 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
72 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
73 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
74 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
75 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
76 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
77 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
78 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
79 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
80 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
81 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
82 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
83
84 ### AppUpdateURL
85
86 Change the URL for application update.
87
88 **Compatibility:** Firefox 62, Firefox ESR 60.2\
89 **CCK2 Equivalent:** N/A\
90 **Preferences Affected:** `app.update.url`
91
92 #### Windows
93 ```
94 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
95 ```
96 #### macOS
97 ```
98 <dict>
99 <key>AppUpdateURL</key>
100 <string>https://yoursite.com</string>
101 </dict>
102 ```
103 ### JSON
104 ```
105 {
106 "policies": {
107 "AppUpdateURL": "https://yoursite.com"
108 }
109 }
110 ```
111 ### Authentication
112
113 Configure sites that support integrated authentication.
114
115 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
116
117 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2)\
118 **CCK2 Equivalent:** N/A\
119 **Preferences Affected:** `network.negotiate-auth.trusted-uris`, `network.negotiate-auth.delegation-uris`, `network.automatic-ntlm-auth.trusted-uris`, `network.automatic-ntlm-auth.allow-non-fqdn`, `network.negotiate-auth.allow-non-fqdn`
120
121 #### Windows
122 ```
123 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
124 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
125 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
126 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
127 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
130 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
131 ```
132 #### macOS
133 ```
134 <dict>
135 <key>Authentication</key>
136 <dict>
137 <key>SPNEGO</key>
138 <array>
139 <string>mydomain.com</string>
140 <string>https://myotherdomain.com</string>
141 </array>
142 <key>Delegated</key>
143 <array>
144 <string>mydomain.com</string>
145 <string>https://myotherdomain.com</string>
146 </array>
147 <key>NTLM</key>
148 <array>
149 <string>mydomain.com</string>
150 <string>https://myotherdomain.com</string>
151 </array>
152 <key>AllowNonFQDN</key>
153 <dict>
154 <key>SPNEGO</key>
155 <true/> | <false/>
156 <key>NTLM</key>
157 <true/> | <false/>
158 </dict>
159 </dict>
160 </dict>
161 ```
162 ### JSON
163 ```
164 {
165 "policies": {
166 "Authentication": {
167 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
168 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
169 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
170 "AllowNonFQDN": {
171 "SPNEGO": true | false,
172 "NTLM": true | false
173 }
174 }
175 }
176 }
177 ```
178 ### BlockAboutAddons
179
180 Block access to the Add-ons Manager (about:addons).
181
182 **Compatibility:** Firefox 60, Firefox ESR 60\
183 **CCK2 Equivalent:** `disableAddonsManager`\
184 **Preferences Affected:** N/A
185
186 #### Windows
187 ```
188 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
189 ```
190 #### macOS
191 ```
192 <dict>
193 <key>BlockAboutAddons</key>
194 <true/> | <false/>
195 </dict>
196 ```
197 #### JSON
198 ```
199 {
200 "policies": {
201 "BlockAboutAddons": true | false
202 }
203 }
204 ```
205 ### BlockAboutConfig
206
207 Block access to about:config.
208
209 **Compatibility:** Firefox 60, Firefox ESR 60\
210 **CCK2 Equivalent:** `disableAboutConfig`\
211 **Preferences Affected:** N/A
212
213 #### Windows
214 ```
215 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
216 ```
217 #### macOS
218 ```
219 <dict>
220 <key>BlockAboutConfig</key>
221 <true/> | <false/>
222 </dict>
223 ```
224 #### JSON
225 ```
226 {
227 "policies": {
228 "BlockAboutConfig": true | false
229 }
230 }
231 ```
232 ### BlockAboutProfiles
233
234 Block access to About Profiles (about:profiles).
235
236 **Compatibility:** Firefox 60, Firefox ESR 60\
237 **CCK2 Equivalent:** `disableAboutProfiles`\
238 **Preferences Affected:** N/A
239
240 #### Windows
241 ```
242 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
243 ```
244 #### macOS
245 ```
246 <dict>
247 <key>BlockAboutProfiles</key>
248 <true/> | <false/>
249 </dict>
250 ```
251 #### JSON
252 ```
253 {
254 "policies": {
255 "BlockAboutProfiles": true | false
256 }
257 }
258 ```
259 ### BlockAboutSupport
260
261 Block access to Troubleshooting Information (about:support).
262
263 **Compatibility:** Firefox 60, Firefox ESR 60\
264 **CCK2 Equivalent:** `disableAboutSupport`\
265 **Preferences Affected:** N/A
266
267 #### Windows
268 ```
269 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
270 ```
271 #### macOS
272 ```
273 <dict>
274 <key>BlockAboutSupport</key>
275 <true/> | <false/>
276 </dict>
277 ```
278 #### JSON
279 ```
280 {
281 "policies": {
282 "BlockAboutSupport": true | false
283 }
284 }
285 ```
286 ### Bookmarks
287
288 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
289
290 **Compatibility:** Firefox 60, Firefox ESR 60\
291 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
292 **Preferences Affected:** N/A
293
294 #### Windows
295 ```
296 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
297 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
298 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
299 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
300 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
301 ```
302 #### macOS
303 ```
304 <dict>
305 <key>Bookmarks</key>
306 <array>
307 <dict>
308 <key>Title</key>
309 <string>Example</string>
310 <key>URL</key>
311 <string>https://example.com</string>
312 <key>Favicon</key>
313 <string>https://example.com/favicon.ico</string>
314 <key>Placement</key>
315 <string>toolbar | menu</string>
316 <key>Folder</key>
317 <string>FolderName</string>
318 </dict>
319 </array>
320 </dict>
321 ```
322 ### JSON
323 ```
324 {
325 "policies": {
326 "Bookmarks": [
327 {
328 "Title": "Example",
329 "URL": "https://example.com",
330 "Favicon": "https://example.com/favicon.ico",
331 "Placement": "toolbar" | "menu",
332 "Folder": "FolderName"
333 }
334 ]
335 }
336 }
337 ```
338 ### CaptivePortal
339 Enable or disable the detection of captive portals.
340
341 **Compatibility:** Firefox 67, Firefox ESR 60.7\
342 **CCK2 Equivalent:** N/A\
343 **Preferences Affected:** `network.captive-portal-service.enabled`
344
345 #### Windows
346 ```
347 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
348 ```
349 #### macOS
350 ```
351 <dict>
352 <key>CaptivePortal</key>
353 <true/> | <false/>
354 </dict>
355 ```
356 #### JSON
357 ```
358 {
359 "policies": {
360 "CaptivePortal": true | false
361 }
362 }
363 ```
364 ### Certificates
365
366 ### Certificates | ImportEnterpriseRoots
367
368 Trust certificates that have been added to the operating system certificate store by a user or administrator.
369
370 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
371
372 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
373 **CCK2 Equivalent:** N/A\
374 **Preferences Affected:** `security.enterprise_roots.enabled`
375
376 #### Windows
377 ```
378 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
379 ```
380 #### macOS
381 ```
382 <dict>
383 <key>Certificates</key>
384 <dict>
385 <key>ImportEnterpriseRoots</key>
386 <true/> | <false/>
387 </dict>
388 </dict>
389 ```
390 #### JSON
391 ```
392 {
393 "policies": {
394 "Certificates": {
395 "ImportEnterpriseRoots": true | false
396 }
397 }
398 }
399 ```
400 ### Certificates | Install
401
402 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
403
404 - Windows
405 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
406 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
407 - macOS
408 - /Library/Application Support/Mozilla/Certificates
409 - ~/Library/Application Support/Mozilla/Certificates
410 - Linux
411 - /usr/lib/mozilla/certificates
412 - /usr/lib64/mozilla/certificates
413 - ~/.mozilla/certificates
414
415 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
416
417 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
418
419 Certificates are installed using the trust string `CT,CT,`.
420
421 Binary (DER) and ASCII (PEM) certificates are both supported.
422
423 **Compatibility:** Firefox 64, Firefox ESR 64\
424 **CCK2 Equivalent:** `certs.ca`\
425 **Preferences Affected:** N/A
426
427 #### Windows
428 ```
429 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
430 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
431 ```
432 #### macOS
433 ```
434 <dict>
435 <key>Certificates</key>
436 <dict>
437 <key>Install</key>
438 <array>
439 <string>cert1.der</string>
440 <string>/Users/username/cert2.pem</string>
441 </array>
442 </dict>
443 </dict>
444 ```
445 #### JSON
446 ```
447 {
448 "policies": {
449 "Certificates": {
450 "Install": ["cert1.der", "/home/username/cert2.pem"]
451 }
452 }
453 }
454 ```
455 ### Cookies
456 Configure cookie preferences.
457
458 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
459
460 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
461
462 `Default` determines whether cookies are accepted at all.
463
464 `AcceptThirdParty` determines how third-party cookies are handled.
465
466 `ExpireAtSessionEnd` determines when cookies expire.
467
468 `RejectTracker` only rejects cookies for trackers.
469
470 `Locked` prevents the user from changing cookie preferences.
471
472 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
473 **CCK2 Equivalent:** N/A\
474 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
475
476 #### Windows
477 ```
478 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
479 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
480 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
481 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
482 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
483 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
484 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
485 ```
486 #### macOS
487 ```
488 <dict>
489 <key>Cookies</key>
490 <dict>
491 <key>Allow</key>
492 <array>
493 <string>http://example.com</string>
494 </array>
495 <key>Block</key>
496 <array>
497 <string>http://example.org</string>
498 </array>
499 <key>Default</key>
500 <true/> | <false/>
501 <key>AcceptThirdParty</key>
502 <string>always | never | from-visited</string>
503 <key>ExpireAtSessionEnd</key>
504 <true/> | <false/>
505 <key>RejectTracker</key>
506 <true/> | <false/>
507 <key>Locked</key>
508 <true/> | <false/>
509 </dict>
510 </dict>
511 ```
512 #### JSON
513 ```
514 {
515 "policies": {
516 "Cookies": {
517 "Allow": ["http://example.org/"],
518 "Block": ["http://example.edu/"],
519 "Default": true | false,
520 "AcceptThirdParty": "always" | "never" | "from-visited"],
521 "ExpireAtSessionEnd": true | false,
522 "RejectTracker": true | false,
523 "Locked": true | false
524 }
525 }
526 }
527 ```
528 ### DisableSetDesktopBackground
529 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
530
531 **Compatibility:** Firefox 60, Firefox ESR 60\
532 **CCK2 Equivalent:** `removeSetDesktopBackground`\
533 **Preferences Affected:** N/A
534
535 #### Windows
536 ```
537 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
538 ```
539
540 #### macOS
541 ```
542 <dict>
543 <key>DisableSetDesktopBackground</key>
544 <true/> | <false/>
545 </dict>
546 ```
547 #### JSON
548 ```
549 {
550 "policies": {
551 "DisableSetDesktopBackground": true | false
552 }
553 }
554 ```
555 ### DisableMasterPasswordCreation
556 Remove the master password functionality.
557
558 **Compatibility:** Firefox 60, Firefox ESR 60\
559 **CCK2 Equivalent:** `noMasterPassword`\
560 **Preferences Affected:** N/A
561
562 #### Windows
563 ```
564 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
565 ```
566
567 #### macOS
568 ```
569 <dict>
570 <key>DisableMasterPasswordCreation</key>
571 <true/> | <false/>
572 </dict>
573 ```
574 #### JSON
575 ```
576 {
577 "policies": {
578 "DisableMasterPasswordCreation": true | false
579 }
580 }
581 ```
582 ### DisableAppUpdate
583 Turn off application updates.
584
585 **Compatibility:** Firefox 60, Firefox ESR 60\
586 **CCK2 Equivalent:** `disableFirefoxUpdates`\
587 **Preferences Affected:** N/A
588
589 #### Windows
590 ```
591 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
592 ```
593 #### macOS
594 ```
595 <dict>
596 <key>DisableAppUpdate</key>
597 <true/> | <false/>
598 </dict>
599 ```
600 #### JSON
601 ```
602 {
603 "policies": {
604 "DisableAppUpdate": true | false
605 }
606 }
607 ```
608 ### DisableBuiltinPDFViewer
609 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
610
611 **Compatibility:** Firefox 60, Firefox ESR 60\
612 **CCK2 Equivalent:** `disablePDFjs`\
613 **Preferences Affected:** `pdfjs.disabled`
614
615 #### Windows
616 ```
617 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
618 ```
619
620 #### macOS
621 ```
622 <dict>
623 <key>DisableBuiltinPDFViewer</key>
624 <true/> | <false/>
625 </dict>
626 ```
627 #### JSON
628 ```
629 {
630 "policies": {
631 "DisableBuiltinPDFViewer": true | false
632 }
633 }
634 ```
635 ### DisableDeveloperTools
636 Remove access to all developer tools.
637
638 **Compatibility:** Firefox 60, Firefox ESR 60\
639 **CCK2 Equivalent:** `removeDeveloperTools`\
640 **Preferences Affected:** `devtools.policy.disabled`
641
642 #### Windows
643 ```
644 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
645 ```
646
647 #### macOS
648 ```
649 <dict>
650 <key>DisableDeveloperTools</key>
651 <true/> | <false/>
652 </dict>
653 ```
654 #### JSON
655 ```
656 {
657 "policies": {
658 "DisableDeveloperTools": true | false
659 }
660 }
661 ```
662 ### DisableFeedbackCommands
663 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
664
665 **Compatibility:** Firefox 60, Firefox ESR 60\
666 **CCK2 Equivalent:** N/A\
667 **Preferences Affected:** N/A
668
669 #### Windows
670 ```
671 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
672 ```
673 #### macOS
674 ```
675 <dict>
676 <key>DisableFeedbackCommands</key>
677 <true/> | <false/>
678 </dict>
679 ```
680 #### JSON
681 ```
682 {
683 "policies": {
684 "DisableFeedbackCommands": true | false
685 }
686 }
687 ```
688 ### DisableFirefoxScreenshots
689 Remove access to Firefox Screenshots.
690
691 **Compatibility:** Firefox 60, Firefox ESR 60\
692 **CCK2 Equivalent:** N/A\
693 **Preferences Affected:** `extensions.screenshots.disabled`
694
695 #### Windows
696 ```
697 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
698 ```
699 #### macOS
700 ```
701 <dict>
702 <key>DisableFirefoxScreenshots</key>
703 <true/> | <false/>
704 </dict>
705 ```
706 #### JSON
707 ```
708 {
709 "policies": {
710 "DisableFirefoxScreenshots": true | false
711 }
712 }
713 ```
714 ### DisableFirefoxAccounts
715 Disable Firefox Accounts integration (Sync).
716
717 **Compatibility:** Firefox 60, Firefox ESR 60\
718 **CCK2 Equivalent:** `disableSync`\
719 **Preferences Affected:** `identity.fxaccounts.enabled`
720
721 #### Windows
722 ```
723 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
724 ```
725 #### macOS
726 ```
727 <dict>
728 <key>DisableFirefoxAccounts</key>
729 <true/> | <false/>
730 </dict>
731 ```
732 #### JSON
733 ```
734 {
735 "policies": {
736 "DisableFirefoxAccounts": true | false
737 }
738 }
739 ```
740 ### DisableFirefoxStudies
741 Disable Firefox studies (Shield).
742
743 **Compatibility:** Firefox 60, Firefox ESR 60\
744 **CCK2 Equivalent:** `disableForget`\
745 **Preferences Affected:** N/A
746
747 #### Windows
748 ```
749 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
750 ```
751 #### macOS
752 ```
753 <dict>
754 <key>DisableFirefoxStudies</key>
755 <true/> | <false/>
756 </dict>
757 ```
758 #### JSON
759 ```
760 {
761 "policies": {
762 "DisableFirefoxStudies": true | false
763 }
764 }
765 ```
766 ### DisableForgetButton
767 Disable the "Forget" button.
768
769 **Compatibility:** Firefox 60, Firefox ESR 60\
770 **CCK2 Equivalent:** `disableForget`\
771 **Preferences Affected:** N/A
772
773 #### Windows
774 ```
775 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
776 ```
777 #### macOS
778 ```
779 <dict>
780 <key>DisableForgetButton</key>
781 <true/> | <false/>
782 </dict>
783 ```
784 #### JSON
785 ```
786 {
787 "policies": {
788 "DisableForgetButton": true | false
789 }
790 }
791 ```
792 ### DisableFormHistory
793 Turn off saving information on web forms and the search bar.
794
795 **Compatibility:** Firefox 60, Firefox ESR 60\
796 **CCK2 Equivalent:** `disableFormFill`\
797 **Preferences Affected:** ` browser.formfill.enable`
798
799 #### Windows
800 ```
801 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
802 ```
803 #### macOS
804 ```
805 <dict>
806 <key>DisableFormHistory</key>
807 <true/> | <false/>
808 </dict>
809 ```
810 #### JSON
811 ```
812 {
813 "policies": {
814 "DisableFormHistory": true | false
815 }
816 }
817 ```
818 ### DisablePocket
819 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
820
821 **Compatibility:** Firefox 60, Firefox ESR 60\
822 **CCK2 Equivalent:** `disablePocket`\
823 **Preferences Affected:** `extensions.pocket.enabled`
824
825 #### Windows
826 ```
827 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisablePocket</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### JSON
837 ```
838 {
839 "policies": {
840 "DisablePocket": true | false
841 }
842 }
843 ```
844 ### DisablePrivateBrowsing
845 Remove access to private browsing.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `disablePrivateBrowsing`\
849 **Preferences Affected:** N/A
850
851 #### Windows
852 ```
853 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>DisablePrivateBrowsing</key>
859 <true/> | <false/>
860 </dict>
861 ```
862 #### JSON
863 ```
864 {
865 "policies": {
866 "DisablePrivateBrowsing": true | false
867 }
868 }
869 ```
870 ### DisableProfileImport
871 Disables the "Import data from another browser" option in the bookmarks window.
872
873 **Compatibility:** Firefox 60, Firefox ESR 60\
874 **CCK2 Equivalent:** N/A\
875 **Preferences Affected:** N/A
876
877 #### Windows
878 ```
879 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableProfileImport</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### JSON
889 ```
890 {
891 "policies": {
892 "DisableProfileImport": true | false
893 }
894 }
895 ```
896 ### DisableProfileRefresh
897 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
898
899 **Compatibility:** Firefox 60, Firefox ESR 60\
900 **CCK2 Equivalent:** `disableResetFirefox`\
901 **Preferences Affected:** `browser.disableResetPrompt`
902
903 #### Windows
904 ```
905 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
906 ```
907 #### macOS
908 ```
909 <dict>
910 <key>DisableProfileRefresh</key>
911 <true/> | <false/>
912 </dict>
913 ```
914 #### JSON
915 ```
916 {
917 "policies": {
918 "DisableProfileRefresh": true | false
919 }
920 }
921 ```
922 ### DisableSafeMode
923 Disable safe mode within the browser.
924
925 On Windows, this disables safe mode via the command line as well.
926
927 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
928 **CCK2 Equivalent:** `disableSafeMode`\
929 **Preferences Affected:** N/A
930
931 #### Windows
932 ```
933 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
934 ```
935 #### macOS
936 ```
937 <dict>
938 <key>DisableSafeMode</key>
939 <true/> | <false/>
940 </dict>
941 ```
942 #### JSON
943 ```
944 {
945 "policies": {
946 "DisableSafeMode": true | false
947 }
948 }
949 ```
950 ### DisableSecurityBypass
951 Prevent the user from bypassing security in certain cases.
952
953 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
954
955 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
956
957 **Compatibility:** Firefox 60, Firefox ESR 60\
958 **CCK2 Equivalent:** N/A\
959 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
960
961 #### Windows
962 ```
963 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
965 ```
966 #### macOS
967 ```
968 <dict>
969 <key>DisableSecurityBypass</key>
970 <dict>
971 <key>InvalidCertificate</key>
972 <true/> | <false/>
973 <key><SafeBrowsing/key>
974 <true/> | <false/>
975 </dict>
976 </dict>
977 ```
978 #### JSON
979 ```
980 {
981 "policies": {
982 "DisableSecurityBypass": {
983 "InvalidCertificate": true false,
984 "SafeBrowsing": true false
985 }
986 }
987 }
988 ```
989 ### DisableSystemAddonUpdate
990 Prevent system add-ons from being installed or update.
991
992 **Compatibility:** Firefox 60, Firefox ESR 60\
993 **CCK2 Equivalent:** N/A\
994 **Preferences Affected:** N/A
995
996 #### Windows
997 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
998 ```
999 #### macOS
1000 ```
1001 <dict>
1002 <key>DisableSystemAddonUpdate</key>
1003 <true/> | <false/>
1004 </dict>
1005 ```
1006 #### JSON
1007 ```
1008 {
1009 "policies": {
1010 "DisableSystemAddonUpdate": true | false
1011 }
1012 }
1013 ```
1014 ### DisableTelemetry
1015 Prevent the upload of telemetry data.
1016
1017 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1018
1019 **Compatibility:** Firefox 60, Firefox ESR 60\
1020 **CCK2 Equivalent:** `disableTelemetry`\
1021 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1022
1023 #### Windows
1024 ```
1025 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1026 ```
1027 #### macOS
1028 ```
1029 <dict>
1030 <key>DisableTelemetry</key>
1031 <true/> | <false/>
1032 </dict>
1033 ```
1034 #### JSON
1035 ```
1036 {
1037 "policies": {
1038 "DisableTelemetry": true | false
1039 }
1040 }
1041 ```
1042 ### DisplayBookmarksToolbar
1043 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1044
1045 **Compatibility:** Firefox 60, Firefox ESR 60\
1046 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1047 **Preferences Affected:** N/A
1048
1049 #### Windows
1050 ```
1051 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1052 ```
1053 #### macOS
1054 ```
1055 <dict>
1056 <key>DisplayBookmarksToolbar</key>
1057 <true/> | <false/>
1058 </dict>
1059 ```
1060 #### JSON
1061 ```
1062 {
1063 "policies": {
1064 "DisplayBookmarksToolbar": true | false
1065 }
1066 }
1067 ```
1068 ### DisplayMenuBar
1069 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1070
1071 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1072 **CCK2 Equivalent:** `displayMenuBar`\
1073 **Preferences Affected:** N/A
1074
1075 #### Windows
1076 ```
1077 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1078 ```
1079 #### macOS
1080 ```
1081 <dict>
1082 <key>DisplayMenuBar</key>
1083 <true/> | <false/>
1084 </dict>
1085 ```
1086 #### JSON
1087 ```
1088 {
1089 "policies": {
1090 "DisplayMenuBar": true | false
1091 }
1092 }
1093 ```
1094 ### DNSOverHTTPS
1095 Configure DNS over HTTPS.
1096
1097 `Enabled` determines whether DNS over HTTPS is enabled
1098
1099 `ProviderURL` is a URL to another provider.
1100
1101 `Locked` prevents the user from changing DNS over HTTPS preferences.
1102
1103 **Compatibility:** Firefox 63, Firefox ESR 68\
1104 **CCK2 Equivalent:** N/A\
1105 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1106
1107 #### Windows
1108 ```
1109 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1110 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1111 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1112 ```
1113 #### macOS
1114 ```
1115 <dict>
1116 <key>DNSOverHTTPS</key>
1117 <dict>
1118 <key>Enabled</key>
1119 <true/> | <false/>
1120 <key>ProviderURL</key>
1121 <string>URL_TO_ALTERNATE_PROVIDER</string>
1122 <key>Locked</key>
1123 <true/> | <false/>
1124 </dict>
1125 </dict>
1126 ```
1127 #### JSON
1128 ```
1129 {
1130 "policies": {
1131 "DNSOverHTTPS": {
1132 "Enabled": true | false,
1133 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1134 "Locked": true | false
1135 }
1136 }
1137 }
1138 ```
1139 ### DontCheckDefaultBrowser
1140 Don't check if Firefox is the default browser at startup.
1141
1142 **Compatibility:** Firefox 60, Firefox ESR 60\
1143 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1144 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1145
1146 #### Windows
1147 ```
1148 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1149 ```
1150 #### macOS
1151 ```
1152 <dict>
1153 <key>DontCheckDefaultBrowser</key>
1154 <true/> | <false/>
1155 </dict>
1156 ```
1157 #### JSON
1158 ```
1159 {
1160 "policies": {
1161 "DontCheckDefaultBrowser": true | false
1162 }
1163 }
1164 ```
1165 ### DefaultDownloadDirectory
1166 Set the default download directory.
1167
1168 You can use ${home} for the native home directory.
1169
1170 **Compatibility:** Firefox 68, Firefox ESR 68\
1171 **CCK2 Equivalent:** N/A\
1172 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1173
1174 #### Windows
1175 ```
1176 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1177 ```
1178 #### macOS
1179 ```
1180 <dict>
1181 <key>DefaultDownloadDirectory</key>
1182 <string>${home}/Downloads</string>
1183 </dict>
1184 ```
1185 #### JSON (macOS and Linux)
1186 ```
1187 {
1188 "policies": {
1189 "DefaultDownloadDirectory": "${home}/Downloads"
1190 }
1191 ```
1192 #### JSON (Windows)
1193 ```
1194 {
1195 "policies": {
1196 "DefaultDownloadDirectory": "${home}\\Downloads"
1197 }
1198 ```
1199 ### DownloadDirectory
1200 Set and lock the download directory.
1201
1202 You can use ${home} for the native home directory.
1203
1204 **Compatibility:** Firefox 68, Firefox ESR 68\
1205 **CCK2 Equivalent:** N/A\
1206 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1207
1208 #### Windows
1209 ```
1210 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1211 ```
1212 #### macOS
1213 ```
1214 <dict>
1215 <key>DownloadDirectory</key>
1216 <string>${home}/Downloads</string>
1217 </dict>
1218 ```
1219 #### JSON (macOS and Linux)
1220 ```
1221 {
1222 "policies": {
1223 "DownloadDirectory": "${home}/Downloads"
1224 }
1225 ```
1226 #### JSON (Windows)
1227 ```
1228 {
1229 "policies": {
1230 "DownloadDirectory": "${home}\\Downloads"
1231 }
1232 ```
1233 ### EnableTrackingProtection
1234 Configure tracking protection.
1235
1236 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1237
1238 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1239
1240 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1241
1242 **Compatibility:** Firefox 60, Firefox ESR 60\
1243 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1244 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`
1245
1246 #### Windows
1247 ```
1248 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1249 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1250 ```
1251 #### macOS
1252 ```
1253 <dict>
1254 <key>EnableTrackingProtection</key>
1255 <dict>
1256 <key>Value</key>
1257 <true/> | <false/>
1258
1259 <key><Locked/key>
1260 <true/> | <false/>
1261 </dict>
1262 </dict>
1263 ```
1264 #### JSON
1265 ```
1266 {
1267 "policies": {
1268 "EnableTrackingProtection": {
1269 "Value": [true, false],
1270 "Locked": [true, false]
1271 }
1272 }
1273 ```
1274 ### EnterprisePoliciesEnabled
1275 Enable policy support on macOS.
1276
1277 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1278 **CCK2 Equivalent:** N/A\
1279 **Preferences Affected:** N/A
1280
1281 #### macOS
1282 ```
1283 <dict>
1284 <key>EnterprisePoliciesEnabled</key>
1285 <true/>
1286 </dict>
1287 ```
1288 ### Extensions
1289 Control the installation, uninstallation and locking of extensions.
1290
1291 `Install` is a list of URLs or native paths for extensions to be installed.
1292
1293 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1294
1295 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1296
1297 **Compatibility:** Firefox 60, Firefox ESR 60\
1298 **CCK2 Equivalent:** `addons`\
1299 **Preferences Affected:** N/A
1300
1301 #### Windows
1302 ```
1303 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1304 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1305 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1306 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1307 ```
1308 #### macOS
1309 ```
1310 <dict>
1311 <key>Extensions</key>
1312 <dict>
1313 <key>Install</key>
1314 <array>
1315 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1316 <string>//path/to/xpi</string>
1317 </array>
1318 <key>Uninstall</key>
1319 <array>
1320 <string>bad_addon_id@mozilla.org</string>
1321 </array>
1322 <key>Locked</key>
1323 <array>
1324 <string>addon_id@mozilla.org</string>
1325 </array>
1326 </dict>
1327 </dict>
1328 ```
1329 #### JSON
1330
1331
1332 ```
1333 {
1334 "policies": {
1335 "Extensions": {
1336 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1337 "Uninstall": ["bad_addon_id@mozilla.org"],
1338 "Locked": ["addon_id@mozilla.org"]
1339 }
1340 }
1341 }
1342 ```
1343 ### ExtensionSettings
1344 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1345
1346 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1347
1348 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1349
1350 The configuration for each extension is another dictionary that can contain the fields documented below.
1351
1352 | Name | Description |
1353 | --- | --- |
1354 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1355 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1356 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1357 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1358 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1359 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing frmo the local file system, use a file:/// URL.
1360 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1361 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1362 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1363
1364 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1365 **CCK2 Equivalent:** N/A\
1366 **Preferences Affected:** N/A
1367
1368 #### Windows
1369 ```
1370 Software\Policies\Mozilla\Firefox\ExtensionSettings = '{"*": {"installation_mode": "blocked"}}'
1371 ```
1372 #### macOS
1373 ```
1374 <dict>
1375 <key>ExtensionSettings</key>
1376 <dict>
1377 <key>*</key>
1378 <dict>
1379 <key>blocked_install_message</key>
1380 <string>Custom error message.</string>
1381 <key>install_sources</key>
1382 <array>
1383 <string>https://addons.mozilla.org/</string>
1384 </array>
1385 <key>installation_mode</key>
1386 <string>blocked</string>
1387 </dict>
1388 <key>uBlock0@raymondhill.net</key>
1389 <dict>
1390 <key>installation_mode</key>
1391 <string>force_installed</string>
1392 <key>install_url</key>
1393 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1394 </dict>
1395 </dict>
1396 </dict>
1397 ```
1398 #### JSON
1399 ```
1400 {
1401 "policies": {
1402 "ExtensionSettings": {
1403 "*": {
1404 "blocked_install_message": "Custom error message.",
1405 "install_sources": ["https://addons.mozilla.org/"],
1406 "installation_mode": "blocked"
1407 },
1408 "uBlock0@raymondhill.net": {
1409 "installation_mode": "force_installed",
1410 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1411 }
1412 }
1413 }
1414 }
1415 ```
1416 ### ExtensionUpdate
1417 Control extension updates.
1418
1419 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1420 **CCK2 Equivalent:** N/A\
1421 **Preferences Affected:** `extensions.update.enabled`
1422
1423 #### Windows
1424 ```
1425 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1426 ```
1427 #### macOS
1428 ```
1429 <dict>
1430 <key>ExtensionUpdate</key>
1431 <true/> | <false/>
1432 </dict>
1433 ```
1434 #### JSON
1435 ```
1436 {
1437 "policies": {
1438 "ExtensionUpdate": true | false
1439 }
1440 }
1441 ```
1442 ### FlashPlugin
1443 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1444
1445 `Allow` is a list of origins where Flash are allowed.
1446
1447 `Block` is a list of origins where Flash is not allowed.
1448
1449 `Default` determines whether or not Flash is allowed by default.
1450
1451 `Locked` prevents the user from changing Flash preferences.
1452
1453 **Compatibility:** Firefox 60, Firefox ESR 60\
1454 **CCK2 Equivalent:** `permissions.plugin`\
1455 **Preferences Affected:** `plugin.state.flash`
1456
1457 #### Windows
1458 ```
1459 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1460 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1461 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1462 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1463 ```
1464 #### macOS
1465 ```
1466 <dict>
1467 <key>FlashPlugin</key>
1468 <dict>
1469 <key>Allow</key>
1470 <array>
1471 <string>http://example.org</string>
1472 </array>
1473 <key>Block</key>
1474 <array>
1475 <string>http://example.edu</string>
1476 </array>
1477 <key>Default</key>
1478 <true/> | <false/>
1479 <key>Locked</key>
1480 <true/> | <false/>
1481 </dict>
1482 </dict>
1483 ```
1484 #### JSON
1485 ```
1486 {
1487 "policies": {
1488 "FlashPlugin": {
1489 "Allow": ["http://example.org/"],
1490 "Block": ["http://example.edu/"],
1491 "Default": true | false,
1492 "Locked": true | false
1493 }
1494 }
1495 }
1496 ```
1497 ### FirefoxHome
1498 Customize the Firefox Home page.
1499
1500 **Compatibility:** Firefox 68, Firefox ESR 68\
1501 **CCK2 Equivalent:** N/A\
1502 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1503
1504 #### Windows
1505 ```
1506 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1507 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1508 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1509 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1510 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1511 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1512 ```
1513 #### macOS
1514 ```
1515 <dict>
1516 <key>FirefoxHome</key>
1517 <dict>
1518 <key>Search</key>
1519 <true/> | <false/>
1520 <key>TopSites</key>
1521 <true/> | <false/>
1522 <key>Highlights</key>
1523 <true/> | <false/>
1524 <key>Pocket</key>
1525 <true/> | <false/>
1526 <key>Snippets</key>
1527 <true/> | <false/>
1528 <key>Locked</key>
1529 <true/> | <false/>
1530 </dict>
1531 </dict>
1532 ```
1533 #### JSON
1534 ```
1535 {
1536 "policies": {
1537 "FirefoxHome": {
1538 "Search": true | false,
1539 "TopSites": true | false,
1540 "Highlights": true | false,
1541 "Pocket": true | false,
1542 "Snippets": true | false,
1543 "Locked": true | false
1544 }
1545 }
1546 }
1547 ```
1548 ### HardwareAcceleration
1549 Control hardware acceleration.
1550
1551 **Compatibility:** Firefox 60, Firefox ESR 60\
1552 **CCK2 Equivalent:** N/A\
1553 **Preferences Affected:** `layers.acceleration.disabled`
1554
1555 #### Windows
1556 ```
1557 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1558 ```
1559 #### macOS
1560 ```
1561 <dict>
1562 <key>HardwareAcceleration</key>
1563 <true/> | <false/>
1564 </dict>
1565 ```
1566 #### JSON
1567 ```
1568 {
1569 "policies": {
1570 "HardwareAcceleration": true | false
1571 }
1572 }
1573 ```
1574 ### Homepage
1575 Configure the default homepage and how Firefox starts.
1576
1577 `URL` is the default homepage.
1578
1579 `Locked` prevents the user from changing homepage preferences.
1580
1581 `Additional` allows for more than one homepage.
1582
1583 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1584
1585 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1586 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1587 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1588
1589 #### Windows
1590 ```
1591 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1592 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1593 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1594 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1595 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1596 ```
1597 #### macOS
1598 ```
1599 <dict>
1600 <key>Homepage</key>
1601 <dict>
1602 <key>URL</key>
1603 <string>http://example.com</string>
1604 <key>Locked</key>
1605 <true/> | <false/>
1606 <key>Additional</key>
1607 <array>
1608 <string>http://example.org</string>
1609 <string>http://example.edu</string>
1610 </array>
1611 <key>StartPage</key>
1612 <string>always | never | from-visited</string>
1613 </dict>
1614 </dict>
1615 ```
1616 #### JSON
1617 ```
1618 {
1619 "policies": {
1620 "Homepage": {
1621 "URL": "http://example.com/",
1622 "Locked": true | false,
1623 "Additional": ["http://example.org/",
1624 "http://example.edu/"],
1625 "StartPage": "none" | "homepage" | "previous-session"
1626 }
1627 }
1628 }
1629 ```
1630 ### InstallAddonsPermission
1631 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1632
1633 `Allow` is a list of origins where extension installs are allowed.
1634
1635 `Default` determines whether or not extension installs are allowed by default.
1636
1637 **Compatibility:** Firefox 60, Firefox ESR 60\
1638 **CCK2 Equivalent:** `permissions.install`\
1639 **Preferences Affected:** `xpinstall.enabled`
1640
1641 #### Windows
1642 ```
1643 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1644 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1645 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1646 ```
1647 #### macOS
1648 ```
1649 <dict>
1650 <key>InstallAddonsPermission</key>
1651 <dict>
1652 <key>Allow</key>
1653 <array>
1654 <string>http://example.org</string>
1655 <string>http://example.edu</string>
1656 </array>
1657 <key>Default</key>
1658 <true/> | <false/>
1659 </dict>
1660 </dict>
1661 ```
1662 #### JSON
1663 ```
1664 {
1665 "policies": {
1666 "InstallAddonsPermission": {
1667 "Allow": ["http://example.org/",
1668 "http://example.edu/"],
1669 "Default": true | false
1670 }
1671 }
1672 }
1673 ```
1674 ### LocalFileLinks
1675 Enable linking to local files by origin.
1676
1677 **Compatibility:** Firefox 68, Firefox ESR 68\
1678 **CCK2 Equivalent:** N/A\
1679 **Preferences Affected:** `capability.policy.localfilelinks.*`
1680
1681 #### Windows
1682 ```
1683 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1684 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1685 ```
1686 #### macOS
1687 ```
1688 <dict>
1689 <key>LocalFileLinks</key>
1690 <array>
1691 <string>http://example.org</string>
1692 <string>http://example.edu</string>
1693 </array>
1694 </dict>
1695 ```
1696 #### JSON
1697 ```
1698 {
1699 "policies": {
1700 "LocalFileLinks": ["http://example.org/",
1701 "http://example.edu/"]
1702 }
1703 }
1704 ```
1705 ### NoDefaultBookmarks
1706 Disable the creation of default bookmarks.
1707
1708 This policy is only effective if the user profile has not been created yet.
1709
1710 **Compatibility:** Firefox 60, Firefox ESR 60\
1711 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1712 **Preferences Affected:** N/A
1713
1714 #### Windows
1715 ```
1716 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1717 ```
1718 #### macOS
1719 ```
1720 <dict>
1721 <key>NoDefaultBookmarks</key>
1722 <true/> | <false/>
1723 </dict>
1724 ```
1725 #### JSON
1726 ```
1727 {
1728 "policies": {
1729 "NoDefaultBookmarks": true | false
1730 }
1731 }
1732 ```
1733 ### NetworkPrediction
1734 Enable or disable network prediction (DNS prefetching).
1735
1736 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1737 **CCK2 Equivalent:** N/A\
1738 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1739
1740 #### Windows
1741 ```
1742 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1743 ```
1744 #### macOS
1745 ```
1746 <dict>
1747 <key>NetworkPrediction</key>
1748 <true/> | <false/>
1749 </dict>
1750 ```
1751 #### JSON
1752 ```
1753 {
1754 "policies": {
1755 "NetworkPrediction": true | false
1756 }
1757 ```
1758 ### NewTabPage
1759 Enable or disable the New Tab page.
1760
1761 **Compatibility:** Firefox 68, Firefox ESR 68\
1762 **CCK2 Equivalent:** N/A\
1763 **Preferences Affected:** `browser.newtabpage.enabled`
1764
1765 #### Windows
1766 ```
1767 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1768 ```
1769 #### macOS
1770 ```
1771 <dict>
1772 <key>NewTabPage</key>
1773 <true/> | <false/>
1774 </dict>
1775 ```
1776 #### JSON
1777 ```
1778 {
1779 "policies": {
1780 "NewTabPage": true | false
1781 }
1782 ```
1783 ### OfferToSaveLogins
1784 Control whether or not Firefox offers to save passwords.
1785
1786 **Compatibility:** Firefox 60, Firefox ESR 60\
1787 **CCK2 Equivalent:** `dontRememberPasswords`\
1788 **Preferences Affected:** `signon.rememberSignons`
1789
1790 #### Windows
1791 ```
1792 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1793 ```
1794 #### macOS
1795 ```
1796 <dict>
1797 <key>OfferToSaveLogins</key>
1798 <true/> | <false/>
1799 </dict>
1800 ```
1801 #### JSON
1802 ```
1803 {
1804 "policies": {
1805 "OfferToSaveLogins": true | false
1806 }
1807 }
1808 ```
1809 ### OverrideFirstRunPage
1810 Override the first run page. If the value is blank, no first run page is displayed.
1811
1812 **Compatibility:** Firefox 60, Firefox ESR 60\
1813 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1814 **Preferences Affected:** `startup.homepage_welcome_url`
1815
1816 #### Windows
1817 ```
1818 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>OverrideFirstRunPage</key>
1824 <string>http://example.org</string>
1825 </dict>
1826 ```
1827 #### JSON
1828 ```
1829 {
1830 "policies": {
1831 "OverrideFirstRunPage": "http://example.org"
1832 }
1833 ```
1834 ### OverridePostUpdatePage
1835 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1836
1837 **Compatibility:** Firefox 60, Firefox ESR 60\
1838 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1839 **Preferences Affected:** `startup.homepage_override_url`
1840
1841 #### Windows
1842 ```
1843 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1844 ```
1845 #### macOS
1846 ```
1847 <dict>
1848 <key>OverridePostUpdatePage</key>
1849 <string>http://example.org</string>
1850 </dict>
1851 ```
1852 #### JSON
1853 ```
1854 {
1855 "policies": {
1856 "OverridePostUpdatePage": "http://example.org"
1857 }
1858 ```
1859 ### Permissions
1860 Set permissions associated with camera, microphone, location, and notifications
1861
1862 `Allow` is a list of origins where the feature is allowed.
1863
1864 `Block` is a list of origins where the feature is not allowed.
1865
1866 `BlockNewRequests` determines whether or not new requests can be made for the feature.
1867
1868 `Locked` prevents the user from changing preferences for the feature.
1869
1870 **Compatibility:** Firefox 62, Firefox ESR 60.2\
1871 **CCK2 Equivalent:** N/A\
1872 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
1873
1874 #### Windows
1875 ```
1876 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
1877 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
1878 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
1879 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
1880 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
1881 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
1882 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
1883 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
1884 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
1885 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
1886 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
1887 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
1888 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
1889 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
1890 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
1891 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
1892 ```
1893 #### macOS
1894 ```
1895 <dict>
1896 <key>Permissions</key>
1897 <dict>
1898 <key>Camera</key>
1899 <dict>
1900 <key>Allow</key>
1901 <array>
1902 <string>https://example.org</string>
1903 </array>
1904 <key>Block</key>
1905 <array>
1906 <string>https://example.edu</string>
1907 </array>
1908 <key>BlockNewRequests</key>
1909 <true/>
1910 <key>Locked</key>
1911 <true/>
1912 </dict>
1913 <key>Microphone</key>
1914 <dict>
1915 <key>Allow</key>
1916 <array>
1917 <string>https://example.org</string>
1918 </array>
1919 <key>Block</key>
1920 <array>
1921 <string>https://example.edu</string>
1922 </array>
1923 <key>BlockNewRequests</key>
1924 <true/>
1925 <key>Locked</key>
1926 <true/>
1927 </dict>
1928 <key>Location</key>
1929 <dict>
1930 <key>Allow</key>
1931 <array>
1932 <string>https://example.org</string>
1933 </array>
1934 <key>Block</key>
1935 <array>
1936 <string>https://example.edu</string>
1937 </array>
1938 <key>BlockNewRequests</key>
1939 <true/>
1940 <key>Locked</key>
1941 <true/>
1942 </dict>
1943 <key>Notifications</key>
1944 <dict>
1945 <key>Allow</key>
1946 <array>
1947 <string>https://example.org</string>
1948 </array>
1949 <key>Block</key>
1950 <array>
1951 <string>https://example.edu</string>
1952 </array>
1953 <key>BlockNewRequests</key>
1954 <true/>
1955 <key>Locked</key>
1956 <true/>
1957 </dict>
1958 </dict>
1959 </dict>
1960 ```
1961 #### JSON
1962 ```
1963 {
1964 "policies": {
1965 "Permissions": {
1966 "Camera": {
1967 "Allow": ["https://example.org"],
1968 "Block": ["https://example.edu"],
1969 "BlockNewRequests": true | false,
1970 "Locked": true | false
1971 },
1972 "Microphone": {
1973 "Allow": ["https://example.org"],
1974 "Block": ["https://example.edu"],
1975 "BlockNewRequests": true | false,
1976 "Locked": true | false
1977 },
1978 "Location": {
1979 "Allow": ["https://example.org"],
1980 "Block": ["https://example.edu"],
1981 "BlockNewRequests": true | false,
1982 "Locked": true | false
1983 },
1984 "Notifications": {
1985 "Allow": ["https://example.org"],
1986 "Block": ["https://example.edu"],
1987 "BlockNewRequests": true | false,
1988 "Locked": true | false
1989 }
1990 }
1991 }
1992 }
1993 ```
1994 ### PopupBlocking
1995 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
1996
1997 `Allow` is a list of origins where popup-windows are allowed.
1998
1999 `Default` determines whether or not pop-up windows are allowed by default.
2000
2001 `Locked` prevents the user from changing pop-up preferences.
2002
2003 **Compatibility:** Firefox 60, Firefox ESR 60\
2004 **CCK2 Equivalent:** `permissions.popup`\
2005 **Preferences Affected:** `dom.disable_open_during_load`
2006
2007 #### Windows
2008 ```
2009 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2010 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2011 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2012 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2013 ```
2014 #### macOS
2015 ```
2016 <dict>
2017 <key>PopupBlocking</key>
2018 <dict>
2019 <key>Allow</key>
2020 <array>
2021 <string>http://example.org</string>
2022 <string>http://example.edu</string>
2023 </array>
2024 <key>Default</key>
2025 <true/> | <false/>
2026 <key>Locked</key>
2027 <true/> | <false/>
2028 </dict>
2029 </dict>
2030 ```
2031 #### JSON
2032 ```
2033 {
2034 "policies": {
2035 "PopupBlocking": {
2036 "Allow": ["http://example.org/",
2037 "http://example.edu/"],
2038 "Default": true | false,
2039 "Locked": true | false
2040 }
2041 }
2042 }
2043 ```
2044 ### Preferences
2045 Set and lock certain preferences.
2046
2047 **Compatibility:** See below\
2048 **CCK2 Equivalent:** `preferences`\
2049 **Preferences Affected:** See below
2050
2051 | Preference | Type | Compatibility
2052 | --- | --- | ---
2053 | app.update.auto | boolean | Firefox 68, Firefox 68 ESR
2054 | browser.cache.disk.enable | boolean | Firefox 68, Firefox 68 ESR
2055 | browser.cache.disk.parent_directory | string | Firefox 68, Firefox 68 ESR
2056 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox 68 ESR
2057 | browser.search.update | boolean | Firefox 68, Firefox 68 ESR
2058 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox 68 ESR
2059 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox 68 ESR
2060 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox 68 ESR
2061 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox 68 ESR
2062 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox 68 ESR
2063 | dom.disable_window_flip | boolean | Firefox 68, Firefox 68 ESR
2064 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox 68 ESR
2065 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox 68 ESR
2066 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox 68 ESR
2067 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox 68 ESR
2068 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox 68 ESR
2069 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox 68 ESR
2070 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox 68 ESR
2071 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox 68 ESR
2072 | network.IDN_show_punycode | boolean | Firefox 68, Firefox 68 ESR
2073 | places.history.enabled | boolean | Firefox 68, Firefox 68 ESR
2074 | security.default_personal_cert | string | Firefox 68, Firefox 68 ESR
2075 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox 68 ESR
2076 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox 68 ESR
2077 #### Windows
2078 ```
2079 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2080 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2081 ```
2082 #### macOS
2083 ```
2084 <dict>
2085 <key>Preferences</key>
2086 <dict>
2087 <key>boolean_preference_name</key>
2088 <true/> | <false/>
2089 <key>string_preference_name</key>
2090 <string>string_value</string>
2091 </dict>
2092 </dict>
2093 ```
2094 #### JSON
2095 ```
2096 {
2097 "policies": {
2098 "Preferences": {
2099 "boolean_preference_name": true | false,
2100 "string_preference_name": "string_value"
2101 }
2102 }
2103 }
2104 ```
2105 ### PromptForDownloadLocation
2106 Ask where to save each file before downloading.
2107
2108 **Compatibility:** Firefox 68, Firefox ESR 68\
2109 **CCK2 Equivalent:** N/A
2110 **Preferences Affected:** `browser.download.useDownloadDir`
2111
2112 #### Windows
2113 ```
2114 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2115 ```
2116 #### macOS
2117 ```
2118 <dict>
2119 <key>PromptForDownloadLocation</key>
2120 <true/> | <false/>
2121 </dict>
2122 ```
2123 #### JSON
2124 ```
2125 {
2126 "policies": {
2127 "PromptForDownloadLocation": true | false
2128 }
2129 }
2130 ```
2131 ### Proxy
2132 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2133 To specify ports, append them to the hostnames with a colon (:).
2134
2135 `Mode` is the proxy method being used.
2136
2137 `Locked` is whether or not proxy settings can be changed.
2138
2139 `HTTPProxy` is the HTTP proxy server.
2140
2141 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2142
2143 `SSLProxy` is the SSL proxy server.
2144
2145 `FTPProxy` is the FTP proxy server.
2146
2147 `SOCKSProxy` is the SOCKS proxy server
2148
2149 `SOCKSVersion` is the SOCKS version (4 or 5)
2150
2151 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2152
2153 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2154
2155 `AutoLogin` means do not prompt for authentication if password is saved.
2156
2157 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2158
2159 **Compatibility:** Firefox 60, Firefox ESR 60\
2160 **CCK2 Equivalent:** `networkProxy*`\
2161 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2162
2163 #### Windows
2164 ```
2165 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2166 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2167 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2168 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2169 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2170 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2171 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2172 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2173 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2174 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2175 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2176 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2177 ```
2178 #### macOS
2179 ```
2180 <dict>
2181 <key>Proxy</key>
2182 <dict>
2183 <key>Mode</key>
2184 <string>none | system | manual | autoDetect| autoConfig</string>
2185 <key>Locked</key>
2186 <true> | </false>
2187 <key>HTTPProxy</key>
2188 <string>https://httpproxy.example.com</string>
2189 <key>UseHTTPProxyForAllProtocols</key>
2190 <true> | </false>
2191 <key>SSLProxy</key>
2192 <string>https://sslproxy.example.com</string>
2193 <key>FTPProxy</key>
2194 <string>https://ftpproxy.example.com</string>
2195 <key>SOCKSProxy</key>
2196 <string>https://socksproxy.example.com</string>
2197 <key>SOCKSVersion</key>
2198 <string>4 | 5</string>
2199 <key>Passthrough</key>
2200 <string>&lt;local>&gt;</string>
2201 <key>AutoConfigURL</key>
2202 <string>URL_TO_AUTOCONFIG</string>
2203 <key>AutoLogin</key>
2204 <true> | </false>
2205 <key>UseProxyForDNS</key>
2206 <true> | </false>
2207 </dict>
2208 </dict>
2209 ```
2210 ### JSON
2211 ```
2212 {
2213 "policies": {
2214 "Proxy": {
2215 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2216 "Locked": [true, false],
2217 "HTTPProxy": "hostname",
2218 "UseHTTPProxyForAllProtocols": [true, false],
2219 "SSLProxy": "hostname",
2220 "FTPProxy": "hostname",
2221 "SOCKSProxy": "hostname",
2222 "SOCKSVersion": 4 | 5
2223 "Passthrough": "<local>",
2224 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2225 "AutoLogin": [true, false],
2226 "UseProxyForDNS": [true, false]
2227 }
2228 }
2229 }
2230 ```
2231 ### RequestedLocales
2232 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2233
2234 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2235
2236 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2237 **CCK2 Equivalent:** N/A\
2238 **Preferences Affected:** N/A
2239 #### Windows
2240 ```
2241 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2242 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2243
2244 or
2245
2246 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2247 ```
2248 #### macOS
2249 ```
2250 <dict>
2251 <key>RequestedLocales</key>
2252 <array>
2253 <string>de</string>
2254 <string>en-US</string>
2255 </array>
2256 </dict>
2257
2258 or
2259
2260 <dict>
2261 <key>RequestedLocales</key>
2262 <string>de,en-US</string>
2263 </dict>
2264
2265 ```
2266 #### JSON
2267 ```
2268 {
2269 "policies": {
2270 "RequestedLocales": ["de", "en-US"]
2271 }
2272 }
2273
2274 or
2275
2276 {
2277 "policies": {
2278 "RequestedLocales": "de,en-US"
2279 }
2280 }
2281 ```
2282 ### SanitizeOnShutdown (Selective)
2283 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2284
2285 **Compatibility:** Firefox 68, Firefox ESR 68\
2286 **CCK2 Equivalent:** N/A\
2287 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2288 #### Windows
2289 ```
2290 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2291 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2292 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2293 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2294 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2295 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2296 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2297 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2298 ```
2299 #### macOS
2300 ```
2301 <dict>
2302 <key>SanitizeOnShutdown</key>
2303 <dict>
2304 <key>Cache</key>
2305 <true/> | <false/>
2306 <key>Cookies</key>
2307 <true/> | <false/>
2308 <key>Downloads</key>
2309 <true/> | <false/>
2310 <key>FormData</key>
2311 <true/> | <false/>
2312 <key>History</key>
2313 <true/> | <false/>
2314 <key>Sessions</key>
2315 <true/> | <false/>
2316 <key>SiteSettings</key>
2317 <true/> | <false/>
2318 <key>OfflineApps</key>
2319 <true/> | <false/>
2320 </dict>
2321 </dict>
2322 ```
2323 #### JSON
2324 ```
2325 {
2326 "policies": {
2327 "SanitizeOnShutdown": {
2328 "Cache": true | false,
2329 "Cookies": true | false,
2330 "Downloads": true | false,
2331 "FormData": true | false,
2332 "History": true | false,
2333 "Sessions": true | false,
2334 "SiteSettings": true | false,
2335 "OfflineApps": true | false
2336 }
2337 }
2338 }
2339 ```
2340 ### SanitizeOnShutdown (All)
2341 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2342
2343 **Compatibility:** Firefox 60, Firefox ESR 60\
2344 **CCK2 Equivalent:** N/A\
2345 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2346 #### Windows
2347 ```
2348 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2349 ```
2350 #### macOS
2351 ```
2352 <dict>
2353 <key>SanitizeOnShutdown</key>
2354 <true/> | <false/>
2355 </dict>
2356 ```
2357 #### JSON
2358 ```
2359 {
2360 "policies": {
2361 "SanitizeOnShutdown": true | false
2362 }
2363 }
2364 ```
2365 ### SearchBar
2366 Set whether or not search bar is displayed.
2367
2368 **Compatibility:** Firefox 60, Firefox ESR 60\
2369 **CCK2 Equivalent:** `showSearchBar`\
2370 **Preferences Affected:** N/A
2371
2372 #### Windows
2373 ```
2374 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2375 ```
2376 #### macOS
2377 ```
2378 <dict>
2379 <key>SearchBar</key>
2380 <string>unified | separate</string>
2381 </dict>
2382 ```
2383
2384 #### JSON
2385 ```
2386 {
2387 "policies": {
2388 "SearchBar": "unified" | "separate"
2389 }
2390 }
2391 ```
2392
2393
2394
2395
2396
2397 ### SearchEngines (This policy is only available on the ESR.)
2398
2399 ### SearchEngines | Default
2400
2401 Set the default search engine. This policy is only available on the ESR.
2402
2403 **Compatibility:** Firefox ESR 60\
2404 **CCK2 Equivalent:** `defaultSearchEngine`\
2405 **Preferences Affected:** N/A
2406
2407 ### Windows
2408 ```
2409 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2410 ```
2411 #### macOS
2412 ```
2413 <dict>
2414 <key>SearchEngines</key>
2415 <dict>
2416 <key>Default</key>
2417 <string>NAME_OF_SEARCH_ENGINE</string>
2418 </dict>
2419 </dict>
2420 ```
2421 ### JSON
2422 ```
2423 {
2424 "policies": {
2425 "SearchEngines": {
2426 "Default": "NAME_OF_SEARCH_ENGINE"
2427 }
2428 }
2429 }
2430 ```
2431 ### SearchEngines | PreventInstalls
2432
2433 Prevent installing search engines from webpages.
2434
2435 **Compatibility:** Firefox ESR 60\
2436 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2437 **Preferences Affected:** N/A
2438
2439 ### Windows
2440 ```
2441 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2442 ```
2443 #### macOS
2444 ```
2445 <dict>
2446 <key>SearchEngines</key>
2447 <dict>
2448 <key>PreventInstalls</key>
2449 <true/> | <false/>
2450 </dict>
2451 </dict>
2452 ```
2453 ### JSON
2454 ```
2455 {
2456 "policies": {
2457 "SearchEngines": {
2458 "PreventInstalls": true | false
2459 }
2460 }
2461 }
2462 ```
2463 ### SearchEngines | Remove
2464
2465 Hide built-in search engines. This policy is only available on the ESR.
2466
2467 **Compatibility:** Firefox ESR 60.2\
2468 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2469 **Preferences Affected:** N/A
2470
2471 ### Windows
2472 ```
2473 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2474 ```
2475 #### macOS
2476 ```
2477 <dict>
2478 <key>SearchEngines</key>
2479 <dict>
2480 <key>Remove</key>
2481 <array>
2482 <string>NAME_OF_SEARCH_ENGINE</string>
2483 </array>
2484 </dict>
2485 </dict>
2486 ```
2487 ### JSON
2488 ```
2489 {
2490 "policies": {
2491 "SearchEngines": {
2492 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2493 }
2494 }
2495 }
2496 ```
2497 ### SearchEngines | Add
2498
2499 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2500
2501 `Name` is the name of the search engine.
2502
2503 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2504
2505 `Method` is either GET or POST
2506
2507 `IconURL` is a URL for the icon to use.
2508
2509 `Alias` is a keyword to use for the engine.
2510
2511 `Description` is a description of the search engine.
2512
2513 `PostData` is the POST data as name value pairs separated by &.
2514
2515 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2516
2517 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2518 **CCK2 Equivalent:** `searchplugins`\
2519 **Preferences Affected:** N/A
2520
2521 #### Windows
2522 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2523 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2524 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2525 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2526 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2527 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2528 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2529 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2530
2531 #### macOS
2532 ```
2533 <dict>
2534 <key>SearchEngines</key>
2535 <dict>
2536 <key>Add</key>
2537 <array>
2538 <dict>
2539 <key>Name</key>
2540 <string>Example1</string>
2541 <key>URLTemplate</key>
2542 <string>https://www.example.org/q={searchTerms}</string>
2543 <key>Method</key>
2544 <string>GET | POST </string>
2545 <key>IconURL</key>
2546 <string>https://www.example.org/favicon.ico</string>
2547 <key>Alias</key>
2548 <string>example</string>
2549 <key>Description</key>
2550 <string>Example Description</string>
2551 <key>SuggestURLTemplate</key>
2552 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2553 <key>PostData</key>
2554 <string>name=value&q={searchTerms}</string>
2555 </dict>
2556 <array>
2557 </dict>
2558 </dict>
2559 ```
2560 ### JSON
2561 ```
2562 {
2563 "policies": {
2564 "SearchEngines": {
2565 "Add": [
2566 {
2567 "Name": "Example1",
2568 "URLTemplate": "https://www.example.org/q={searchTerms}",
2569 "Method": "GET" | "POST",
2570 "IconURL": "https://www.example.org/favicon.ico",
2571 "Alias": "example",
2572 "Description": "Description",
2573 "PostData": "name=value&q={searchTerms}",
2574 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2575 }
2576 ]
2577 }
2578 }
2579 }
2580 ```
2581 ### SearchSuggestEnabled
2582
2583 Enable search suggestions.
2584
2585 **Compatibility:** Firefox 68, Firefox ESR 68\
2586 **CCK2 Equivalent:** N/A\
2587 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2588
2589 ### Windows
2590 ```
2591 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2592 ```
2593 #### macOS
2594 ```
2595 <dict>
2596 <key>SearchSuggestEnabled</key>
2597 <true/> | <false/>
2598 </dict>
2599 ```
2600 ### JSON
2601 ```
2602 {
2603 "policies": {
2604 "SearchSuggestEnabled": true | false
2605 }
2606 }
2607 ```
2608 ### SecurityDevices
2609
2610 Install PKCS #11 modules.
2611
2612 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2613 **CCK2 Equivalent:** `certs.devices`\
2614 **Preferences Affected:** N/A
2615
2616 #### Windows
2617 ```
2618 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2619 ```
2620 #### macOS
2621 ```
2622 <dict>
2623 <key>SecurityDevices</key>
2624 <dict>
2625 <key>NAME_OF_DEVICE</key>
2626 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2627 </dict>
2628 </dict>
2629 ```
2630
2631 #### JSON
2632 ```
2633 {
2634 "policies": {
2635 "SecurityDevices": {
2636 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2637 }
2638 }
2639 }
2640 ```
2641 ### SSLVersionMax
2642
2643 Set and lock the maximum version of TLS.
2644
2645 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2646 **CCK2 Equivalent:** N/A\
2647 **Preferences Affected:** `security.tls.version.max`
2648
2649 #### Windows
2650 ```
2651 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2652 ```
2653 #### macOS
2654 ```
2655 <dict>
2656 <key>SSLVersionMax</key>
2657 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2658 </dict>
2659 ```
2660
2661 #### JSON
2662 ```
2663 {
2664 "policies": {
2665 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2666 }
2667 }
2668 ```
2669 ### SSLVersionMin
2670
2671 Set and lock the minimum version of TLS.
2672
2673 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2674 **CCK2 Equivalent:** N/A\
2675 **Preferences Affected:** `security.tls.version.min`
2676
2677 #### Windows
2678 ```
2679 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2680 ```
2681 #### macOS
2682 ```
2683 <dict>
2684 <key>SSLVersionMin</key>
2685 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2686 </dict>
2687 ```
2688
2689 #### JSON
2690 ```
2691 {
2692 "policies": {
2693 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2694 }
2695 }
2696 ```
2697 ### SupportMenu
2698 Add a menuitem to the help menu for specifying support information.
2699
2700 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2701 **CCK2 Equivalent:** helpMenu\
2702 **Preferences Affected:** N/A
2703
2704 #### Windows
2705 ```
2706 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2707 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2708 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "S"
2709 ```
2710 #### macOS
2711 ```
2712 <dict>
2713 <key>SupportMenu</key>
2714 <dict>
2715 <key>Title</key>
2716 <string>SupportMenu</string>
2717 <key>URL</key>
2718 <string>http://example.com/support</string>
2719 <key>AccessKey</key>
2720 <string>S</string>
2721 </dict>
2722 </dict>
2723 ```
2724 ### JSON
2725 ```
2726 {
2727 "policies": {
2728 "SupportMenu": {
2729 "Title": "Support Menu",
2730 "URL": "http://example.com/support",
2731 "AccessKey": "S"
2732 }
2733 }
2734 }
2735 ```
2736 ### WebsiteFilter
2737 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2738
2739 **Compatibility:** Firefox 60, Firefox ESR 60\
2740 **CCK2 Equivalent:** N/A\
2741 **Preferences Affected:** N/A
2742
2743 #### Windows
2744 ```
2745 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2746 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2747 ```
2748 #### macOS
2749 ```
2750 <dict>
2751 <key>WebsiteFilter</key>
2752 <dict>
2753 <key>Block</key>
2754 <array>
2755 <string><all_urls></string>
2756 </array>
2757 <key>Exceptions</key>
2758 <array>
2759 <string>http://example.org/*</string>
2760 </array>
2761 </dict>
2762
2763 </dict>
2764 ```
2765 ### JSON
2766 ```
2767 {
2768 "policies": {
2769 "WebsiteFilter": {
2770 "Block": ["<all_urls>"],
2771 "Exceptions": ["http://example.org/*"]
2772 }
2773 }
2774 }
2775 ```

patrick-canterino.de