]> git.p6c8.net - policy-templates.git/blob - README.md
Intune updates
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### Windows (Intune)
111 OMA-URI:
112 ```
113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
114 ```
115 Value (string):
116 ```
117 <enabled/> or <disabled/>
118 ```
119 #### macOS
120 ```
121 <dict>
122 <key>AppAutoUpdate</key>
123 <true/> | <false/>
124 </dict>
125 ```
126 #### policies.json
127 ```
128 {
129 "policies": {
130 "AppAutoUpdate": true | false
131 }
132 }
133 ```
134 ### AppUpdateURL
135
136 Change the URL for application update.
137
138 **Compatibility:** Firefox 62, Firefox ESR 60.2\
139 **CCK2 Equivalent:** N/A\
140 **Preferences Affected:** `app.update.url`
141
142 #### Windows (GPO)
143 ```
144 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
145 ```
146 #### Windows (Intune)
147 OMA-URI:
148 ```
149 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
150 ```
151 Value (string):
152 ```
153 <enabled/>
154 <data id="AppUpdateURL" value="https://yoursite.com"/>
155 ```
156 #### macOS
157 ```
158 <dict>
159 <key>AppUpdateURL</key>
160 <string>https://yoursite.com</string>
161 </dict>
162 ```
163 #### policies.json
164 ```
165 {
166 "policies": {
167 "AppUpdateURL": "https://yoursite.com"
168 }
169 }
170 ```
171 ### Authentication
172
173 Configure sites that support integrated authentication.
174
175 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
176
177 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
178 **CCK2 Equivalent:** N/A\
179 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
180
181 #### Windows (GPO)
182 ```
183 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
184 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
185 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
186 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
190 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
191 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
192 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
194 ```
195 #### Windows (Intune)
196 OMA-URI:
197 ```
198 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
199 ```
200 Value (string):
201 ```
202 <enabled/>
203
204 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
205 ```
206 OMA-URI:
207 ```
208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
209 ```
210 Value (string):
211 ```
212 <enabled/>
213
214 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
215 ```
216 OMA-URI:
217 ```
218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
219 ```
220 Value (string):
221 ```
222 <enabled/>
223
224 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
225 ```
226 OMA-URI:
227 ```
228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
229 ```
230 Value (string):
231 ```
232 <enabled/>
233
234 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
235 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
236 ```
237 OMA-URI:
238 ```
239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
240 ```
241 Value (string):
242 ```
243 <enabled/>
244
245 <data id="StartPage" value="none | homepage | previous-session"/>
246 ```
247 #### macOS
248 ```
249 <dict>
250 <key>Authentication</key>
251 <dict>
252 <key>SPNEGO</key>
253 <array>
254 <string>mydomain.com</string>
255 <string>https://myotherdomain.com</string>
256 </array>
257 <key>Delegated</key>
258 <array>
259 <string>mydomain.com</string>
260 <string>https://myotherdomain.com</string>
261 </array>
262 <key>NTLM</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>AllowNonFQDN</key>
268 <dict>
269 <key>SPNEGO</key>
270 <true/> | <false/>
271 <key>NTLM</key>
272 <true/> | <false/>
273 </dict>
274 <key>AllowProxies</key>
275 <dict>
276 <key>SPNEGO</key>
277 <true/> | <false/>
278 <key>NTLM</key>
279 <true/> | <false/>
280 </dict>
281 <key>Locked</key>
282 <true/> | <false/>
283 </dict>
284 </dict>
285 ```
286 #### policies.json
287 ```
288 {
289 "policies": {
290 "Authentication": {
291 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
292 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
293 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
294 "AllowNonFQDN": {
295 "SPNEGO": true | false,
296 "NTLM": true | false
297 },
298 "AllowProxies": {
299 "SPNEGO": true | false,
300 "NTLM": true | false
301 },
302 "Locked": true | false
303 }
304 }
305 }
306 ```
307 ### BlockAboutAddons
308
309 Block access to the Add-ons Manager (about:addons).
310
311 **Compatibility:** Firefox 60, Firefox ESR 60\
312 **CCK2 Equivalent:** `disableAddonsManager`\
313 **Preferences Affected:** N/A
314
315 #### Windows (GPO)
316 ```
317 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
318 ```
319 #### Windows (Intune)
320 OMA-URI:
321 ```
322 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
323 ```
324 Value (string):
325 ```
326 <enabled/> or <disabled/>
327 ```
328 #### macOS
329 ```
330 <dict>
331 <key>BlockAboutAddons</key>
332 <true/> | <false/>
333 </dict>
334 ```
335 #### policies.json
336 ```
337 {
338 "policies": {
339 "BlockAboutAddons": true | false
340 }
341 }
342 ```
343 ### BlockAboutConfig
344
345 Block access to about:config.
346
347 **Compatibility:** Firefox 60, Firefox ESR 60\
348 **CCK2 Equivalent:** `disableAboutConfig`\
349 **Preferences Affected:** N/A
350
351 #### Windows (GPO)
352 ```
353 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
354 ```
355 #### Windows (Intune)
356 OMA-URI:
357 ```
358 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
359 ```
360 Value (string):
361 ```
362 <enabled/> or <disabled/>
363 ```
364 #### macOS
365 ```
366 <dict>
367 <key>BlockAboutConfig</key>
368 <true/> | <false/>
369 </dict>
370 ```
371 #### policies.json
372 ```
373 {
374 "policies": {
375 "BlockAboutConfig": true | false
376 }
377 }
378 ```
379 ### BlockAboutProfiles
380
381 Block access to About Profiles (about:profiles).
382
383 **Compatibility:** Firefox 60, Firefox ESR 60\
384 **CCK2 Equivalent:** `disableAboutProfiles`\
385 **Preferences Affected:** N/A
386
387 #### Windows (GPO)
388 ```
389 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
390 ```
391 #### Windows (Intune)
392 OMA-URI:
393 ```
394 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
395 ```
396 Value (string):
397 ```
398 <enabled/> or <disabled/>
399 ```
400 #### macOS
401 ```
402 <dict>
403 <key>BlockAboutProfiles</key>
404 <true/> | <false/>
405 </dict>
406 ```
407 #### policies.json
408 ```
409 {
410 "policies": {
411 "BlockAboutProfiles": true | false
412 }
413 }
414 ```
415 ### BlockAboutSupport
416
417 Block access to Troubleshooting Information (about:support).
418
419 **Compatibility:** Firefox 60, Firefox ESR 60\
420 **CCK2 Equivalent:** `disableAboutSupport`\
421 **Preferences Affected:** N/A
422
423 #### Windows (GPO)
424 ```
425 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
426 ```
427 #### Windows (Intune)
428 OMA-URI:
429 ```
430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
431 ```
432 Value (string):
433 ```
434 <enabled/> or <disabled/>
435 ```
436 #### macOS
437 ```
438 <dict>
439 <key>BlockAboutSupport</key>
440 <true/> | <false/>
441 </dict>
442 ```
443 #### policies.json
444 ```
445 {
446 "policies": {
447 "BlockAboutSupport": true | false
448 }
449 }
450 ```
451 ### Bookmarks
452
453 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
454
455 **Compatibility:** Firefox 60, Firefox ESR 60\
456 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
457 **Preferences Affected:** N/A
458
459 #### Windows (GPO)
460 ```
461 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
462 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
463 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
464 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
465 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
466 ```
467 #### Windows (Intune)
468 OMA-URI:
469 ```
470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
471 ```
472 Value (string):
473 ```
474 <enabled/>
475 <data id="BookmarkTitle" value="Example"/>
476 <data id="BookmarkURL" value="https://example.com"/>
477 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
478 <data id="BookmarkPlacement" value="toolbar | menu"/>
479 <data id="BookmarkFolder" value="FolderName"/>
480 ```
481 #### macOS
482 ```
483 <dict>
484 <key>Bookmarks</key>
485 <array>
486 <dict>
487 <key>Title</key>
488 <string>Example</string>
489 <key>URL</key>
490 <string>https://example.com</string>
491 <key>Favicon</key>
492 <string>https://example.com/favicon.ico</string>
493 <key>Placement</key>
494 <string>toolbar | menu</string>
495 <key>Folder</key>
496 <string>FolderName</string>
497 </dict>
498 </array>
499 </dict>
500 ```
501 #### policies.json
502 ```
503 {
504 "policies": {
505 "Bookmarks": [
506 {
507 "Title": "Example",
508 "URL": "https://example.com",
509 "Favicon": "https://example.com/favicon.ico",
510 "Placement": "toolbar" | "menu",
511 "Folder": "FolderName"
512 }
513 ]
514 }
515 }
516 ```
517 ### CaptivePortal
518 Enable or disable the detection of captive portals.
519
520 **Compatibility:** Firefox 67, Firefox ESR 60.7\
521 **CCK2 Equivalent:** N/A\
522 **Preferences Affected:** `network.captive-portal-service.enabled`
523
524 #### Windows (GPO)
525 ```
526 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
527 ```
528 #### Windows (Intune)
529 OMA-URI:
530 ```
531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
532 ```
533 Value (string):
534 ```
535 <enabled/> or <disabled/>
536 ```
537 #### macOS
538 ```
539 <dict>
540 <key>CaptivePortal</key>
541 <true/> | <false/>
542 </dict>
543 ```
544 #### policies.json
545 ```
546 {
547 "policies": {
548 "CaptivePortal": true | false
549 }
550 }
551 ```
552 ### Certificates
553
554 ### Certificates | ImportEnterpriseRoots
555
556 Trust certificates that have been added to the operating system certificate store by a user or administrator.
557
558 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
559
560 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
561 **CCK2 Equivalent:** N/A\
562 **Preferences Affected:** `security.enterprise_roots.enabled`
563
564 #### Windows (GPO)
565 ```
566 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
567 ```
568 #### Windows (Intune)
569 OMA-URI:
570 ```
571 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
572 ```
573 Value (string):
574 ```
575 <enabled/> or <disabled/>
576 ```
577 #### macOS
578 ```
579 <dict>
580 <key>Certificates</key>
581 <dict>
582 <key>ImportEnterpriseRoots</key>
583 <true/> | <false/>
584 </dict>
585 </dict>
586 ```
587 #### policies.json
588 ```
589 {
590 "policies": {
591 "Certificates": {
592 "ImportEnterpriseRoots": true | false
593 }
594 }
595 }
596 ```
597 ### Certificates | Install
598
599 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
600
601 - Windows
602 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
603 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
604 - macOS
605 - /Library/Application Support/Mozilla/Certificates
606 - ~/Library/Application Support/Mozilla/Certificates
607 - Linux
608 - /usr/lib/mozilla/certificates
609 - /usr/lib64/mozilla/certificates
610 - ~/.mozilla/certificates
611
612 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
613
614 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
615
616 Certificates are installed using the trust string `CT,CT,`.
617
618 Binary (DER) and ASCII (PEM) certificates are both supported.
619
620 **Compatibility:** Firefox 64, Firefox ESR 64\
621 **CCK2 Equivalent:** `certs.ca`\
622 **Preferences Affected:** N/A
623
624 #### Windows (GPO)
625 ```
626 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
627 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
628 ```
629 #### Windows (Intune)
630 OMA-URI:
631 ```
632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
633 ```
634 Value (string):
635 ```
636 <enabled/>
637 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
638 ```
639 #### macOS
640 ```
641 <dict>
642 <key>Certificates</key>
643 <dict>
644 <key>Install</key>
645 <array>
646 <string>cert1.der</string>
647 <string>/Users/username/cert2.pem</string>
648 </array>
649 </dict>
650 </dict>
651 ```
652 #### policies.json
653 ```
654 {
655 "policies": {
656 "Certificates": {
657 "Install": ["cert1.der", "/home/username/cert2.pem"]
658 }
659 }
660 }
661 ```
662 ### Cookies
663 Configure cookie preferences.
664
665 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
666
667 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
668
669 `Default` determines whether cookies are accepted at all.
670
671 `AcceptThirdParty` determines how third-party cookies are handled.
672
673 `ExpireAtSessionEnd` determines when cookies expire.
674
675 `RejectTracker` only rejects cookies for trackers.
676
677 `Locked` prevents the user from changing cookie preferences.
678
679 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
680 **CCK2 Equivalent:** N/A\
681 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
682
683 #### Windows (GPO)
684 ```
685 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
686 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
687 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
688 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
689 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
690 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
691 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
692 ```
693 #### Windows (Intune)
694 OMA-URI:
695 ```
696 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
697 ```
698 Value (string):
699 ```
700 <enabled/>
701 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
702 ```
703 OMA-URI:
704 ```
705 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
706 ```
707 Value (string):
708 ```
709 <enabled/>
710 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
711 ```
712 OMA-URI:
713 ```
714 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
715 ```
716 Value (string):
717 ```
718 <enabled/> or <disabled/>
719 ```
720 OMA-URI:
721 ```
722 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
723 ```
724 Value (string):
725 ```
726 <enabled/>
727 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
728 ```
729 OMA-URI:
730 ```
731 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
732 ```
733 Value (string):
734 ```
735 <enabled/> or <disabled/>
736 ```
737 OMA-URI:
738 ```
739 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
740 ```
741 Value (string):
742 ```
743 <enabled/> or <disabled/>
744 ```
745 OMA-URI:
746 ```
747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
748 ```
749 Value (string):
750 ```
751 <enabled/> or <disabled/>
752 ```
753 #### macOS
754 ```
755 <dict>
756 <key>Cookies</key>
757 <dict>
758 <key>Allow</key>
759 <array>
760 <string>http://example.com</string>
761 </array>
762 <key>Block</key>
763 <array>
764 <string>http://example.org</string>
765 </array>
766 <key>Default</key>
767 <true/> | <false/>
768 <key>AcceptThirdParty</key>
769 <string>always | never | from-visited</string>
770 <key>ExpireAtSessionEnd</key>
771 <true/> | <false/>
772 <key>RejectTracker</key>
773 <true/> | <false/>
774 <key>Locked</key>
775 <true/> | <false/>
776 </dict>
777 </dict>
778 ```
779 #### policies.json
780 ```
781 {
782 "policies": {
783 "Cookies": {
784 "Allow": ["http://example.org/"],
785 "Block": ["http://example.edu/"],
786 "Default": true | false,
787 "AcceptThirdParty": "always" | "never" | "from-visited",
788 "ExpireAtSessionEnd": true | false,
789 "RejectTracker": true | false,
790 "Locked": true | false
791 }
792 }
793 }
794 ```
795 ### DisableSetDesktopBackground
796 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
797
798 **Compatibility:** Firefox 60, Firefox ESR 60\
799 **CCK2 Equivalent:** `removeSetDesktopBackground`\
800 **Preferences Affected:** N/A
801
802 #### Windows (GPO)
803 ```
804 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
805 ```
806 #### Windows (Intune)
807 OMA-URI:
808 ```
809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
810 ```
811 Value (string):
812 ```
813 <enabled/> or <disabled/>
814 ```
815 #### macOS
816 ```
817 <dict>
818 <key>DisableSetDesktopBackground</key>
819 <true/> | <false/>
820 </dict>
821 ```
822 #### policies.json
823 ```
824 {
825 "policies": {
826 "DisableSetDesktopBackground": true | false
827 }
828 }
829 ```
830 ### DisableMasterPasswordCreation
831 Remove the master password functionality.
832
833 **Compatibility:** Firefox 60, Firefox ESR 60\
834 **CCK2 Equivalent:** `noMasterPassword`\
835 **Preferences Affected:** N/A
836
837 #### Windows (GPO)
838 ```
839 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
840 ```
841 #### Windows (Intune)
842 OMA-URI:
843 ```
844 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
845 ```
846 Value (string):
847 ```
848 <enabled/> or <disabled/>
849 ```
850 #### macOS
851 ```
852 <dict>
853 <key>DisableMasterPasswordCreation</key>
854 <true/> | <false/>
855 </dict>
856 ```
857 #### policies.json
858 ```
859 {
860 "policies": {
861 "DisableMasterPasswordCreation": true | false
862 }
863 }
864 ```
865 ### DisableAppUpdate
866 Turn off application updates.
867
868 **Compatibility:** Firefox 60, Firefox ESR 60\
869 **CCK2 Equivalent:** `disableFirefoxUpdates`\
870 **Preferences Affected:** N/A
871
872 #### Windows (GPO)
873 ```
874 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
875 ```
876 #### Windows (Intune)
877 OMA-URI:
878 ```
879 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
880 ```
881 Value (string):
882 ```
883 <enabled/> or <disabled/>
884 ```
885 #### macOS
886 ```
887 <dict>
888 <key>DisableAppUpdate</key>
889 <true/> | <false/>
890 </dict>
891 ```
892 #### policies.json
893 ```
894 {
895 "policies": {
896 "DisableAppUpdate": true | false
897 }
898 }
899 ```
900 ### DisableBuiltinPDFViewer
901 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
902
903 **Compatibility:** Firefox 60, Firefox ESR 60\
904 **CCK2 Equivalent:** `disablePDFjs`\
905 **Preferences Affected:** `pdfjs.disabled`
906
907 #### Windows (GPO)
908 ```
909 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
910 ```
911 #### Windows (Intune)
912 OMA-URI:
913 ```
914 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
915 ```
916 Value (string):
917 ```
918 <enabled/> or <disabled/>
919 ```
920 #### macOS
921 ```
922 <dict>
923 <key>DisableBuiltinPDFViewer</key>
924 <true/> | <false/>
925 </dict>
926 ```
927 #### policies.json
928 ```
929 {
930 "policies": {
931 "DisableBuiltinPDFViewer": true | false
932 }
933 }
934 ```
935 ### DisableDefaultBrowserAgent
936 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
937
938 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
939 **CCK2 Equivalent:** N/A\
940 **Preferences Affected:** N/A
941
942 #### Windows (GPO)
943 ```
944 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
945 ```
946 #### Windows (Intune)
947 OMA-URI:
948 ```
949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
950 ```
951 Value (string):
952 ```
953 <enabled/> or <disabled/>
954 ```
955 #### policies.json
956 ```
957 {
958 "policies": {
959 "DisableDefaultBrowserAgent": true | false
960 }
961 }
962 ```
963 ### DisableDeveloperTools
964 Remove access to all developer tools.
965
966 **Compatibility:** Firefox 60, Firefox ESR 60\
967 **CCK2 Equivalent:** `removeDeveloperTools`\
968 **Preferences Affected:** `devtools.policy.disabled`
969
970 #### Windows (GPO)
971 ```
972 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
973 ```
974 #### Windows (Intune)
975 OMA-URI:
976 ```
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
978 ```
979 Value (string):
980 ```
981 <enabled/> or <disabled/>
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisableDeveloperTools</key>
987 <true/> | <false/>
988 </dict>
989 ```
990 #### policies.json
991 ```
992 {
993 "policies": {
994 "DisableDeveloperTools": true | false
995 }
996 }
997 ```
998 ### DisableFeedbackCommands
999 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1000
1001 **Compatibility:** Firefox 60, Firefox ESR 60\
1002 **CCK2 Equivalent:** N/A\
1003 **Preferences Affected:** N/A
1004
1005 #### Windows (GPO)
1006 ```
1007 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1008 ```
1009 #### Windows (Intune)
1010 OMA-URI:
1011 ```
1012 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1013 ```
1014 Value (string):
1015 ```
1016 <enabled/> or <disabled/>
1017 ```
1018 #### macOS
1019 ```
1020 <dict>
1021 <key>DisableFeedbackCommands</key>
1022 <true/> | <false/>
1023 </dict>
1024 ```
1025 #### policies.json
1026 ```
1027 {
1028 "policies": {
1029 "DisableFeedbackCommands": true | false
1030 }
1031 }
1032 ```
1033 ### DisableFirefoxScreenshots
1034 Remove access to Firefox Screenshots.
1035
1036 **Compatibility:** Firefox 60, Firefox ESR 60\
1037 **CCK2 Equivalent:** N/A\
1038 **Preferences Affected:** `extensions.screenshots.disabled`
1039
1040 #### Windows (GPO)
1041 ```
1042 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1043 ```
1044 #### Windows (Intune)
1045 OMA-URI:
1046 ```
1047 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1048 ```
1049 Value (string):
1050 ```
1051 <enabled/> or <disabled/>
1052 ```
1053 #### macOS
1054 ```
1055 <dict>
1056 <key>DisableFirefoxScreenshots</key>
1057 <true/> | <false/>
1058 </dict>
1059 ```
1060 #### policies.json
1061 ```
1062 {
1063 "policies": {
1064 "DisableFirefoxScreenshots": true | false
1065 }
1066 }
1067 ```
1068 ### DisableFirefoxAccounts
1069 Disable Firefox Accounts integration (Sync).
1070
1071 **Compatibility:** Firefox 60, Firefox ESR 60\
1072 **CCK2 Equivalent:** `disableSync`\
1073 **Preferences Affected:** `identity.fxaccounts.enabled`
1074
1075 #### Windows (GPO)
1076 ```
1077 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1078 ```
1079 #### Windows (Intune)
1080 OMA-URI:
1081 ```
1082 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1083 ```
1084 Value (string):
1085 ```
1086 <enabled/> or <disabled/>
1087 ```
1088 #### macOS
1089 ```
1090 <dict>
1091 <key>DisableFirefoxAccounts</key>
1092 <true/> | <false/>
1093 </dict>
1094 ```
1095 #### policies.json
1096 ```
1097 {
1098 "policies": {
1099 "DisableFirefoxAccounts": true | false
1100 }
1101 }
1102 ```
1103 ### DisableFirefoxStudies
1104 Disable Firefox studies (Shield).
1105
1106 **Compatibility:** Firefox 60, Firefox ESR 60\
1107 **CCK2 Equivalent:** N/A\
1108 **Preferences Affected:** N/A
1109
1110 #### Windows (GPO)
1111 ```
1112 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1113 ```
1114 #### Windows (Intune)
1115 OMA-URI:
1116 ```
1117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1118 ```
1119 Value (string):
1120 ```
1121 <enabled/> or <disabled/>
1122 ```
1123 #### macOS
1124 ```
1125 <dict>
1126 <key>DisableFirefoxStudies</key>
1127 <true/> | <false/>
1128 </dict>
1129 ```
1130 #### policies.json
1131 ```
1132 {
1133 "policies": {
1134 "DisableFirefoxStudies": true | false
1135 }
1136 }
1137 ```
1138 ### DisableForgetButton
1139 Disable the "Forget" button.
1140
1141 **Compatibility:** Firefox 60, Firefox ESR 60\
1142 **CCK2 Equivalent:** `disableForget`\
1143 **Preferences Affected:** N/A
1144
1145 #### Windows (GPO)
1146 ```
1147 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1148 ```
1149 #### Windows (Intune)
1150 OMA-URI:
1151 ```
1152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1153 ```
1154 Value (string):
1155 ```
1156 <enabled/> or <disabled/>
1157 ```
1158 #### macOS
1159 ```
1160 <dict>
1161 <key>DisableForgetButton</key>
1162 <true/> | <false/>
1163 </dict>
1164 ```
1165 #### policies.json
1166 ```
1167 {
1168 "policies": {
1169 "DisableForgetButton": true | false
1170 }
1171 }
1172 ```
1173 ### DisableFormHistory
1174 Turn off saving information on web forms and the search bar.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60\
1177 **CCK2 Equivalent:** `disableFormFill`\
1178 **Preferences Affected:** ` browser.formfill.enable`
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1183 ```
1184 #### Windows (Intune)
1185 OMA-URI:
1186 ```
1187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1188 ```
1189 Value (string):
1190 ```
1191 <enabled/> or <disabled/>
1192 ```
1193 #### macOS
1194 ```
1195 <dict>
1196 <key>DisableFormHistory</key>
1197 <true/> | <false/>
1198 </dict>
1199 ```
1200 #### policies.json
1201 ```
1202 {
1203 "policies": {
1204 "DisableFormHistory": true | false
1205 }
1206 }
1207 ```
1208 ### DisablePasswordReveal
1209 Do not allow passwords to be shown in saved logins
1210
1211 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1212 **CCK2 Equivalent:** N/A
1213 **Preferences Affected:** N/A
1214
1215 #### Windows (GPO)
1216 ```
1217 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1218 ```
1219 #### Windows (Intune)
1220 OMA-URI:
1221 ```
1222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1223 ```
1224 Value (string):
1225 ```
1226 <enabled/> or <disabled/>
1227 ```
1228 #### macOS
1229 ```
1230 <dict>
1231 <key>DisablePasswordReveal</key>
1232 <true/> | <false/>
1233 </dict>
1234 ```
1235 #### policies.json
1236 ```
1237 {
1238 "policies": {
1239 "DisablePasswordReveal": true | false
1240 }
1241 }
1242 ```
1243 ### DisablePocket
1244 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1245
1246 **Compatibility:** Firefox 60, Firefox ESR 60\
1247 **CCK2 Equivalent:** `disablePocket`\
1248 **Preferences Affected:** `extensions.pocket.enabled`
1249
1250 #### Windows (GPO)
1251 ```
1252 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1253 ```
1254 #### Windows (Intune)
1255 OMA-URI:
1256 ```
1257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1258 ```
1259 Value (string):
1260 ```
1261 <enabled/> or <disabled/>
1262 ```
1263 #### macOS
1264 ```
1265 <dict>
1266 <key>DisablePocket</key>
1267 <true/> | <false/>
1268 </dict>
1269 ```
1270 #### policies.json
1271 ```
1272 {
1273 "policies": {
1274 "DisablePocket": true | false
1275 }
1276 }
1277 ```
1278 ### DisablePrivateBrowsing
1279 Remove access to private browsing.
1280
1281 **Compatibility:** Firefox 60, Firefox ESR 60\
1282 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1283 **Preferences Affected:** N/A
1284
1285 #### Windows (GPO)
1286 ```
1287 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1288 ```
1289 #### Windows (Intune)
1290 OMA-URI:
1291 ```
1292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1293 ```
1294 Value (string):
1295 ```
1296 <enabled/> or <disabled/>
1297 ```
1298 #### macOS
1299 ```
1300 <dict>
1301 <key>DisablePrivateBrowsing</key>
1302 <true/> | <false/>
1303 </dict>
1304 ```
1305 #### policies.json
1306 ```
1307 {
1308 "policies": {
1309 "DisablePrivateBrowsing": true | false
1310 }
1311 }
1312 ```
1313 ### DisableProfileImport
1314 Disables the "Import data from another browser" option in the bookmarks window.
1315
1316 **Compatibility:** Firefox 60, Firefox ESR 60\
1317 **CCK2 Equivalent:** N/A\
1318 **Preferences Affected:** N/A
1319
1320 #### Windows (GPO)
1321 ```
1322 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1323 ```
1324 #### Windows (Intune)
1325 OMA-URI:
1326 ```
1327 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1328 ```
1329 Value (string):
1330 ```
1331 <enabled/> or <disabled/>
1332 ```
1333 #### macOS
1334 ```
1335 <dict>
1336 <key>DisableProfileImport</key>
1337 <true/> | <false/>
1338 </dict>
1339 ```
1340 #### policies.json
1341 ```
1342 {
1343 "policies": {
1344 "DisableProfileImport": true | false
1345 }
1346 }
1347 ```
1348 ### DisableProfileRefresh
1349 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1350
1351 **Compatibility:** Firefox 60, Firefox ESR 60\
1352 **CCK2 Equivalent:** `disableResetFirefox`\
1353 **Preferences Affected:** `browser.disableResetPrompt`
1354
1355 #### Windows (GPO)
1356 ```
1357 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1358 ```
1359 #### Windows (Intune)
1360 OMA-URI:
1361 ```
1362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1363 ```
1364 Value (string):
1365 ```
1366 <enabled/> or <disabled/>
1367 ```
1368 #### macOS
1369 ```
1370 <dict>
1371 <key>DisableProfileRefresh</key>
1372 <true/> | <false/>
1373 </dict>
1374 ```
1375 #### policies.json
1376 ```
1377 {
1378 "policies": {
1379 "DisableProfileRefresh": true | false
1380 }
1381 }
1382 ```
1383 ### DisableSafeMode
1384 Disable safe mode within the browser.
1385
1386 On Windows, this disables safe mode via the command line as well.
1387
1388 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1389 **CCK2 Equivalent:** `disableSafeMode`\
1390 **Preferences Affected:** N/A
1391
1392 #### Windows (GPO)
1393 ```
1394 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1395 ```
1396 #### Windows (Intune)
1397 OMA-URI:
1398 ```
1399 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1400 ```
1401 Value (string):
1402 ```
1403 <enabled/> or <disabled/>
1404 ```
1405 #### macOS
1406 ```
1407 <dict>
1408 <key>DisableSafeMode</key>
1409 <true/> | <false/>
1410 </dict>
1411 ```
1412 #### policies.json
1413 ```
1414 {
1415 "policies": {
1416 "DisableSafeMode": true | false
1417 }
1418 }
1419 ```
1420 ### DisableSecurityBypass
1421 Prevent the user from bypassing security in certain cases.
1422
1423 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1424
1425 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** N/A\
1429 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1434 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1435 ```
1436 #### Windows (Intune)
1437 OMA-URI:
1438 ```
1439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1440 ```
1441 Value (string):
1442 ```
1443 <enabled/> or <disabled/>
1444 ```
1445 OMA-URI:
1446 ```
1447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1448 ```
1449 Value (string):
1450 ```
1451 <enabled/> or <disabled/>
1452 ```
1453
1454 #### macOS
1455 ```
1456 <dict>
1457 <key>DisableSecurityBypass</key>
1458 <dict>
1459 <key>InvalidCertificate</key>
1460 <true/> | <false/>
1461 <key><SafeBrowsing/key>
1462 <true/> | <false/>
1463 </dict>
1464 </dict>
1465 ```
1466 #### policies.json
1467 ```
1468 {
1469 "policies": {
1470 "DisableSecurityBypass": {
1471 "InvalidCertificate": true false,
1472 "SafeBrowsing": true false
1473 }
1474 }
1475 }
1476 ```
1477 ### DisableSystemAddonUpdate
1478 Prevent system add-ons from being installed or update.
1479
1480 **Compatibility:** Firefox 60, Firefox ESR 60\
1481 **CCK2 Equivalent:** N/A\
1482 **Preferences Affected:** N/A
1483
1484 #### Windows (GPO)
1485 ```
1486 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1487 ```
1488 #### Windows (Intune)
1489 OMA-URI:
1490 ```
1491 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1492 ```
1493 Value (string):
1494 ```
1495 <enabled/> or <disabled/>
1496 ```
1497 #### macOS
1498 ```
1499 <dict>
1500 <key>DisableSystemAddonUpdate</key>
1501 <true/> | <false/>
1502 </dict>
1503 ```
1504 #### policies.json
1505 ```
1506 {
1507 "policies": {
1508 "DisableSystemAddonUpdate": true | false
1509 }
1510 }
1511 ```
1512 ### DisableTelemetry
1513 Prevent the upload of telemetry data.
1514
1515 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1516
1517 **Compatibility:** Firefox 60, Firefox ESR 60\
1518 **CCK2 Equivalent:** `disableTelemetry`\
1519 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1520
1521 #### Windows (GPO)
1522 ```
1523 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1524 ```
1525 #### Windows (Intune)
1526 OMA-URI:
1527 ```
1528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1529 ```
1530 Value (string):
1531 ```
1532 <enabled/> or <disabled/>
1533 ```
1534 #### macOS
1535 ```
1536 <dict>
1537 <key>DisableTelemetry</key>
1538 <true/> | <false/>
1539 </dict>
1540 ```
1541 #### policies.json
1542 ```
1543 {
1544 "policies": {
1545 "DisableTelemetry": true | false
1546 }
1547 }
1548 ```
1549 ### DisplayBookmarksToolbar
1550 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1551
1552 **Compatibility:** Firefox 60, Firefox ESR 60\
1553 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1554 **Preferences Affected:** N/A
1555
1556 #### Windows (GPO)
1557 ```
1558 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1559 ```
1560 #### Windows (Intune)
1561 OMA-URI:
1562 ```
1563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1564 ```
1565 Value (string):
1566 ```
1567 <enabled/> or <disabled/>
1568 ```
1569 #### macOS
1570 ```
1571 <dict>
1572 <key>DisplayBookmarksToolbar</key>
1573 <true/> | <false/>
1574 </dict>
1575 ```
1576 #### policies.json
1577 ```
1578 {
1579 "policies": {
1580 "DisplayBookmarksToolbar": true | false
1581 }
1582 }
1583 ```
1584 ### DisplayMenuBar (Deprecated)
1585 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1586
1587 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1588 **CCK2 Equivalent:** `displayMenuBar`\
1589 **Preferences Affected:** N/A
1590
1591 #### Windows (GPO)
1592 ```
1593 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1594 ```
1595 #### macOS
1596 ```
1597 <dict>
1598 <key>DisplayMenuBar</key>
1599 <true/> | <false/>
1600 </dict>
1601 ```
1602 #### policies.json
1603 ```
1604 {
1605 "policies": {
1606 "DisplayMenuBar": true | false
1607 }
1608 }
1609 ```
1610 ### DisplayMenuBar
1611 Set the state of the menubar.
1612
1613 `always` means the menubar is shown and cannot be hidden.
1614
1615 `never` means the menubar is hidden and cannot be shown.
1616
1617 `default-on` means the menubar is on by default but can be hidden.
1618
1619 `default-off` means the menubar is off by default but can be shown.
1620
1621 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1622 **CCK2 Equivalent:** `displayMenuBar`\
1623 **Preferences Affected:** N/A
1624
1625 #### Windows (GPO)
1626 ```
1627 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1628 ```
1629 #### Windows (Intune)
1630 OMA-URI:
1631 ```
1632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1633 ```
1634 Value (string):
1635 ```
1636 <enabled/>
1637 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1638 ```
1639 #### macOS
1640 ```
1641 <dict>
1642 <key>DisplayMenuBar</key>
1643 <string>always | never | default-on | default-off</string>
1644 </dict>
1645 ```
1646 #### policies.json
1647 ```
1648 {
1649 "policies": {
1650 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1651 }
1652 }
1653 ```
1654 ### DNSOverHTTPS
1655 Configure DNS over HTTPS.
1656
1657 `Enabled` determines whether DNS over HTTPS is enabled
1658
1659 `ProviderURL` is a URL to another provider.
1660
1661 `Locked` prevents the user from changing DNS over HTTPS preferences.
1662
1663 `ExcludedDomains` excludes domains from DNS over HTTPS.
1664
1665 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1666 **CCK2 Equivalent:** N/A\
1667 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1668
1669 #### Windows (GPO)
1670 ```
1671 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1672 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1673 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1674 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1675 ```
1676 #### macOS
1677 ```
1678 <dict>
1679 <key>DNSOverHTTPS</key>
1680 <dict>
1681 <key>Enabled</key>
1682 <true/> | <false/>
1683 <key>ProviderURL</key>
1684 <string>URL_TO_ALTERNATE_PROVIDER</string>
1685 <key>Locked</key>
1686 <true/> | <false/>
1687 <key>ExcludedDomains</key>
1688 <array>
1689 <string>example.com</string>
1690 </array>
1691 </dict>
1692 </dict>
1693 ```
1694 #### policies.json
1695 ```
1696 {
1697 "policies": {
1698 "DNSOverHTTPS": {
1699 "Enabled": true | false,
1700 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1701 "Locked": true | false,
1702 "ExcludedDomains": ["example.com"]
1703 }
1704 }
1705 }
1706 ```
1707 ### DontCheckDefaultBrowser
1708 Don't check if Firefox is the default browser at startup.
1709
1710 **Compatibility:** Firefox 60, Firefox ESR 60\
1711 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1712 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1713
1714 #### Windows (GPO)
1715 ```
1716 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1717 ```
1718 #### macOS
1719 ```
1720 <dict>
1721 <key>DontCheckDefaultBrowser</key>
1722 <true/> | <false/>
1723 </dict>
1724 ```
1725 #### policies.json
1726 ```
1727 {
1728 "policies": {
1729 "DontCheckDefaultBrowser": true | false
1730 }
1731 }
1732 ```
1733 ### DefaultDownloadDirectory
1734 Set the default download directory.
1735
1736 You can use ${home} for the native home directory.
1737
1738 **Compatibility:** Firefox 68, Firefox ESR 68\
1739 **CCK2 Equivalent:** N/A\
1740 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1741
1742 #### Windows (GPO)
1743 ```
1744 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1745 ```
1746 #### macOS
1747 ```
1748 <dict>
1749 <key>DefaultDownloadDirectory</key>
1750 <string>${home}/Downloads</string>
1751 </dict>
1752 ```
1753 #### policies.json (macOS and Linux)
1754 ```
1755 {
1756 "policies": {
1757 "DefaultDownloadDirectory": "${home}/Downloads"
1758 }
1759 ```
1760 #### policies.json (Windows)
1761 ```
1762 {
1763 "policies": {
1764 "DefaultDownloadDirectory": "${home}\\Downloads"
1765 }
1766 ```
1767 ### DownloadDirectory
1768 Set and lock the download directory.
1769
1770 You can use ${home} for the native home directory.
1771
1772 **Compatibility:** Firefox 68, Firefox ESR 68\
1773 **CCK2 Equivalent:** N/A\
1774 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1775
1776 #### Windows (GPO)
1777 ```
1778 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1779 ```
1780 #### macOS
1781 ```
1782 <dict>
1783 <key>DownloadDirectory</key>
1784 <string>${home}/Downloads</string>
1785 </dict>
1786 ```
1787 #### policies.json (macOS and Linux)
1788 ```
1789 {
1790 "policies": {
1791 "DownloadDirectory": "${home}/Downloads"
1792 }
1793 ```
1794 #### policies.json (Windows)
1795 ```
1796 {
1797 "policies": {
1798 "DownloadDirectory": "${home}\\Downloads"
1799 }
1800 ```
1801 ### EnableTrackingProtection
1802 Configure tracking protection.
1803
1804 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1805
1806 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1807
1808 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1809
1810 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1811
1812 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1813
1814 `Exceptions` are origins for which tracking protection is not enabled.
1815
1816 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1817 **CCK2 Equivalent:** N/A\
1818 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1819
1820 #### Windows (GPO)
1821 ```
1822 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1823 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1824 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1825 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1826 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>EnableTrackingProtection</key>
1832 <dict>
1833 <key>Value</key>
1834 <true/> | <false/>
1835 <key><Locked</key>
1836 <true/> | <false/>
1837 <key><Cryptomining</key>
1838 <true/> | <false/>
1839 <key><Fingerprinting</key>
1840 <true/> | <false/>
1841 <key>Exceptions</key>
1842 <array>
1843 <string>https://example.com</string>
1844 </array>
1845 </dict>
1846 </dict>
1847 ```
1848 #### policies.json
1849 ```
1850 {
1851 "policies": {
1852 "EnableTrackingProtection": {
1853 "Value": [true, false],
1854 "Locked": [true, false],
1855 "Cryptomining": [true, false],
1856 "Fingerprinting": [true, false],
1857 "Exceptions": ["https://example.com"]
1858 }
1859 }
1860 ```
1861 ### EnterprisePoliciesEnabled
1862 Enable policy support on macOS.
1863
1864 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1865 **CCK2 Equivalent:** N/A\
1866 **Preferences Affected:** N/A
1867
1868 #### macOS
1869 ```
1870 <dict>
1871 <key>EnterprisePoliciesEnabled</key>
1872 <true/>
1873 </dict>
1874 ```
1875 ### Extensions
1876 Control the installation, uninstallation and locking of extensions.
1877
1878 `Install` is a list of URLs or native paths for extensions to be installed.
1879
1880 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1881
1882 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1883
1884 **Compatibility:** Firefox 60, Firefox ESR 60\
1885 **CCK2 Equivalent:** `addons`\
1886 **Preferences Affected:** N/A
1887
1888 #### Windows (GPO)
1889 ```
1890 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1891 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1892 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1893 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1894 ```
1895 #### macOS
1896 ```
1897 <dict>
1898 <key>Extensions</key>
1899 <dict>
1900 <key>Install</key>
1901 <array>
1902 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1903 <string>//path/to/xpi</string>
1904 </array>
1905 <key>Uninstall</key>
1906 <array>
1907 <string>bad_addon_id@mozilla.org</string>
1908 </array>
1909 <key>Locked</key>
1910 <array>
1911 <string>addon_id@mozilla.org</string>
1912 </array>
1913 </dict>
1914 </dict>
1915 ```
1916 #### policies.json
1917 ```
1918 {
1919 "policies": {
1920 "Extensions": {
1921 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1922 "Uninstall": ["bad_addon_id@mozilla.org"],
1923 "Locked": ["addon_id@mozilla.org"]
1924 }
1925 }
1926 }
1927 ```
1928 ### ExtensionSettings
1929 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1930
1931 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1932
1933 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1934
1935 The configuration for each extension is another dictionary that can contain the fields documented below.
1936
1937 | Name | Description |
1938 | --- | --- |
1939 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1940 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1941 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1942 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1943 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1944 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1945 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1946 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1947 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1948
1949 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1950 **CCK2 Equivalent:** N/A\
1951 **Preferences Affected:** N/A
1952
1953 #### Windows (GPO)
1954 ```
1955 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1956 {
1957 "*": {
1958 "blocked_install_message": "Custom error message.",
1959 "install_sources": ["https://addons.mozilla.org/"],
1960 "installation_mode": "blocked",
1961 "allowed_types": ["extension"]
1962 },
1963 "uBlock0@raymondhill.net": {
1964 "installation_mode": "force_installed",
1965 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1966 }
1967 }
1968 ```
1969 #### macOS
1970 ```
1971 <dict>
1972 <key>ExtensionSettings</key>
1973 <dict>
1974 <key>*</key>
1975 <dict>
1976 <key>blocked_install_message</key>
1977 <string>Custom error message.</string>
1978 <key>install_sources</key>
1979 <array>
1980 <string>https://addons.mozilla.org/</string>
1981 </array>
1982 <key>installation_mode</key>
1983 <string>blocked</string>
1984 <key>allowed_types</key>
1985 <array>
1986 <string>extension</string>
1987 </array>
1988 </dict>
1989 <key>uBlock0@raymondhill.net</key>
1990 <dict>
1991 <key>installation_mode</key>
1992 <string>force_installed</string>
1993 <key>install_url</key>
1994 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1995 </dict>
1996 </dict>
1997 </dict>
1998 ```
1999 #### policies.json
2000 ```
2001 {
2002 "policies": {
2003 "ExtensionSettings": {
2004 "*": {
2005 "blocked_install_message": "Custom error message.",
2006 "install_sources": ["https://addons.mozilla.org/"],
2007 "installation_mode": "blocked",
2008 "allowed_types": ["extension"]
2009 },
2010 "uBlock0@raymondhill.net": {
2011 "installation_mode": "force_installed",
2012 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2013 }
2014 }
2015 }
2016 }
2017 ```
2018 ### ExtensionUpdate
2019 Control extension updates.
2020
2021 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2022 **CCK2 Equivalent:** N/A\
2023 **Preferences Affected:** `extensions.update.enabled`
2024
2025 #### Windows (GPO)
2026 ```
2027 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2028 ```
2029 #### macOS
2030 ```
2031 <dict>
2032 <key>ExtensionUpdate</key>
2033 <true/> | <false/>
2034 </dict>
2035 ```
2036 #### policies.json
2037 ```
2038 {
2039 "policies": {
2040 "ExtensionUpdate": true | false
2041 }
2042 }
2043 ```
2044 ### FlashPlugin
2045 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2046
2047 `Allow` is a list of origins where Flash are allowed.
2048
2049 `Block` is a list of origins where Flash is not allowed.
2050
2051 `Default` determines whether or not Flash is allowed by default.
2052
2053 `Locked` prevents the user from changing Flash preferences.
2054
2055 **Compatibility:** Firefox 60, Firefox ESR 60\
2056 **CCK2 Equivalent:** `permissions.plugin`\
2057 **Preferences Affected:** `plugin.state.flash`
2058
2059 #### Windows (GPO)
2060 ```
2061 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2062 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2063 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2064 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2065 ```
2066 #### macOS
2067 ```
2068 <dict>
2069 <key>FlashPlugin</key>
2070 <dict>
2071 <key>Allow</key>
2072 <array>
2073 <string>http://example.org</string>
2074 </array>
2075 <key>Block</key>
2076 <array>
2077 <string>http://example.edu</string>
2078 </array>
2079 <key>Default</key>
2080 <true/> | <false/>
2081 <key>Locked</key>
2082 <true/> | <false/>
2083 </dict>
2084 </dict>
2085 ```
2086 #### policies.json
2087 ```
2088 {
2089 "policies": {
2090 "FlashPlugin": {
2091 "Allow": ["http://example.org/"],
2092 "Block": ["http://example.edu/"],
2093 "Default": true | false,
2094 "Locked": true | false
2095 }
2096 }
2097 }
2098 ```
2099 ### FirefoxHome
2100 Customize the Firefox Home page.
2101
2102 **Compatibility:** Firefox 68, Firefox ESR 68\
2103 **CCK2 Equivalent:** N/A\
2104 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2105
2106 #### Windows (GPO)
2107 ```
2108 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2109 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2110 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2111 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2112 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2113 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2114 ```
2115 #### macOS
2116 ```
2117 <dict>
2118 <key>FirefoxHome</key>
2119 <dict>
2120 <key>Search</key>
2121 <true/> | <false/>
2122 <key>TopSites</key>
2123 <true/> | <false/>
2124 <key>Highlights</key>
2125 <true/> | <false/>
2126 <key>Pocket</key>
2127 <true/> | <false/>
2128 <key>Snippets</key>
2129 <true/> | <false/>
2130 <key>Locked</key>
2131 <true/> | <false/>
2132 </dict>
2133 </dict>
2134 ```
2135 #### policies.json
2136 ```
2137 {
2138 "policies": {
2139 "FirefoxHome": {
2140 "Search": true | false,
2141 "TopSites": true | false,
2142 "Highlights": true | false,
2143 "Pocket": true | false,
2144 "Snippets": true | false,
2145 "Locked": true | false
2146 }
2147 }
2148 }
2149 ```
2150 ### HardwareAcceleration
2151 Control hardware acceleration.
2152
2153 **Compatibility:** Firefox 60, Firefox ESR 60\
2154 **CCK2 Equivalent:** N/A\
2155 **Preferences Affected:** `layers.acceleration.disabled`
2156
2157 #### Windows (GPO)
2158 ```
2159 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2160 ```
2161 #### macOS
2162 ```
2163 <dict>
2164 <key>HardwareAcceleration</key>
2165 <true/> | <false/>
2166 </dict>
2167 ```
2168 #### policies.json
2169 ```
2170 {
2171 "policies": {
2172 "HardwareAcceleration": true | false
2173 }
2174 }
2175 ```
2176 ### Homepage
2177 Configure the default homepage and how Firefox starts.
2178
2179 `URL` is the default homepage.
2180
2181 `Locked` prevents the user from changing homepage preferences.
2182
2183 `Additional` allows for more than one homepage.
2184
2185 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2186
2187 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2188 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2189 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2190
2191 #### Windows (GPO)
2192 ```
2193 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2194 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2195 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2196 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2197 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2198 ```
2199 #### Windows (Intune)
2200 OMA-URI:
2201 ```
2202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2203 ```
2204 Value (string):
2205 ```
2206 <enabled/>
2207
2208 <data id="HomepageURL" value="https://example.com"/>
2209 <data id="HomepageLocked" value="true | false"/>
2210 ```
2211 OMA-URI:
2212 ```
2213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2214 ```
2215 Value (string):
2216 ```
2217 <enabled/>
2218
2219 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2220 ```
2221 OMA-URI:
2222 ```
2223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2224 ```
2225 Value (string):
2226 ```
2227 <enabled/>
2228
2229 <data id="StartPage" value="none | homepage | previous-session"/>
2230 ```
2231 #### macOS
2232 ```
2233 <dict>
2234 <key>Homepage</key>
2235 <dict>
2236 <key>URL</key>
2237 <string>http://example.com</string>
2238 <key>Locked</key>
2239 <true/> | <false/>
2240 <key>Additional</key>
2241 <array>
2242 <string>http://example.org</string>
2243 <string>http://example.edu</string>
2244 </array>
2245 <key>StartPage</key>
2246 <string>none | homepage | previous-session</string>
2247 </dict>
2248 </dict>
2249 ```
2250 #### policies.json
2251 ```
2252 {
2253 "policies": {
2254 "Homepage": {
2255 "URL": "http://example.com/",
2256 "Locked": true | false,
2257 "Additional": ["http://example.org/",
2258 "http://example.edu/"],
2259 "StartPage": "none" | "homepage" | "previous-session"
2260 }
2261 }
2262 }
2263 ```
2264 ### InstallAddonsPermission
2265 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2266
2267 `Allow` is a list of origins where extension installs are allowed.
2268
2269 `Default` determines whether or not extension installs are allowed by default.
2270
2271 **Compatibility:** Firefox 60, Firefox ESR 60\
2272 **CCK2 Equivalent:** `permissions.install`\
2273 **Preferences Affected:** `xpinstall.enabled`
2274
2275 #### Windows (GPO)
2276 ```
2277 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2278 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2279 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2280 ```
2281 #### macOS
2282 ```
2283 <dict>
2284 <key>InstallAddonsPermission</key>
2285 <dict>
2286 <key>Allow</key>
2287 <array>
2288 <string>http://example.org</string>
2289 <string>http://example.edu</string>
2290 </array>
2291 <key>Default</key>
2292 <true/> | <false/>
2293 </dict>
2294 </dict>
2295 ```
2296 #### policies.json
2297 ```
2298 {
2299 "policies": {
2300 "InstallAddonsPermission": {
2301 "Allow": ["http://example.org/",
2302 "http://example.edu/"],
2303 "Default": true | false
2304 }
2305 }
2306 }
2307 ```
2308 ### LegacyProfiles
2309 Disable the feature enforcing a separate profile for each installation.
2310
2311 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2312
2313 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2314
2315 This policy only work on Windows via GPO (not policies.json).
2316
2317 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2318 **CCK2 Equivalent:** N/A\
2319 **Preferences Affected:** N/A
2320
2321 #### Windows (GPO)
2322 ```
2323 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2324 ```
2325 ### LocalFileLinks
2326 Enable linking to local files by origin.
2327
2328 **Compatibility:** Firefox 68, Firefox ESR 68\
2329 **CCK2 Equivalent:** N/A\
2330 **Preferences Affected:** `capability.policy.localfilelinks.*`
2331
2332 #### Windows (GPO)
2333 ```
2334 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2335 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2336 ```
2337 #### macOS
2338 ```
2339 <dict>
2340 <key>LocalFileLinks</key>
2341 <array>
2342 <string>http://example.org</string>
2343 <string>http://example.edu</string>
2344 </array>
2345 </dict>
2346 ```
2347 #### policies.json
2348 ```
2349 {
2350 "policies": {
2351 "LocalFileLinks": ["http://example.org/",
2352 "http://example.edu/"]
2353 }
2354 }
2355 ```
2356 ### NoDefaultBookmarks
2357 Disable the creation of default bookmarks.
2358
2359 This policy is only effective if the user profile has not been created yet.
2360
2361 **Compatibility:** Firefox 60, Firefox ESR 60\
2362 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2363 **Preferences Affected:** N/A
2364
2365 #### Windows (GPO)
2366 ```
2367 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2368 ```
2369 #### macOS
2370 ```
2371 <dict>
2372 <key>NoDefaultBookmarks</key>
2373 <true/> | <false/>
2374 </dict>
2375 ```
2376 #### policies.json
2377 ```
2378 {
2379 "policies": {
2380 "NoDefaultBookmarks": true | false
2381 }
2382 }
2383 ```
2384 ### NetworkPrediction
2385 Enable or disable network prediction (DNS prefetching).
2386
2387 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2388 **CCK2 Equivalent:** N/A\
2389 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2390
2391 #### Windows (GPO)
2392 ```
2393 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2394 ```
2395 #### macOS
2396 ```
2397 <dict>
2398 <key>NetworkPrediction</key>
2399 <true/> | <false/>
2400 </dict>
2401 ```
2402 #### policies.json
2403 ```
2404 {
2405 "policies": {
2406 "NetworkPrediction": true | false
2407 }
2408 ```
2409 ### NewTabPage
2410 Enable or disable the New Tab page.
2411
2412 **Compatibility:** Firefox 68, Firefox ESR 68\
2413 **CCK2 Equivalent:** N/A\
2414 **Preferences Affected:** `browser.newtabpage.enabled`
2415
2416 #### Windows (GPO)
2417 ```
2418 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2419 ```
2420 #### macOS
2421 ```
2422 <dict>
2423 <key>NewTabPage</key>
2424 <true/> | <false/>
2425 </dict>
2426 ```
2427 #### policies.json
2428 ```
2429 {
2430 "policies": {
2431 "NewTabPage": true | false
2432 }
2433 ```
2434 ### OfferToSaveLogins
2435 Control whether or not Firefox offers to save passwords.
2436
2437 **Compatibility:** Firefox 60, Firefox ESR 60\
2438 **CCK2 Equivalent:** `dontRememberPasswords`\
2439 **Preferences Affected:** `signon.rememberSignons`
2440
2441 #### Windows (GPO)
2442 ```
2443 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2444 ```
2445 #### macOS
2446 ```
2447 <dict>
2448 <key>OfferToSaveLogins</key>
2449 <true/> | <false/>
2450 </dict>
2451 ```
2452 #### policies.json
2453 ```
2454 {
2455 "policies": {
2456 "OfferToSaveLogins": true | false
2457 }
2458 }
2459 ```
2460 ### OfferToSaveLoginsDefault
2461 Sets the default value of signon.rememberSignons without locking it.
2462
2463 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2464 **CCK2 Equivalent:** `dontRememberPasswords`\
2465 **Preferences Affected:** `signon.rememberSignons`
2466
2467 #### Windows (GPO)
2468 ```
2469 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2470 ```
2471 #### macOS
2472 ```
2473 <dict>
2474 <key>OfferToSaveLoginsDefault</key>
2475 <true/> | <false/>
2476 </dict>
2477 ```
2478 #### policies.json
2479 ```
2480 {
2481 "policies": {
2482 "OfferToSaveLoginsDefault": true | false
2483 }
2484 }
2485 ```
2486 ### OverrideFirstRunPage
2487 Override the first run page. If the value is blank, no first run page is displayed.
2488
2489 **Compatibility:** Firefox 60, Firefox ESR 60\
2490 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2491 **Preferences Affected:** `startup.homepage_welcome_url`
2492
2493 #### Windows (GPO)
2494 ```
2495 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2496 ```
2497 #### macOS
2498 ```
2499 <dict>
2500 <key>OverrideFirstRunPage</key>
2501 <string>http://example.org</string>
2502 </dict>
2503 ```
2504 #### policies.json
2505 ```
2506 {
2507 "policies": {
2508 "OverrideFirstRunPage": "http://example.org"
2509 }
2510 ```
2511 ### OverridePostUpdatePage
2512 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2513
2514 **Compatibility:** Firefox 60, Firefox ESR 60\
2515 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2516 **Preferences Affected:** `startup.homepage_override_url`
2517
2518 #### Windows (GPO)
2519 ```
2520 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2521 ```
2522 #### macOS
2523 ```
2524 <dict>
2525 <key>OverridePostUpdatePage</key>
2526 <string>http://example.org</string>
2527 </dict>
2528 ```
2529 #### policies.json
2530 ```
2531 {
2532 "policies": {
2533 "OverridePostUpdatePage": "http://example.org"
2534 }
2535 ```
2536 ### PasswordManagerEnabled
2537 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2538
2539 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2540 **CCK2 Equivalent:** N/A\
2541 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2542
2543 #### Windows (GPO)
2544 ```
2545 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2546 ```
2547 #### macOS
2548 ```
2549 <dict>
2550 <key>PasswordManagerEnabled</key>
2551 <true/> | <false/>
2552 </dict>
2553 ```
2554 #### policies.json
2555 ```
2556 {
2557 "policies": {
2558 "PasswordManagerEnabled": true | false
2559 }
2560 }
2561 ```
2562 ### Permissions
2563 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2564
2565 `Allow` is a list of origins where the feature is allowed.
2566
2567 `Block` is a list of origins where the feature is not allowed.
2568
2569 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2570
2571 `Locked` prevents the user from changing preferences for the feature.
2572
2573 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2574 **CCK2 Equivalent:** N/A\
2575 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2576
2577 #### Windows (GPO)
2578 ```
2579 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2580 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2581 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2582 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2583 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2584 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2585 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2586 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2587 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2588 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2589 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2590 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2591 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2592 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2593 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2594 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2595 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2596 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2597 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2598 ```
2599 #### macOS
2600 ```
2601 <dict>
2602 <key>Permissions</key>
2603 <dict>
2604 <key>Camera</key>
2605 <dict>
2606 <key>Allow</key>
2607 <array>
2608 <string>https://example.org</string>
2609 <string>https://example.org:1234</string>
2610 </array>
2611 <key>Block</key>
2612 <array>
2613 <string>https://example.edu</string>
2614 </array>
2615 <key>BlockNewRequests</key>
2616 <true/>
2617 <key>Locked</key>
2618 <true/>
2619 </dict>
2620 <key>Microphone</key>
2621 <dict>
2622 <key>Allow</key>
2623 <array>
2624 <string>https://example.org</string>
2625 </array>
2626 <key>Block</key>
2627 <array>
2628 <string>https://example.edu</string>
2629 </array>
2630 <key>BlockNewRequests</key>
2631 <true/>
2632 <key>Locked</key>
2633 <true/>
2634 </dict>
2635 <key>Location</key>
2636 <dict>
2637 <key>Allow</key>
2638 <array>
2639 <string>https://example.org</string>
2640 </array>
2641 <key>Block</key>
2642 <array>
2643 <string>https://example.edu</string>
2644 </array>
2645 <key>BlockNewRequests</key>
2646 <true/>
2647 <key>Locked</key>
2648 <true/>
2649 </dict>
2650 <key>Notifications</key>
2651 <dict>
2652 <key>Allow</key>
2653 <array>
2654 <string>https://example.org</string>
2655 </array>
2656 <key>Block</key>
2657 <array>
2658 <string>https://example.edu</string>
2659 </array>
2660 <key>BlockNewRequests</key>
2661 <true/>
2662 <key>Locked</key>
2663 <true/>
2664 </dict>
2665 <key>Autoplay</key>
2666 <dict>
2667 <key>Allow</key>
2668 <array>
2669 <string>https://example.org</string>
2670 </array>
2671 <key>Block</key>
2672 <array>
2673 <string>https://example.edu</string>
2674 </array>
2675 </dict>
2676 </dict>
2677 </dict>
2678 ```
2679 #### policies.json
2680 ```
2681 {
2682 "policies": {
2683 "Permissions": {
2684 "Camera": {
2685 "Allow": ["https://example.org","https://example.org:1234"],
2686 "Block": ["https://example.edu"],
2687 "BlockNewRequests": true | false,
2688 "Locked": true | false
2689 },
2690 "Microphone": {
2691 "Allow": ["https://example.org"],
2692 "Block": ["https://example.edu"],
2693 "BlockNewRequests": true | false,
2694 "Locked": true | false
2695 },
2696 "Location": {
2697 "Allow": ["https://example.org"],
2698 "Block": ["https://example.edu"],
2699 "BlockNewRequests": true | false,
2700 "Locked": true | false
2701 },
2702 "Notifications": {
2703 "Allow": ["https://example.org"],
2704 "Block": ["https://example.edu"],
2705 "BlockNewRequests": true | false,
2706 "Locked": true | false
2707 },
2708 "Autoplay": {
2709 "Allow": ["https://example.org"],
2710 "Block": ["https://example.edu"]
2711 }
2712 }
2713 }
2714 }
2715 ```
2716 ### PopupBlocking
2717 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2718
2719 `Allow` is a list of origins where popup-windows are allowed.
2720
2721 `Default` determines whether or not pop-up windows are allowed by default.
2722
2723 `Locked` prevents the user from changing pop-up preferences.
2724
2725 **Compatibility:** Firefox 60, Firefox ESR 60\
2726 **CCK2 Equivalent:** `permissions.popup`\
2727 **Preferences Affected:** `dom.disable_open_during_load`
2728
2729 #### Windows (GPO)
2730 ```
2731 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2732 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2733 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2734 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2735 ```
2736 #### macOS
2737 ```
2738 <dict>
2739 <key>PopupBlocking</key>
2740 <dict>
2741 <key>Allow</key>
2742 <array>
2743 <string>http://example.org</string>
2744 <string>http://example.edu</string>
2745 </array>
2746 <key>Default</key>
2747 <true/> | <false/>
2748 <key>Locked</key>
2749 <true/> | <false/>
2750 </dict>
2751 </dict>
2752 ```
2753 #### policies.json
2754 ```
2755 {
2756 "policies": {
2757 "PopupBlocking": {
2758 "Allow": ["http://example.org/",
2759 "http://example.edu/"],
2760 "Default": true | false,
2761 "Locked": true | false
2762 }
2763 }
2764 }
2765 ```
2766 ### Preferences
2767 Set and lock certain preferences.
2768
2769 **Compatibility:** See below\
2770 **CCK2 Equivalent:** `preferences`\
2771 **Preferences Affected:** See below
2772
2773 | Preference | Type | Compatibility | Default
2774 | --- | --- | --- | ---
2775 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2776 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2777 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2778 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2779 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2780 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2781 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2782 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2783 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2784 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2785 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2786 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2787 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2788 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2789 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2790 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2791 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2792 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2793 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2794 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2795 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2796 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2797 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2798 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2799 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2800 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2801 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2802 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2803 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2804 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2805 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2806 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2807 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2808 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2809 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2810 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2811 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2812 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2813 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2814 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2815 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2816 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2817 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2818 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2819 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2820 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2821 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2822 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2823 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2824 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2825 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2826 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2827 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2828 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2829 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2830 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2831 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2832 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2833 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2834 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2835 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2836 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2837 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2838 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2839 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2840 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2841 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2842 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2843 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2844 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2845 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2846 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2847 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2848 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2849 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2850 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2851 disabled
2852 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2853 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2854 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2855 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2856 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2857 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2858 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2859 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2860 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2861 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2862 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2863 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2864 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2865 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2866 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2867 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2868 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2869 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2870 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2871 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2872 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2873 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2874 #### Windows (GPO)
2875 ```
2876 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2877 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2878 ```
2879 #### macOS
2880 ```
2881 <dict>
2882 <key>Preferences</key>
2883 <dict>
2884 <key>boolean_preference_name</key>
2885 <true/> | <false/>
2886 <key>string_preference_name</key>
2887 <string>string_value</string>
2888 </dict>
2889 </dict>
2890 ```
2891 #### policies.json
2892 ```
2893 {
2894 "policies": {
2895 "Preferences": {
2896 "boolean_preference_name": true | false,
2897 "string_preference_name": "string_value"
2898 }
2899 }
2900 }
2901 ```
2902 ### PromptForDownloadLocation
2903 Ask where to save each file before downloading.
2904
2905 **Compatibility:** Firefox 68, Firefox ESR 68\
2906 **CCK2 Equivalent:** N/A\
2907 **Preferences Affected:** `browser.download.useDownloadDir`
2908
2909 #### Windows (GPO)
2910 ```
2911 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2912 ```
2913 #### macOS
2914 ```
2915 <dict>
2916 <key>PromptForDownloadLocation</key>
2917 <true/> | <false/>
2918 </dict>
2919 ```
2920 #### policies.json
2921 ```
2922 {
2923 "policies": {
2924 "PromptForDownloadLocation": true | false
2925 }
2926 }
2927 ```
2928 ### Proxy
2929 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2930 To specify ports, append them to the hostnames with a colon (:).
2931
2932 `Mode` is the proxy method being used.
2933
2934 `Locked` is whether or not proxy settings can be changed.
2935
2936 `HTTPProxy` is the HTTP proxy server.
2937
2938 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2939
2940 `SSLProxy` is the SSL proxy server.
2941
2942 `FTPProxy` is the FTP proxy server.
2943
2944 `SOCKSProxy` is the SOCKS proxy server
2945
2946 `SOCKSVersion` is the SOCKS version (4 or 5)
2947
2948 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2949
2950 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2951
2952 `AutoLogin` means do not prompt for authentication if password is saved.
2953
2954 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2955
2956 **Compatibility:** Firefox 60, Firefox ESR 60\
2957 **CCK2 Equivalent:** `networkProxy*`\
2958 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2959
2960 #### Windows (GPO)
2961 ```
2962 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2963 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2964 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2965 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2966 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2967 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2968 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2969 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2970 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2971 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2972 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2973 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2974 ```
2975 #### macOS
2976 ```
2977 <dict>
2978 <key>Proxy</key>
2979 <dict>
2980 <key>Mode</key>
2981 <string>none | system | manual | autoDetect | autoConfig</string>
2982 <key>Locked</key>
2983 <true> | </false>
2984 <key>HTTPProxy</key>
2985 <string>https://httpproxy.example.com</string>
2986 <key>UseHTTPProxyForAllProtocols</key>
2987 <true> | </false>
2988 <key>SSLProxy</key>
2989 <string>https://sslproxy.example.com</string>
2990 <key>FTPProxy</key>
2991 <string>https://ftpproxy.example.com</string>
2992 <key>SOCKSProxy</key>
2993 <string>https://socksproxy.example.com</string>
2994 <key>SOCKSVersion</key>
2995 <string>4 | 5</string>
2996 <key>Passthrough</key>
2997 <string>&lt;local>&gt;</string>
2998 <key>AutoConfigURL</key>
2999 <string>URL_TO_AUTOCONFIG</string>
3000 <key>AutoLogin</key>
3001 <true> | </false>
3002 <key>UseProxyForDNS</key>
3003 <true> | </false>
3004 </dict>
3005 </dict>
3006 ```
3007 #### policies.json
3008 ```
3009 {
3010 "policies": {
3011 "Proxy": {
3012 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3013 "Locked": [true, false],
3014 "HTTPProxy": "hostname",
3015 "UseHTTPProxyForAllProtocols": [true, false],
3016 "SSLProxy": "hostname",
3017 "FTPProxy": "hostname",
3018 "SOCKSProxy": "hostname",
3019 "SOCKSVersion": 4 | 5
3020 "Passthrough": "<local>",
3021 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3022 "AutoLogin": [true, false],
3023 "UseProxyForDNS": [true, false]
3024 }
3025 }
3026 }
3027 ```
3028 ### RequestedLocales
3029 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3030
3031 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3032
3033 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3034 **CCK2 Equivalent:** N/A\
3035 **Preferences Affected:** N/A
3036 #### Windows (GPO)
3037 ```
3038 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3039 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3040
3041 or
3042
3043 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3044 ```
3045 #### macOS
3046 ```
3047 <dict>
3048 <key>RequestedLocales</key>
3049 <array>
3050 <string>de</string>
3051 <string>en-US</string>
3052 </array>
3053 </dict>
3054
3055 or
3056
3057 <dict>
3058 <key>RequestedLocales</key>
3059 <string>de,en-US</string>
3060 </dict>
3061
3062 ```
3063 #### policies.json
3064 ```
3065 {
3066 "policies": {
3067 "RequestedLocales": ["de", "en-US"]
3068 }
3069 }
3070
3071 or
3072
3073 {
3074 "policies": {
3075 "RequestedLocales": "de,en-US"
3076 }
3077 }
3078 ```
3079 <a name="SanitizeOnShutdown"></a>
3080
3081 ### SanitizeOnShutdown (Selective)
3082 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3083
3084 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3085
3086 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3087 **CCK2 Equivalent:** N/A\
3088 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3089 #### Windows (GPO)
3090 ```
3091 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3092 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3093 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3094 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3095 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3096 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3097 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3098 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3099 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3100 ```
3101 #### macOS
3102 ```
3103 <dict>
3104 <key>SanitizeOnShutdown</key>
3105 <dict>
3106 <key>Cache</key>
3107 <true/> | <false/>
3108 <key>Cookies</key>
3109 <true/> | <false/>
3110 <key>Downloads</key>
3111 <true/> | <false/>
3112 <key>FormData</key>
3113 <true/> | <false/>
3114 <key>History</key>
3115 <true/> | <false/>
3116 <key>Sessions</key>
3117 <true/> | <false/>
3118 <key>SiteSettings</key>
3119 <true/> | <false/>
3120 <key>OfflineApps</key>
3121 <true/> | <false/>
3122 <key>Locked</key>
3123 <true/> | <false/>
3124 </dict>
3125 </dict>
3126 ```
3127 #### policies.json
3128 ```
3129 {
3130 "policies": {
3131 "SanitizeOnShutdown": {
3132 "Cache": true | false,
3133 "Cookies": true | false,
3134 "Downloads": true | false,
3135 "FormData": true | false,
3136 "History": true | false,
3137 "Sessions": true | false,
3138 "SiteSettings": true | false,
3139 "OfflineApps": true | false,
3140 "Locked": true | false
3141 }
3142 }
3143 }
3144 ```
3145 ### SanitizeOnShutdown (All)
3146 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3147
3148 **Compatibility:** Firefox 60, Firefox ESR 60\
3149 **CCK2 Equivalent:** N/A\
3150 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3151 #### Windows (GPO)
3152 ```
3153 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3154 ```
3155 #### macOS
3156 ```
3157 <dict>
3158 <key>SanitizeOnShutdown</key>
3159 <true/> | <false/>
3160 </dict>
3161 ```
3162 #### policies.json
3163 ```
3164 {
3165 "policies": {
3166 "SanitizeOnShutdown": true | false
3167 }
3168 }
3169 ```
3170 ### SearchBar
3171 Set whether or not search bar is displayed.
3172
3173 **Compatibility:** Firefox 60, Firefox ESR 60\
3174 **CCK2 Equivalent:** `showSearchBar`\
3175 **Preferences Affected:** N/A
3176
3177 #### Windows (GPO)
3178 ```
3179 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3180 ```
3181 #### macOS
3182 ```
3183 <dict>
3184 <key>SearchBar</key>
3185 <string>unified | separate</string>
3186 </dict>
3187 ```
3188
3189 #### policies.json
3190 ```
3191 {
3192 "policies": {
3193 "SearchBar": "unified" | "separate"
3194 }
3195 }
3196 ```
3197 <a name="SearchEngines"></a>
3198
3199 ### SearchEngines (This policy is only available on the ESR.)
3200
3201 ### SearchEngines | Default
3202
3203 Set the default search engine. This policy is only available on the ESR.
3204
3205 **Compatibility:** Firefox ESR 60\
3206 **CCK2 Equivalent:** `defaultSearchEngine`\
3207 **Preferences Affected:** N/A
3208
3209 #### Windows (GPO)
3210 ```
3211 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3212 ```
3213 #### macOS
3214 ```
3215 <dict>
3216 <key>SearchEngines</key>
3217 <dict>
3218 <key>Default</key>
3219 <string>NAME_OF_SEARCH_ENGINE</string>
3220 </dict>
3221 </dict>
3222 ```
3223 #### policies.json
3224 ```
3225 {
3226 "policies": {
3227 "SearchEngines": {
3228 "Default": "NAME_OF_SEARCH_ENGINE"
3229 }
3230 }
3231 }
3232 ```
3233 ### SearchEngines | PreventInstalls
3234
3235 Prevent installing search engines from webpages.
3236
3237 **Compatibility:** Firefox ESR 60\
3238 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3239 **Preferences Affected:** N/A
3240
3241 #### Windows (GPO)
3242 ```
3243 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3244 ```
3245 #### macOS
3246 ```
3247 <dict>
3248 <key>SearchEngines</key>
3249 <dict>
3250 <key>PreventInstalls</key>
3251 <true/> | <false/>
3252 </dict>
3253 </dict>
3254 ```
3255 #### policies.json
3256 ```
3257 {
3258 "policies": {
3259 "SearchEngines": {
3260 "PreventInstalls": true | false
3261 }
3262 }
3263 }
3264 ```
3265 ### SearchEngines | Remove
3266
3267 Hide built-in search engines. This policy is only available on the ESR.
3268
3269 **Compatibility:** Firefox ESR 60.2\
3270 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3271 **Preferences Affected:** N/A
3272
3273 #### Windows (GPO)
3274 ```
3275 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3276 ```
3277 #### macOS
3278 ```
3279 <dict>
3280 <key>SearchEngines</key>
3281 <dict>
3282 <key>Remove</key>
3283 <array>
3284 <string>NAME_OF_SEARCH_ENGINE</string>
3285 </array>
3286 </dict>
3287 </dict>
3288 ```
3289 #### policies.json
3290 ```
3291 {
3292 "policies": {
3293 "SearchEngines": {
3294 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3295 }
3296 }
3297 }
3298 ```
3299 ### SearchEngines | Add
3300
3301 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3302
3303 `Name` is the name of the search engine.
3304
3305 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3306
3307 `Method` is either GET or POST
3308
3309 `IconURL` is a URL for the icon to use.
3310
3311 `Alias` is a keyword to use for the engine.
3312
3313 `Description` is a description of the search engine.
3314
3315 `PostData` is the POST data as name value pairs separated by &.
3316
3317 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3318
3319 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3320 **CCK2 Equivalent:** `searchplugins`\
3321 **Preferences Affected:** N/A
3322
3323 #### Windows (GPO)
3324 ```
3325 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3326 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3327 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3328 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3329 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3330 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3331 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3332 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3333 ```
3334
3335 #### macOS
3336 ```
3337 <dict>
3338 <key>SearchEngines</key>
3339 <dict>
3340 <key>Add</key>
3341 <array>
3342 <dict>
3343 <key>Name</key>
3344 <string>Example1</string>
3345 <key>URLTemplate</key>
3346 <string>https://www.example.org/q={searchTerms}</string>
3347 <key>Method</key>
3348 <string>GET | POST </string>
3349 <key>IconURL</key>
3350 <string>https://www.example.org/favicon.ico</string>
3351 <key>Alias</key>
3352 <string>example</string>
3353 <key>Description</key>
3354 <string>Example Description</string>
3355 <key>SuggestURLTemplate</key>
3356 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3357 <key>PostData</key>
3358 <string>name=value&q={searchTerms}</string>
3359 </dict>
3360 <array>
3361 </dict>
3362 </dict>
3363 ```
3364 #### policies.json
3365 ```
3366 {
3367 "policies": {
3368 "SearchEngines": {
3369 "Add": [
3370 {
3371 "Name": "Example1",
3372 "URLTemplate": "https://www.example.org/q={searchTerms}",
3373 "Method": "GET" | "POST",
3374 "IconURL": "https://www.example.org/favicon.ico",
3375 "Alias": "example",
3376 "Description": "Description",
3377 "PostData": "name=value&q={searchTerms}",
3378 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3379 }
3380 ]
3381 }
3382 }
3383 }
3384 ```
3385 ### SearchSuggestEnabled
3386
3387 Enable search suggestions.
3388
3389 **Compatibility:** Firefox 68, Firefox ESR 68\
3390 **CCK2 Equivalent:** N/A\
3391 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3392
3393 #### Windows (GPO)
3394 ```
3395 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3396 ```
3397 #### macOS
3398 ```
3399 <dict>
3400 <key>SearchSuggestEnabled</key>
3401 <true/> | <false/>
3402 </dict>
3403 ```
3404 #### policies.json
3405 ```
3406 {
3407 "policies": {
3408 "SearchSuggestEnabled": true | false
3409 }
3410 }
3411 ```
3412 ### SecurityDevices
3413
3414 Install PKCS #11 modules.
3415
3416 **Compatibility:** Firefox 64, Firefox ESR 60.4\
3417 **CCK2 Equivalent:** `certs.devices`\
3418 **Preferences Affected:** N/A
3419
3420 #### Windows (GPO)
3421 ```
3422 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
3423 ```
3424 #### macOS
3425 ```
3426 <dict>
3427 <key>SecurityDevices</key>
3428 <dict>
3429 <key>NAME_OF_DEVICE</key>
3430 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
3431 </dict>
3432 </dict>
3433 ```
3434
3435 #### policies.json
3436 ```
3437 {
3438 "policies": {
3439 "SecurityDevices": {
3440 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
3441 }
3442 }
3443 }
3444 ```
3445 ### SSLVersionMax
3446
3447 Set and lock the maximum version of TLS.
3448
3449 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3450 **CCK2 Equivalent:** N/A\
3451 **Preferences Affected:** `security.tls.version.max`
3452
3453 #### Windows (GPO)
3454 ```
3455 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3456 ```
3457 #### macOS
3458 ```
3459 <dict>
3460 <key>SSLVersionMax</key>
3461 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3462 </dict>
3463 ```
3464
3465 #### policies.json
3466 ```
3467 {
3468 "policies": {
3469 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3470 }
3471 }
3472 ```
3473 ### SSLVersionMin
3474
3475 Set and lock the minimum version of TLS.
3476
3477 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3478 **CCK2 Equivalent:** N/A\
3479 **Preferences Affected:** `security.tls.version.min`
3480
3481 #### Windows (GPO)
3482 ```
3483 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3484 ```
3485 #### macOS
3486 ```
3487 <dict>
3488 <key>SSLVersionMin</key>
3489 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3490 </dict>
3491 ```
3492
3493 #### policies.json
3494 ```
3495 {
3496 "policies": {
3497 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3498 }
3499 }
3500 ```
3501 ### SupportMenu
3502 Add a menuitem to the help menu for specifying support information.
3503
3504 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3505 **CCK2 Equivalent:** helpMenu\
3506 **Preferences Affected:** N/A
3507
3508 #### Windows (GPO)
3509 ```
3510 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3511 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3512 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3513 ```
3514 #### macOS
3515 ```
3516 <dict>
3517 <key>SupportMenu</key>
3518 <dict>
3519 <key>Title</key>
3520 <string>SupportMenu</string>
3521 <key>URL</key>
3522 <string>http://example.com/support</string>
3523 <key>AccessKey</key>
3524 <string>S</string>
3525 </dict>
3526 </dict>
3527 ```
3528 #### policies.json
3529 ```
3530 {
3531 "policies": {
3532 "SupportMenu": {
3533 "Title": "Support Menu",
3534 "URL": "http://example.com/support",
3535 "AccessKey": "S"
3536 }
3537 }
3538 }
3539 ```
3540 ### UserMessaging
3541
3542 Prevent installing search engines from webpages.
3543
3544 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3545
3546 `ExtensionRecommendations` Don't recommend extensions.
3547
3548 `FeatureRecommendations` Don't recommend browser features.
3549
3550 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3551
3552 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3553 **CCK2 Equivalent:** N/A\
3554 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3555
3556 #### Windows (GPO)
3557 ```
3558 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3559 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3560 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3561 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3562 ```
3563 #### macOS
3564 ```
3565 <dict>
3566 <key>UserMessaging</key>
3567 <dict>
3568 <key>WhatsNew</key>
3569 <true/> | <false/>
3570 <key>ExtensionRecommendations</key>
3571 <true/> | <false/>
3572 <key>FeatureRecommendations</key>
3573 <true/> | <false/>
3574 <key>UrlbarInterventions</key>
3575 <true/> | <false/>
3576 </dict>
3577 </dict>
3578 ```
3579 #### policies.json
3580 ```
3581 {
3582 "policies": {
3583 "UserMessaging": {
3584 "WhatsNew": true | false,
3585 "ExtensionRecommendations": true | false,
3586 "FeatureRecommendations": true | false,
3587 "UrlbarInterventions": true | false
3588 }
3589 }
3590 }
3591 ```
3592 ### WebsiteFilter
3593 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3594
3595 **Compatibility:** Firefox 60, Firefox ESR 60\
3596 **CCK2 Equivalent:** N/A\
3597 **Preferences Affected:** N/A
3598
3599 #### Windows (GPO)
3600 ```
3601 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3602 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3603 ```
3604 #### macOS
3605 ```
3606 <dict>
3607 <key>WebsiteFilter</key>
3608 <dict>
3609 <key>Block</key>
3610 <array>
3611 <string><all_urls></string>
3612 </array>
3613 <key>Exceptions</key>
3614 <array>
3615 <string>http://example.org/*</string>
3616 </array>
3617 </dict>
3618
3619 </dict>
3620 ```
3621 #### policies.json
3622 ```
3623 {
3624 "policies": {
3625 "WebsiteFilter": {
3626 "Block": ["<all_urls>"],
3627 "Exceptions": ["http://example.org/*"]
3628 }
3629 }
3630 }
3631 ```

patrick-canterino.de