-### Proxy
-This policy allows you to specify proxy settings. These settings correspond to the connection settings in Firefox preferences.
-To specify ports, append them to the hostnames with a colon (:). If Locked is set to true, the values can't be changed by the user.
-```
-{
- "Proxy": {
- "Mode": ["none", "system", "manual", "autoDetect", "autoConfig"]
- "Locked": [true, false]
- "HTTPProxy": "hostname",
- "UseHTTPProxyForAllProtocols": [true, false]
- "SSLProxy": "hostname",
- "FTPProxy": "hostname",
- "SOCKSProxy": "hostname",
- "SOCKSVersion": [4, 5],
- "Passthrough": "List of passthrough addresses/domains",
- "AutoConfigURL": "URL_TO_AUTOCONFIG",
- "AutoLogin": [true, false],
- "UseProxyForDNS": [true, false]
+
+
+
+
+
+### SearchEngines (This policy is only available on the ESR.)
+
+### SearchEngines | Default
+
+Set the default search engine. This policy is only available on the ESR.
+
+**Compatibility:** Firefox ESR 60\
+**CCK2 Equivalent:** `defaultSearchEngine`\
+**Preferences Affected:** N/A
+
+### Windows
+```
+Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
+```
+#### macOS
+```
+<dict>
+ <key>SearchEngines</key>
+ <dict>
+ <key>Default</key>
+ <string>NAME_OF_SEARCH_ENGINE</string>
+ </dict>
+</dict>
+```
+### JSON
+```
+{
+ "policies": {
+ "SearchEngines": {
+ "Default": "NAME_OF_SEARCH_ENGINE"
+ }
+ }
+}
+```
+### SearchEngines | PreventInstalls
+
+Prevent installing search engines from webpages.
+
+**Compatibility:** Firefox ESR 60\
+**CCK2 Equivalent:** `disableSearchEngineInstall`\
+**Preferences Affected:** N/A
+
+### Windows
+```
+Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
+```
+#### macOS
+```
+<dict>
+ <key>SearchEngines</key>
+ <dict>
+ <key>PreventInstalls</key>
+ <true/> | <false/>
+ </dict>
+</dict>
+```
+### JSON
+```
+{
+ "policies": {
+ "SearchEngines": {
+ "PreventInstalls": true | false
+ }
+ }
+}
+```
+### SearchEngines | Remove
+
+Hide built-in search engines. This policy is only available on the ESR.
+
+**Compatibility:** Firefox ESR 60.2\
+**CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
+**Preferences Affected:** N/A
+
+### Windows
+```
+Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
+```
+#### macOS
+```
+<dict>
+ <key>SearchEngines</key>
+ <dict>
+ <key>Remove</key>
+ <array>
+ <string>NAME_OF_SEARCH_ENGINE</string>
+ </array>
+ </dict>
+</dict>
+```
+### JSON
+```
+{
+ "policies": {
+ "SearchEngines": {
+ "Remove": ["NAME_OF_SEARCH_ENGINE"]
+ }
+ }
+}
+```
+### SearchEngines | Add
+
+Adddd new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
+
+`Name` is the name of the search engine.
+
+`URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
+
+`Method` is either GET or POST
+
+`IconURL` is a URL for the icon to use.
+
+`Alias` is a keyword to use for the engine.
+
+`Description` is a description of the search engine.
+
+`SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
+
+**Compatibility:** Firefox ESR 60\
+**CCK2 Equivalent:** `searchplugins`\
+**Preferences Affected:** N/A
+
+#### Windows
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
+Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
+
+#### macOS
+```
+<dict>
+ <key>SearchEngines</key>
+ <dict>
+ <key>Add</key>
+ <array>
+ <dict>
+ <key>Name</key>
+ <string>Example1</string>
+ <key>URLTemplate</key>
+ <string>https://www.example.org/q={searchTerms}</string>
+ <key>Method</key>
+ <string>GET | POST </string>
+ <key>IconURL</key>
+ <string>https://www.example.org/favicon.ico</string>
+ <key>Alias</key>
+ <string>example</string>
+ <key>Description</key>
+ <string>Example Description</string>
+ <key>SuggestURLTemplate</key>
+ <string>https://www.example.org/suggestions/q={searchTerms}</string>
+ </dict>
+ <array>
+ </dict>
+</dict>
+```
+### JSON
+```
+{
+ "policies": {
+ "SearchEngines": {
+ "Add": [
+ {
+ "Name": "Example1",
+ "URLTemplate": "https://www.example.org/q={searchTerms}",
+ "Method": "GET" | "POST",
+ "IconURL": "https://www.example.org/favicon.ico",
+ "Alias": "example",
+ "Description": "Description",
+ "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
+ }
+ ]
+ }
+ }
+}
+```
+### SecurityDevices
+
+Install PKCS #11 modules.
+
+**Compatibility:** Firefox 64, Firefox ESR 60.4\
+**CCK2 Equivalent:** `certs.devices`\
+**Preferences Affected:** N/A
+
+#### Windows
+```
+Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
+```
+#### macOS
+```
+<dict>
+ <key>SecurityDevices</key>
+ <dict>
+ <key>NAME_OF_DEVICE</key>
+ <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
+ </dict>
+</dict>
+```
+
+#### JSON
+```
+{
+ "policies": {
+ "SecurityDevices": {
+ "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
+ }
+ }
+}
+```
+### SSLVersionMax
+
+Set and lock the maximum version of TLS.
+
+**Compatibility:** Firefox 66, Firefox ESR 60.6\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** `security.tls.version.max`
+
+#### Windows
+```
+Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
+```
+#### macOS
+```
+<dict>
+ <key>SSLVersionMax</key>
+ <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
+</dict>
+```
+
+#### JSON
+```
+{
+ "policies": {
+ "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
+ }
+}
+```
+### SSLVersionMin
+
+Set and lock the minimum version of TLS.
+
+**Compatibility:** Firefox 66, Firefox ESR 60.6\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** `security.tls.version.min`
+
+#### Windows
+```
+Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
+```
+#### macOS
+```
+<dict>
+ <key>SSLVersionMin</key>
+ <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
+</dict>
+```
+
+#### JSON
+```
+{
+ "policies": {
+ "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
+ }
+}
+```
+### WebsiteFilter
+Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
+
+**Compatibility:** Firefox 60, Firefox ESR 60\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** N/A
+
+#### Windows
+```
+Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
+Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
+```
+#### macOS
+```
+<dict>
+ <key>WebsiteFilter</key>
+ <dict>
+ <key>Block</key>
+ <array>
+ <string><all_urls></string>
+ </array>
+ <key>Exceptions</key>
+ <array>
+ <string>http://example.org/*</string>
+ </array>
+ </dict>
+
+</dict>
+```
+### JSON
+```
+{
+ "policies": {
+ "WebsiteFilter": {
+ "Block": ["<all_urls>"],
+ "Exceptions": ["http://example.org/*"]
+ }
+ }
+}
+```
+### SupportMenu
+This policy adds a menuitem to the help menu for specifying support information.
+```
+{
+ "policies": {
+ "SupportMenu": {
+ "Title": "Click here for help", /* Title of the menu */
+ "URL": "http://example.edu/", /* Destination URL */
+ "AccessKey": "C" /* Shortcut key */
+ }