X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/022c0af1b96634db7b1edcb44a00760ad8b2c9f4..cc81583ef1808e799115509fe0e023a9f108cb1f:/docs/index.md
diff --git a/docs/index.md b/docs/index.md
index c1367da..9e657cc 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -17,6 +17,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries
| --- | --- |
| **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
| **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
+| **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs.
| **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
| **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
| **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
@@ -219,6 +220,42 @@ Value (string):
}
}
```
+### AllowFileSelectionDialogs
+
+Enable or disable file selection dialogs.
+
+**Compatibility:** Firefox 124\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** `widget.disable_file_pickers`
+
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate
+```
+Value (string):
+```
+ or
+```
+#### macOS
+```
+
+ AllowFileSelectionDialogs
+ |
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "AllowFileSelectionDialogs": true | false
+ }
+}
+```
### AppAutoUpdate
Enable or disable **automatic** application update.
@@ -2261,7 +2298,9 @@ Configure DNS over HTTPS.
`ExcludedDomains` excludes domains from DNS over HTTPS.
-**Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
+`Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider.
+
+**Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\
**CCK2 Equivalent:** N/A\
**Preferences Affected:** `network.trr.mode`, `network.trr.uri`
@@ -2271,6 +2310,7 @@ Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
+Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0
```
#### Windows (Intune)
OMA-URI:
@@ -2307,6 +2347,14 @@ Value (string):
```
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback
+```
+Value (string):
+```
+ or
+```
#### macOS
```
@@ -2322,6 +2370,8 @@ Value (string):
example.com
+ Fallback
+ |
```
@@ -2333,7 +2383,8 @@ Value (string):
"Enabled": true | false,
"ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
"Locked": true | false,
- "ExcludedDomains": ["example.com"]
+ "ExcludedDomains": ["example.com"],
+ "Fallback": true | false,
}
}
}
@@ -2779,7 +2830,8 @@ Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
},
"https-everywhere@eff.org": {
- "installation_mode": "allowed"
+ "installation_mode": "allowed",
+ "updates_disabled": false
}
}
```
@@ -2804,7 +2856,8 @@ Value (string):
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
},
"https-everywhere@eff.org": {
- "installation_mode": "allowed"
+ "installation_mode": "allowed",
+ "updates_disabled": false
}
}'/>
```
@@ -2831,14 +2884,16 @@ Value (string):
uBlock0@raymondhill.net
installation_mode
- force_installed
+ force_installed
install_url
https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi
https-everywhere@eff.org
installation_mode
- allowed
+ allowed
+ updates_disabled
+ |
@@ -2859,7 +2914,8 @@ Value (string):
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
},
"https-everywhere@eff.org": {
- "installation_mode": "allowed"
+ "installation_mode": "allowed",
+ "updates_disabled": false
}
}
}
@@ -3780,12 +3836,32 @@ If this policy is enabled:
2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3. The update UI will work as expected, unlike when using DisableAppUpdate.
-This policy is primarily intended for advanced end users, not for enterprises.
+This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO.
**Compatibility:** Firefox 87\
**CCK2 Equivalent:** N/A\
**Preferences Affected:** N/A
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly
+```
+Value (string):
+```
+ or
+```
+#### macOS
+```
+
+ ManualAppUpdateOnly
+ |
+
+```
#### policies.json
```
{