X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/065fc2386fa54a282ae46cadc6532c0d2e93f02c..776226a510364cf800ba8f47c520b0780faf3399:/docs/index.md diff --git a/docs/index.md b/docs/index.md index 829af1f..48d4ba9 100644 --- a/docs/index.md +++ b/docs/index.md @@ -43,6 +43,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers. | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only). | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools. +| **[`DisableEncryptedClientHello`](#disableencryptedclienthello)** | Disable the TLS Feature Encrypted Client Hello (ECH). | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites. | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync). | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots. @@ -120,6 +121,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS. | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory. | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information. +| **[`TranslateEnabled`](#translateenabled)** | Enable or disable webpage translation. | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user. | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview. | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited. @@ -127,7 +129,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries ### 3rdparty -Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/). +Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/enterprise-development/#how-to-add-policy). For GPO and Intune, the extension developer should provide an ADMX file. @@ -1221,6 +1223,14 @@ Configure cookie preferences. `Locked` prevents the user from changing cookie preferences. +`Default` determines whether cookies are accepted at all. (*Deprecated*. Use `Behavior` instead) + +`AcceptThirdParty` determines how third-party cookies are handled. (*Deprecated*. Use `Behavior` instead) + +`RejectTracker` only rejects cookies for trackers. (*Deprecated*. Use `Behavior` instead) + +`ExpireAtSessionEnd` determines when cookies expire. (*Deprecated*. Use [`SanitizeOnShutdown`](#sanitizeonshutdown-selective) instead) + **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy` @@ -1230,10 +1240,6 @@ Configure cookie preferences. Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com" Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu" Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org" -Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0 -Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited" -Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0 -Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign" Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign" Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0 @@ -1268,39 +1274,6 @@ Value (string): ``` OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default -``` -Value (string): -``` - or -``` -OMA-URI: -``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty -``` -Value (string): -``` - - -``` -OMA-URI: -``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd -``` -Value (string): -``` - or -``` -OMA-URI: -``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker -``` -Value (string): -``` - or -``` -OMA-URI: -``` ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked ``` Value (string): @@ -1342,14 +1315,6 @@ Value (string): http://example.org - Default - | - AcceptThirdParty - always | never | from-visited - ExpireAtSessionEnd - | - RejectTracker - | Locked | Behavior @@ -1367,10 +1332,6 @@ Value (string): "Allow": ["http://example.org/"], "AllowSession": ["http://example.edu/"], "Block": ["http://example.edu/"], - "Default": true | false, - "AcceptThirdParty": "always" | "never" | "from-visited", - "ExpireAtSessionEnd": true | false, - "RejectTracker": true | false, "Locked": true | false, "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign", "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign", @@ -1663,6 +1624,41 @@ Value (string): } } ``` +### DisableEncryptedClientHello +Disable the TLS Feature for Encrypted Client Hello. Note that TLS Client Hellos will still contain an ECH extension, but this extension will not be used by Firefox during the TLS handshake. + +**Compatibility:** Firefox 127, Firefox ESR 128\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `network.dns.echconfig.enabled`, `network.dns.http3_echconfig.enabled` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\DisableEncryptedClientHello = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableEncryptedClientHello +``` +Value (string): +``` + or +``` +#### macOS +``` + + DisableEncryptedClientHello + | + +``` +#### policies.json +``` +{ + "policies": { + "DisableEncryptedClientHello": true | false + } +} +``` ### DisableFirefoxAccounts Disable Firefox Accounts integration (Sync). @@ -2888,6 +2884,7 @@ The configuration for each extension is another dictionary that can contain the | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration. | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension. | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`. +| `temporarily_allow_weak_signatures`| (Firefox 127) A boolean that indicates whether to allow installing extensions signed using deprecated signature algorithms. **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\ **CCK2 Equivalent:** N/A\ @@ -4759,6 +4756,7 @@ pdfjs. (Firefox 84, Firefox ESR 78.6) places. pref. print. +privacy.globalprivacycontrol.enabled (Firefox 127, Firefox ESR 128.0) privacy.userContext.enabled (Firefox 126, Firefox ESR 115.11) privacy.userContext.ui.enabled (Firefox 126, Firefox ESR 115.11) signon. (Firefox 83, Firefox ESR 78.5) @@ -4784,7 +4782,11 @@ as well as the following security preferences: | security.insecure_connection_text.pbmode.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites in private browsing. | security.mixed_content.block_active_content | boolean | true -|     If false, mixed active content (HTTP and HTTPS) is not blocked. +|     If set to true, mixed active content (HTTP subresources such as scripts, fetch requests, etc. on a HTTPS page) will be blocked. +| security.mixed_content.block_display_content | boolean | false +|     If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be blocked. (Firefox 127, Firefox ESR 128.0) +| security.mixed_content.upgrade_display_content | boolean | true +|     If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be upgraded to HTTPS. (Firefox 127, Firefox ESR 128.0) | security.osclientcerts.autoload | boolean | false |     If true, client certificates are loaded from the operating system certificate store. | security.OCSP.enabled | integer | 1 @@ -6013,6 +6015,40 @@ Value (string): } } ``` +### StartDownloadsInTempDirectory +Force downloads to start off in a local, temporary location rather than the default download directory. + +**Compatibility:** Firefox 102\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `browser.download.start_downloads_in_tmp_dir` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory +``` +Value (string): +``` + or +``` +#### macOS +``` + + StartDownloadsInTempDirectory + | + +``` +#### policies.json +``` +{ + "policies": { + "StartDownloadsInTempDirectory": true | false +} +``` ### SupportMenu Add a menuitem to the help menu for specifying support information. @@ -6064,21 +6100,25 @@ Value (string): } } ``` -### StartDownloadsInTempDirectory -Force downloads to start off in a local, temporary location rather than the default download directory. +### TranslateEnabled +Enable or disable webpage translation. -**Compatibility:** Firefox 102\ +Note: Web page translation is done completely on the client, so there is no data or privacy risk. + +If you only want to disable the popup, you can set the pref `browser.translations.automaticallyPopup` to false using the [Preferences](#preferences) policy. + +**Compatibility:** Firefox 126\ **CCK2 Equivalent:** N/A\ -**Preferences Affected:** `browser.download.start_downloads_in_tmp_dir` +**Preferences Affected:** `browser.translations.enable` #### Windows (GPO) ``` -Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\TranslateEnabled = 0x1 | 0x0 ``` #### Windows (Intune) OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TranslateEnabled ``` Value (string): ``` @@ -6087,7 +6127,7 @@ Value (string): #### macOS ``` - StartDownloadsInTempDirectory + TranslateEnabled | ``` @@ -6095,14 +6135,15 @@ Value (string): ``` { "policies": { - "StartDownloadsInTempDirectory": true | false + "TranslateEnabled": true | false + } } ``` ### UserMessaging Prevent Firefox from messaging the user in certain situations. -`WhatsNew` Remove the "What's New" icon and menuitem. +`WhatsNew` Remove the "What's New" icon and menuitem. (*Deprecated*) `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages. @@ -6118,11 +6159,10 @@ Prevent Firefox from messaging the user in certain situations. **Compatibility:** Firefox 75, Firefox ESR 68.7\ **CCK2 Equivalent:** N/A\ -**Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla` +**Preferences Affected:** `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla` #### Windows (GPO) ``` -Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0 @@ -6133,7 +6173,6 @@ Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0 #### Windows (Intune) OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions @@ -6150,8 +6189,6 @@ Value (string): UserMessaging - WhatsNew - | ExtensionRecommendations | FeatureRecommendations @@ -6172,7 +6209,6 @@ Value (string): { "policies": { "UserMessaging": { - "WhatsNew": true | false, "ExtensionRecommendations": true | false, "FeatureRecommendations": true | false, "UrlbarInterventions": true | false,