X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/2404d11c96abe874532d0b2e4f7109a57f486a7b..b5e8ac11f48b7ed7b61807b28c05c5192f9a1036:/docs/index.md?ds=inline diff --git a/docs/index.md b/docs/index.md index 744be31..9923f2e 100644 --- a/docs/index.md +++ b/docs/index.md @@ -1283,7 +1283,7 @@ Configure Firefox to use an agent for Data Loss Prevention (DLP) that is compati `ShowBlockedResult` indicates whether Firefox should show a notification when a DLP request is denied. The default is true. -**Compatibility:** Firefox 132\ +**Compatibility:** Firefox 136\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `browser.contentanalysis.agent_name`, `browser.contentanalysis.agent_timeout`, `browser.contentanalysis.allow_url_regex_list`, `browser.contentanalysis.bypass_for_same_tab_operations`, `browser.contentanalysis.client_signature`, `browser.contentanalysis.default_result`, `browser.contentanalysis.deny_url_regex_list`, `browser.contentanalysis.enabled`, `browser.contentanalysis.interception_point.clipboard.enabled`, `browser.contentanalysis.interception_point.drag_and_drop.enabled`, `browser.contentanalysis.interception_point.file_upload.enabled`, `browser.contentanalysis.interception_point.print.enabled`, `browser.contentanalysis.is_per_user`, `browser.contentanalysis.pipe_path_name`, `browser.contentanalysis.show_blocked_result` @@ -1379,34 +1379,31 @@ Value (string): ``` OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_InterceptionPoints_Clipboard_Enabled +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis~InterceptionPoints/ContentAnalysis_InterceptionPoints_Clipboard ``` Value (string): ``` or ``` -``` OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_InterceptionPoints_DragAndDrop_Enabled +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis~InterceptionPoints/ContentAnalysis_InterceptionPoints_DragAndDrop ``` Value (string): ``` or ``` -``` OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_InterceptionPoints_FileUpload_Enabled +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis~InterceptionPoints/ContentAnalysis_InterceptionPoints_FileUpload ``` Value (string): ``` or ``` -``` OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_InterceptionPoints_Print_Enabled +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis~InterceptionPoints/ContentAnalysis_InterceptionPoints_Print ``` Value (string): ``` @@ -2540,7 +2537,7 @@ This policy only works on Windows through GPO (not policies.json). #### Windows (GPO) ``` -Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = 0x1 | 0x0 ``` #### Windows (Intune) OMA-URI: @@ -3177,6 +3174,7 @@ The configuration for each extension is another dictionary that can contain the | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension. | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`. | `temporarily_allow_weak_signatures`| (Firefox 127) A boolean that indicates whether to allow installing extensions signed using deprecated signature algorithms. +| `private_browsing`| (Firefox 136, Firefox ESR 128.8) A boolean that indicates whether or not this extension should be enabled in private browsing. **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\ **CCK2 Equivalent:** N/A\ @@ -5316,6 +5314,8 @@ Set and lock preferences. Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences. +**NOTE** There are too many preferences for us to provide documentation on them all. The source file [StaticPrefList.yaml](https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml) contains information on many of them. + Preferences that start with the following prefixes are supported: ``` accessibility. @@ -5379,6 +5379,10 @@ as well as the following security preferences: |      If true, if an OCSP request times out, the connection fails. | security.osclientcerts.assume_rsa_pss_support | boolean | true |      If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12) +| security.pki.certificate_transparency.disable_for_hosts | | +|      See [this page](https://searchfox.org/mozilla-central/rev/d1fbe983fb7720f0a4aca0e748817af11c1a374e/modules/libpref/init/StaticPrefList.yaml#16334) for more details. +| security.pki.certificate_transparency.disable_for_spki_hashes | | +|      See [this page](https://searchfox.org/mozilla-central/rev/d1fbe983fb7720f0a4aca0e748817af11c1a374e/modules/libpref/init/StaticPrefList.yaml#16344) for more details. | security.pki.certificate_transparency.mode | integer | 0 |      Configures Certificate Transparency support mode (Firefox 133) | security.ssl.enable_ocsp_stapling | boolean | true