X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/2b827326642e7ef9ccd0c64fed1487b5df560984..2a7be7e149c4dd845c77d9e846ffa3557bcb698a:/README.md?ds=inline diff --git a/README.md b/README.md index 7d56b47..c722cb1 100644 --- a/README.md +++ b/README.md @@ -6,6 +6,7 @@ Policies can be specified using the Group Policy templates on Windows (https://g | Policy Name | Description | --- | --- | +| **[`AppAutoUpdate`](#AppAutoUpdate)** | Enable or disable automatic application update. | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update. | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication. | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons). @@ -85,6 +86,33 @@ Policies can be specified using the Group Policy templates on Windows (https://g | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information. | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited. +### AppAutoUpdate + +Enable or disable automatic application update. + +**Compatibility:** Firefox 75, Firefox ESR 68.7\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** app.update.auto + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0 +``` +#### macOS +``` + + AppAutoUpdate + | + +``` +#### policies.json +``` +{ + "policies": { + "AppAutoUpdate": true | false + } +} +``` ### AppUpdateURL Change the URL for application update. @@ -762,7 +790,7 @@ Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0 Disable Firefox studies (Shield). **Compatibility:** Firefox 60, Firefox ESR 60\ -**CCK2 Equivalent:** `disableForget`\ +**CCK2 Equivalent:** N/A\ **Preferences Affected:** N/A #### Windows (GPO) @@ -1328,7 +1356,7 @@ If `Fingerprinting` is set to true, fingerprinting scripts on websites are block `Exceptions` are origins for which tracking protection is not enabled. **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\ -**CCK2 Equivalent:** `dontCheckDefaultBrowser`\ +**CCK2 Equivalent:** N/A\ **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled` #### Windows (GPO) @@ -1337,8 +1365,7 @@ Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0 -Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1= "https://example.com" - +Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com" ``` #### macOS ``` @@ -2021,7 +2048,7 @@ Remove access to the password manager via preferences and blocks about:logins on **Compatibility:** Firefox 70, Firefox ESR 60.2\ **CCK2 Equivalent:** N/A\ -**Preferences Affected:** `prefs.privacy.disable_button.view_passwords` +**Preferences Affected:** `pref.privacy.disable_button.view_passwords` #### Windows (GPO) ``` @@ -2043,7 +2070,7 @@ Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0 } ``` ### Permissions -Set permissions associated with camera, microphone, location, and notifications. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below. +Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below. `Allow` is a list of origins where the feature is allowed. @@ -2053,7 +2080,7 @@ Set permissions associated with camera, microphone, location, and notifications. `Locked` prevents the user from changing preferences for the feature. -**Compatibility:** Firefox 62, Firefox ESR 60.2\ +**Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification` @@ -2076,6 +2103,8 @@ Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://e Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu" Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org" +Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu" ``` #### macOS ``` @@ -2143,6 +2172,17 @@ Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0 Locked + Autoplay + + Allow + + https://example.org + + Block + + https://example.edu + + ``` @@ -2174,6 +2214,10 @@ Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0 "Block": ["https://example.edu"], "BlockNewRequests": true | false, "Locked": true | false + }, + "Autoplay": { + "Allow": ["https://example.org"], + "Block": ["https://example.edu"] } } } @@ -2290,6 +2334,10 @@ Set and lock certain preferences. |     See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A |     See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66 +| dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true. +|     If false, XMLDocument.load is not available. +| dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true +|     If false, XMLDocument.async is not available. | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true |     If false, the extensions blocklist is not used (Not recommended) | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A @@ -2365,7 +2413,7 @@ Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_v Ask where to save each file before downloading. **Compatibility:** Firefox 68, Firefox ESR 68\ -**CCK2 Equivalent:** N/A +**CCK2 Equivalent:** N/A\ **Preferences Affected:** `browser.download.useDownloadDir` #### Windows (GPO) @@ -2541,7 +2589,9 @@ or ### SanitizeOnShutdown (Selective) Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data. -**Compatibility:** Firefox 68, Firefox ESR 68\ +Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all. + +**Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps` #### Windows (GPO) @@ -2554,6 +2604,7 @@ Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0 ``` #### macOS ``` @@ -2576,6 +2627,8 @@ Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0 | OfflineApps | + Locked + | ``` @@ -2591,7 +2644,8 @@ Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0 "History": true | false, "Sessions": true | false, "SiteSettings": true | false, - "OfflineApps": true | false + "OfflineApps": true | false, + "Locked": true | false } } }