X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/3a11a0987cf32ec19d008f87e9192637b2d560ba..c0330c90d8fa1750102477ba3b2adb7453e807c5:/docs/index.md?ds=sidebyside diff --git a/docs/index.md b/docs/index.md index 3420922..3dc6e9e 100644 --- a/docs/index.md +++ b/docs/index.md @@ -17,6 +17,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | --- | --- | | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed. | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace. +| **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs. | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update. | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version. | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update. @@ -33,6 +34,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator. | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store. | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/). +| **[`ContentAnalysis`](#contentanalysis)** | Configure Firefox to use an agent for Data Loss Prevention (DLP) that is compatible with the [Google Chrome Content Analysis Connector Agent SDK](https://github.com/chromium/content_analysis_sdk). | **[`Cookies`](#cookies)** | Configure cookie preferences. | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory. | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates. @@ -219,6 +221,42 @@ Value (string): } } ``` +### AllowFileSelectionDialogs + +Enable or disable file selection dialogs. + +**Compatibility:** Firefox 124\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `widget.disable_file_pickers` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate +``` +Value (string): +``` + or +``` +#### macOS +``` + + AllowFileSelectionDialogs + | + +``` +#### policies.json +``` +{ + "policies": { + "AllowFileSelectionDialogs": true | false + } +} +``` ### AppAutoUpdate Enable or disable **automatic** application update. @@ -587,6 +625,8 @@ If set to false, the application will not try to install updates when the applic If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect. +If you are having trouble getting the background task to run, verify your configuration with the ["Requirements to run" section in this support document](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows). + **Compatibility:** Firefox 90 (Windows only)\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `app.update.background.enabled` @@ -1080,6 +1120,167 @@ Value (string): } } ``` +### ContentAnalysis +Configure Firefox to use an agent for Data Loss Prevention (DLP) that is compatible with the [Google Chrome Content Analysis Connector Agent SDK](https://github.com/chromium/content_analysis_sdk). + +`AgentName` is the name of the DLP agent. This is used in dialogs and notifications about DLP operations. The default is "A DLP Agent". + +`AgentTimeout` is the timeout in number of seconds after a DLP request is sent to the agent. After this timeout, the request will be denied unless `DefaultAllow` is set to true. The default is 30. + +`AllowUrlRegexList` is a space-separated list of regular expressions that indicates URLs for which DLP operations will always be allowed without consulting the agent. The default is the empty string. + +`BypassForSameTabOperations` indicates whether Firefox will automatically allow DLP requests whose data comes from the same tab and frame - for example, if data is copied to the clipboard and then pasted on the same page. The default is false. + +`ClientSignature` indicates the required signature of the DLP agent connected to the pipe. If this is a non-empty string and the DLP agent does not have a signature matching this value, Firefox will not connect to the pipe. The default is the empty string. + +`DefaultAllow` indicates whether DLP requests should be allowed if there is a problem connecting to the DLP agent. The default is false. + +`DenyUrlRegexList` is a space-separated list of regular expressions that indicates URLs for which DLP operations will always be denied without consulting the agent. The default is the empty string. + +`Enabled` indicates whether Firefox should use DLP. Note that if this value is true and no DLP agent is running, all DLP requests will be denied unless `DefaultAllow` is set to true. + +`IsPerUser` indicates whether the pipe the DLP agent has created is per-user or per-system. The default is true, meaning per-user. + +`PipePathName` is the name of the pipe the DLP agent has created and Firefox will connect to. The default is "path_user". + +`ShowBlockedResult` indicates whether Firefox should show a notification when a DLP request is denied. The default is true. + +**Compatibility:** Firefox 126\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `browser.contentanalysis.agent_name`, `browser.contentanalysis.agent_timeout`, `browser.contentanalysis.allow_url_regex_list`, `browser.contentanalysis.bypass_for_same_tab_operations`, `browser.contentanalysis.client_signature`, `browser.contentanalysis.default_allow`, `browser.contentanalysis.deny_url_regex_list`, `browser.contentanalysis.enabled`, `browser.contentanalysis.is_per_user`, `browser.contentanalysis.pipe_path_name`, `browser.contentanalysis.show_blocked_result` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\ContentAnalysis\AgentName = "My DLP Product" +Software\Policies\Mozilla\Firefox\ContentAnalysis\AgentTimeout = 60 +Software\Policies\Mozilla\Firefox\ContentAnalysis\AllowUrlRegexList = "https://example\.com/.* https://subdomain\.example\.com/.*" +Software\Policies\Mozilla\Firefox\ContentAnalysis\BypassForSameTabOperations = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\ContentAnalysis\ClientSignature = "My DLP Company" +Software\Policies\Mozilla\Firefox\ContentAnalysis\DefaultAllow = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\ContentAnalysis\DenyUrlRegexList = "https://example\.com/.* https://subdomain\.example\.com/.*" +Software\Policies\Mozilla\Firefox\ContentAnalysis\Enabled = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\ContentAnalysis\IsPerUser = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\ContentAnalysis\PipePathName = "pipe_custom_name" +Software\Policies\Mozilla\Firefox\ContentAnalysis\ShowBlockedResult = 0x1 | 0x0 +``` + +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AgentName +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AgentTimeout +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_AllowUrlRegexList +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_BypassForSameTabOperations +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_ClientSignature +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_DefaultAllow +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_DenyUrlRegexList +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_Enabled +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_IsPerUser +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_PipePathName +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ContentAnalysis/ContentAnalysis_ShowBlockedResult +``` +Value (string): +``` + or +``` + +#### policies.json +``` +{ + "policies": { + "ContentAnalysis": { + "AgentName": "My DLP Product", + "AgentTimeout": 60, + "AllowUrlRegexList": "https://example\.com/.* https://subdomain\.example\.com/.*", + "BypassForSameTabOperations": true | false, + "ClientSignature": "My DLP Company", + "DefaultAllow": true | false, + "DenyUrlRegexList": "https://example\.com/.* https://subdomain\.example\.com/.*", + "Enabled": true | false, + "IsPerUser": true | false, + "PipePathName": "pipe_custom_name", + "ShowBlockedResult": true | false, + } + } +} +``` + ### Cookies Configure cookie preferences. @@ -2259,7 +2460,9 @@ Configure DNS over HTTPS. `ExcludedDomains` excludes domains from DNS over HTTPS. -**Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\ +`Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider. + +**Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `network.trr.mode`, `network.trr.uri` @@ -2269,6 +2472,7 @@ Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER" Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com" +Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0 ``` #### Windows (Intune) OMA-URI: @@ -2305,6 +2509,14 @@ Value (string): ``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback +``` +Value (string): +``` + or +``` #### macOS ``` @@ -2320,6 +2532,8 @@ Value (string): example.com + Fallback + | ``` @@ -2331,7 +2545,8 @@ Value (string): "Enabled": true | false, "ProviderURL": "URL_TO_ALTERNATE_PROVIDER", "Locked": true | false, - "ExcludedDomains": ["example.com"] + "ExcludedDomains": ["example.com"], + "Fallback": true | false, } } } @@ -2652,7 +2867,9 @@ Value (string): ### Extensions Control the installation, uninstallation and locking of extensions. -While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs. +We strongly recommend that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs. + +This method will be deprecated in the near future. `Install` is a list of URLs or native paths for extensions to be installed. @@ -2775,7 +2992,8 @@ Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) = "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi" }, "https-everywhere@eff.org": { - "installation_mode": "allowed" + "installation_mode": "allowed", + "updates_disabled": false } } ``` @@ -2800,7 +3018,8 @@ Value (string): "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi" }, "https-everywhere@eff.org": { - "installation_mode": "allowed" + "installation_mode": "allowed", + "updates_disabled": false } }'/> ``` @@ -2827,14 +3046,16 @@ Value (string): uBlock0@raymondhill.net installation_mode - force_installed + force_installed install_url https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi https-everywhere@eff.org installation_mode - allowed + allowed + updates_disabled + | @@ -2855,7 +3076,8 @@ Value (string): "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi" }, "https-everywhere@eff.org": { - "installation_mode": "allowed" + "installation_mode": "allowed", + "updates_disabled": false } } } @@ -2899,7 +3121,7 @@ Value (string): ### FirefoxHome Customize the Firefox Home page. -**Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4) +**Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4, Snippets was deprecated in Firefox 122) **CCK2 Equivalent:** N/A\ **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored` @@ -3776,12 +3998,32 @@ If this policy is enabled: 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way. 3. The update UI will work as expected, unlike when using DisableAppUpdate. -This policy is primarily intended for advanced end users, not for enterprises. +This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO. **Compatibility:** Firefox 87\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** N/A +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly +``` +Value (string): +``` + or +``` +#### macOS +``` + + ManualAppUpdateOnly + | + +``` #### policies.json ``` { @@ -4129,7 +4371,7 @@ Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue t **Compatibility:** Firefox 77, Firefox ESR 68.9\ **CCK2 Equivalent:** N/A\ -**Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions` +**Preferences Affected:** `pdfjs.disabled`, `pdfjs.enablePermissions` #### Windows (GPO) ``` @@ -4581,7 +4823,8 @@ Previously you could only set and lock a subset of preferences. Starting with Fi Preferences that start with the following prefixes are supported: ``` accessibility. -app.update.* (Firefox 86, Firefox 78.8) +alerts.* (Firefox 122, Firefox ESR 115.7) +app.update.* (Firefox 86, Firefox ESR 78.8) browser. datareporting.policy. dom. @@ -4614,6 +4857,10 @@ as well as the following security preferences: | --- | --- | --- | | security.default_personal_cert | string | Ask Every Time |     If set to Select Automatically, Firefox automatically chooses the default personal certificate. +| security.disable_button.openCertManager | string | N/A +|     If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6) +| security.disable_button.openDeviceManager | string | N/A +|     If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6) | security.insecure_connection_text.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites. | security.insecure_connection_text.pbmode.enabled | bool | false @@ -4656,6 +4903,8 @@ Using the preference as the key, set the `Value` to the corresponding preference `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy. +You can also set the `Type` starting in Firefox 123 and Firefox ESR 115.8. It can be `number`, `boolean` or `string`. This is especially useful if you are seeing 0 or 1 values being converted to booleans when set as user preferences. + See the examples below for more detail. IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way. @@ -4671,7 +4920,9 @@ Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) = { "accessibility.force_disabled": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" + }, "browser.cache.disk.parent_directory": { "Value": "SOME_NATIVE_PATH", @@ -4695,7 +4946,8 @@ Value (string): { "accessibility.force_disabled": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.cache.disk.parent_directory": { "Value": "SOME_NATIVE_PATH", @@ -4718,6 +4970,8 @@ Value (string): 1 Status default + Type + number browser.cache.disk.parent_directory @@ -4744,6 +4998,7 @@ Value (string): "accessibility.force_disabled": { "Value": 1, "Status": "default" + "Type": "number" }, "browser.cache.disk.parent_directory": { "Value": "SOME_NATIVE_PATH",