X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/417f958cbfb569456953c7ba642e24bde4570276..2e3ed8c724a4967f74b53a7b0b5e5ba842b44eda:/README.md
diff --git a/README.md b/README.md
index eeee700..d38e25a 100644
--- a/README.md
+++ b/README.md
@@ -9,6 +9,7 @@ Policies can be specified using the [Group Policy templates on Windows](https://
| **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
| **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
| **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
+| **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
| **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
| **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
| **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
@@ -55,11 +56,13 @@ Policies can be specified using the [Group Policy templates on Windows](https://
| **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
| **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
| **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
+| **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
| **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
| **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
| **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
| **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
| **[`FlashPlugin (Deprecated)`](#flashplugin-deprecated)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
+| **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
| **[`Handlers`](#handlers)** | Configure default application handlers.
| **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
| **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
@@ -69,7 +72,7 @@ Policies can be specified using the [Group Policy templates on Windows](https://
| **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
| **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
| **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
-| **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
+| **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
| **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
| **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
| **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
@@ -102,8 +105,10 @@ Policies can be specified using the [Group Policy templates on Windows](https://
| **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
| **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
| **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
+| **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
| **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
| **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
+| **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
| **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
| **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
@@ -246,6 +251,49 @@ Value (string):
}
}
```
+### AppUpdatePin
+
+Prevent Firefox from being updated beyond the specified version.
+
+You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
+
+You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
+
+You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
+
+**Compatibility:** Firefox 102,\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** N/A
+
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
+```
+Value (string):
+```
+
+
+```
+#### macOS
+```
+
+ AppUpdatePin
+ 106.
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "AppUpdatePin": "106."
+ }
+}
+```
### AppUpdateURL
Change the URL for application update if you are providing Firefox updates from a custom update server.
@@ -2438,6 +2486,72 @@ Enable policy support on macOS.
```
+### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
+
+Disable warnings based on file extension for specific file types on domains.
+
+This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
+
+Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
+
+**Compatibility:** Firefox 102\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** N/A
+
+#### Windows (GPO)
+Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
+```
+[
+ {
+ "file_extension": "jnlp",
+ "domains": ["example.com"]
+ }
+]
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
+```
+Value (string):
+```
+
+
+```
+#### macOS
+```
+
+ ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
+
+
+ file_extension
+ jnlp
+ domains
+
+ example.com
+
+
+
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
+ "file_extension": "jnlp",
+ "domains": ["example.com"]
+ }]
+ }
+}
+```
### Extensions
Control the installation, uninstallation and locking of extensions.
@@ -2842,6 +2956,51 @@ Value (string):
}
}
```
+### GoToIntranetSiteForSingleWordEntryInAddressBar
+Whether to always go through the DNS server before sending a single word search string to a search engine.
+
+If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
+
+The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
+
+If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
+
+You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
+
+Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
+
+**Compatibility:** Firefox 104, Firefox ESR 102.2\
+**CCK2 Equivalent:** `N/A`\
+**Preferences Affected:** `browser.fixup.dns_first_for_single_words`
+
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
+```
+Value (string):
+```
+ or
+```
+#### macOS
+```
+
+ GoToIntranetSiteForSingleWordEntryInAddressBar
+ |
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
+ }
+}
+```
### Handlers
Configure default application handlers. This policy is based on the internal format of `handlers.json`.
@@ -3826,7 +3985,7 @@ Value (string):
### PasswordManagerExceptions
Prevent Firefox from saving passwords for specific sites.
-The sites are specified as a list of origins..
+The sites are specified as a list of origins.
**Compatibility:** Firefox 101\
**CCK2 Equivalent:** N/A\
@@ -3845,7 +4004,7 @@ OMA-URI:
Value (string):
```
-
+
```
#### macOS
```
@@ -5598,6 +5757,40 @@ Value (string):
}
}
```
+### StartDownloadsInTempDirectory
+Force downloads to start off in a local, temporary location rather than the default download directory.
+
+**Compatibility:** Firefox 102\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** `browser.downloads.start_downloads_in_tmp_dir`
+
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
+```
+Value (string):
+```
+ or
+```
+#### macOS
+```
+
+ StartDownloadsInTempDirectory
+ |
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "StartDownloadsInTempDirectory": true | false
+}
+```
### UserMessaging
Prevent Firefox from messaging the user in certain situations.
@@ -5669,13 +5862,48 @@ Value (string):
"WhatsNew": true | false,
"ExtensionRecommendations": true | false,
"FeatureRecommendations": true | false,
- "UrlbarInterventions": true | false
+ "UrlbarInterventions": true | false,
"SkipOnboarding": true | false,
"MoreFromMozilla": true | false
}
}
}
```
+### UseSystemPrintDialog
+Use the system print dialog instead of the print preview window.
+
+**Compatibility:** Firefox 102\
+**CCK2 Equivalent:** N/A\
+**Preferences Affected:** `print.prefer_system_dialog`
+
+#### Windows (GPO)
+```
+Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
+```
+#### Windows (Intune)
+OMA-URI:
+```
+./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
+```
+Value (string):
+```
+ or
+```
+#### macOS
+```
+
+ UseSystemPrintDialog
+ |
+
+```
+#### policies.json
+```
+{
+ "policies": {
+ "UseSystemPrintDialog": true | false
+ }
+}
+```
### WebsiteFilter
Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
The arrays are limited to 1000 entries each.