X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/8dcf0729293dec2b12f813bf8eb650d9a66d01ed..2e3ed8c724a4967f74b53a7b0b5e5ba842b44eda:/README.md?ds=inline diff --git a/README.md b/README.md index 1a4fcb6..d38e25a 100644 --- a/README.md +++ b/README.md @@ -9,6 +9,7 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed. | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace. | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update. +| **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version. | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update. | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication. | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user. @@ -61,6 +62,7 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates. | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page. | **[`FlashPlugin (Deprecated)`](#flashplugin-deprecated)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed. +| **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar. | **[`Handlers`](#handlers)** | Configure default application handlers. | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration. | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts. @@ -103,6 +105,7 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar. | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS. | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS. +| **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory. | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information. | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user. | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview. @@ -248,6 +251,49 @@ Value (string): } } ``` +### AppUpdatePin + +Prevent Firefox from being updated beyond the specified version. + +You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version. + +You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version. + +You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version. + +**Compatibility:** Firefox 102,\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** N/A + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\AppUpdatePin = "106." +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin +``` +Value (string): +``` + + +``` +#### macOS +``` + + AppUpdatePin + 106. + +``` +#### policies.json +``` +{ + "policies": { + "AppUpdatePin": "106." + } +} +``` ### AppUpdateURL Change the URL for application update if you are providing Firefox updates from a custom update server. @@ -2453,7 +2499,7 @@ Important: The documentation for the policy for both Edge and Chrome is incorrec **Preferences Affected:** N/A #### Windows (GPO) -Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) = +Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) = ``` [ { @@ -2910,6 +2956,51 @@ Value (string): } } ``` +### GoToIntranetSiteForSingleWordEntryInAddressBar +Whether to always go through the DNS server before sending a single word search string to a search engine. + +If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search. + +The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered. + +If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page. + +You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`. + +Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`. + +**Compatibility:** Firefox 104, Firefox ESR 102.2\ +**CCK2 Equivalent:** `N/A`\ +**Preferences Affected:** `browser.fixup.dns_first_for_single_words` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar +``` +Value (string): +``` + or +``` +#### macOS +``` + + GoToIntranetSiteForSingleWordEntryInAddressBar + | + +``` +#### policies.json +``` +{ + "policies": { + "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false + } +} +``` ### Handlers Configure default application handlers. This policy is based on the internal format of `handlers.json`. @@ -5666,6 +5757,40 @@ Value (string): } } ``` +### StartDownloadsInTempDirectory +Force downloads to start off in a local, temporary location rather than the default download directory. + +**Compatibility:** Firefox 102\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `browser.downloads.start_downloads_in_tmp_dir` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory +``` +Value (string): +``` + or +``` +#### macOS +``` + + StartDownloadsInTempDirectory + | + +``` +#### policies.json +``` +{ + "policies": { + "StartDownloadsInTempDirectory": true | false +} +``` ### UserMessaging Prevent Firefox from messaging the user in certain situations.