X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/b41d108e4dad11d1ecb31f866862d932835095f8..2d51f613f13e070c199200275f5fd3059914efe4:/docs/index.md diff --git a/docs/index.md b/docs/index.md index a8304cb..4e59368 100644 --- a/docs/index.md +++ b/docs/index.md @@ -71,6 +71,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions. | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates. | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page. +| **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest. | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar. | **[`Handlers`](#handlers)** | Configure default application handlers. | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration. @@ -97,6 +98,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed. | **[`Preferences`](#preferences)** | Set and lock preferences. | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password. +| **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing. | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading. | **[`Proxy`](#proxy)** | Configure proxy settings. | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference. @@ -1977,6 +1979,8 @@ Prevent the user from bypassing security in certain cases. `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway. +These policies only affect what happens when an error is shown, they do not affect any settings in preferences. + **Compatibility:** Firefox 60, Firefox ESR 60\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride` @@ -2968,6 +2972,82 @@ Value (string): } } ``` +### FirefoxSuggest +Customize Firefox Suggest (US only). + +**Compatibility:** Firefox 118, Firefox ESR 115.3. +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked +``` +Value (string): +``` + or +``` +#### macOS +``` + + FirefoxSuggest + + WebSuggestions + | + SponsoredSuggestions + | + ImproveSuggest + | + Locked + | + + +``` +#### policies.json +``` +{ + "policies": { + "FirefoxSuggest": { + "WebSuggestions": true | false, + "SponsoredSuggestions": true | false, + "ImproveSuggest": true | false, + "Locked": true | false + } + } +} +``` ### GoToIntranetSiteForSingleWordEntryInAddressBar Whether to always go through the DNS server before sending a single word search string to a search engine. @@ -4518,6 +4598,7 @@ media. network. pdfjs. (Firefox 84, Firefox ESR 78.6) places. +pref. print. signon. (Firefox 83, Firefox ESR 78.5) spellchecker. (Firefox 84, Firefox ESR 78.6) @@ -4525,6 +4606,7 @@ toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91. ui. widget. xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only) +xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3) ``` as well as the following security preferences: @@ -4532,6 +4614,10 @@ as well as the following security preferences: | --- | --- | --- | | security.default_personal_cert | string | Ask Every Time |     If set to Select Automatically, Firefox automatically chooses the default personal certificate. +| security.disable_button.openCertManager | string | N/A +|     If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6) +| security.disable_button.openDeviceManager | string | N/A +|     If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6) | security.insecure_connection_text.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites. | security.insecure_connection_text.pbmode.enabled | bool | false @@ -4541,21 +4627,23 @@ as well as the following security preferences: | security.osclientcerts.autoload | boolean | false |     If true, client certificates are loaded from the operating system certificate store. | security.OCSP.enabled | integer | 1 -|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates +|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates. | security.OCSP.require | boolean | false |      If true, if an OCSP request times out, the connection fails. | security.osclientcerts.assume_rsa_pss_support | boolean | true -|      If false, we don't assume an RSA key can do RSA-PSS (Firefox 114, Firefox ESR 102.12). +|      If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12) | security.ssl.enable_ocsp_stapling | boolean | true |      If false, OCSP stapling is not enabled. | security.ssl.errorReporting.enabled | boolean | true |     If false, SSL errors cannot be sent to Mozilla. +| security.ssl.require_safe_negotiation | boolean | false +|     If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3) | security.tls.enable_0rtt_data | boolean | true -|     If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15). +|     If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15) | security.tls.hello_downgrade_check | boolean | true |     If false, the TLS 1.3 downgrade check is disabled. | security.tls.version.enable-deprecated | boolean | false -|     If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8). +|     If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8) | security.warn_submit_secure_to_insecure | boolean | true |     If false, no warning is shown when submitting a form from https to http. @@ -4712,6 +4800,41 @@ Value (string): } } ``` +### PrintingEnabled +Enable or disable printing. + +**Compatibility:** Firefox 120, Firefox ESR 115.5\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `print.enabled` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled +``` +Value (string): +``` + or +``` +#### macOS +``` + + PrintingEnabled + | + +``` +#### policies.json +``` +{ + "policies": { + "PrintingEnabled": true | false + } +} +``` ### PromptForDownloadLocation Ask where to save each file before downloading. @@ -4785,7 +4908,7 @@ Unless you lock this policy, changes the user already has in place will take eff ``` Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig" Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0 -Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com +Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com