X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/ca0083999dee770d74eb458d73264c75f58fd81d..2d51f613f13e070c199200275f5fd3059914efe4:/docs/index.md diff --git a/docs/index.md b/docs/index.md index 479fbd6..4e59368 100644 --- a/docs/index.md +++ b/docs/index.md @@ -71,6 +71,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions. | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates. | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page. +| **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest. | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar. | **[`Handlers`](#handlers)** | Configure default application handlers. | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration. @@ -97,6 +98,7 @@ Unfortunately, JSON files do not support comments, but you can add extra entries | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed. | **[`Preferences`](#preferences)** | Set and lock preferences. | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password. +| **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing. | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading. | **[`Proxy`](#proxy)** | Configure proxy settings. | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference. @@ -1977,6 +1979,8 @@ Prevent the user from bypassing security in certain cases. `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway. +These policies only affect what happens when an error is shown, they do not affect any settings in preferences. + **Compatibility:** Firefox 60, Firefox ESR 60\ **CCK2 Equivalent:** N/A\ **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride` @@ -2750,6 +2754,7 @@ The configuration for each extension is another dictionary that can contain the | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration. | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration. | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension. +| `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`. **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\ **CCK2 Equivalent:** N/A\ @@ -2967,6 +2972,82 @@ Value (string): } } ``` +### FirefoxSuggest +Customize Firefox Suggest (US only). + +**Compatibility:** Firefox 118, Firefox ESR 115.3. +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked +``` +Value (string): +``` + or +``` +#### macOS +``` + + FirefoxSuggest + + WebSuggestions + | + SponsoredSuggestions + | + ImproveSuggest + | + Locked + | + + +``` +#### policies.json +``` +{ + "policies": { + "FirefoxSuggest": { + "WebSuggestions": true | false, + "SponsoredSuggestions": true | false, + "ImproveSuggest": true | false, + "Locked": true | false + } + } +} +``` ### GoToIntranetSiteForSingleWordEntryInAddressBar Whether to always go through the DNS server before sending a single word search string to a search engine. @@ -4517,6 +4598,7 @@ media. network. pdfjs. (Firefox 84, Firefox ESR 78.6) places. +pref. print. signon. (Firefox 83, Firefox ESR 78.5) spellchecker. (Firefox 84, Firefox ESR 78.6) @@ -4524,6 +4606,7 @@ toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91. ui. widget. xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only) +xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3) ``` as well as the following security preferences: @@ -4531,6 +4614,10 @@ as well as the following security preferences: | --- | --- | --- | | security.default_personal_cert | string | Ask Every Time |     If set to Select Automatically, Firefox automatically chooses the default personal certificate. +| security.disable_button.openCertManager | string | N/A +|     If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6) +| security.disable_button.openDeviceManager | string | N/A +|     If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6) | security.insecure_connection_text.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites. | security.insecure_connection_text.pbmode.enabled | bool | false @@ -4540,21 +4627,23 @@ as well as the following security preferences: | security.osclientcerts.autoload | boolean | false |     If true, client certificates are loaded from the operating system certificate store. | security.OCSP.enabled | integer | 1 -|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates +|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates. | security.OCSP.require | boolean | false |      If true, if an OCSP request times out, the connection fails. | security.osclientcerts.assume_rsa_pss_support | boolean | true -|      If false, we don't assume an RSA key can do RSA-PSS (Firefox 114, Firefox ESR 102.12). +|      If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12) | security.ssl.enable_ocsp_stapling | boolean | true |      If false, OCSP stapling is not enabled. | security.ssl.errorReporting.enabled | boolean | true |     If false, SSL errors cannot be sent to Mozilla. +| security.ssl.require_safe_negotiation | boolean | false +|     If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3) | security.tls.enable_0rtt_data | boolean | true -|     If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15). +|     If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15) | security.tls.hello_downgrade_check | boolean | true |     If false, the TLS 1.3 downgrade check is disabled. | security.tls.version.enable-deprecated | boolean | false -|     If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8). +|     If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8) | security.warn_submit_secure_to_insecure | boolean | true |     If false, no warning is shown when submitting a form from https to http. @@ -4711,6 +4800,41 @@ Value (string): } } ``` +### PrintingEnabled +Enable or disable printing. + +**Compatibility:** Firefox 120, Firefox ESR 115.5\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** `print.enabled` + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled +``` +Value (string): +``` + or +``` +#### macOS +``` + + PrintingEnabled + | + +``` +#### policies.json +``` +{ + "policies": { + "PrintingEnabled": true | false + } +} +``` ### PromptForDownloadLocation Ask where to save each file before downloading. @@ -4784,7 +4908,7 @@ Unless you lock this policy, changes the user already has in place will take eff ``` Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig" Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0 -Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com +Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com @@ -5646,7 +5770,7 @@ Value (string): ``` ### SSLVersionMax -Set and lock the maximum version of TLS. +Set and lock the maximum version of TLS. (Firefox defaults to a maximum of TLS 1.3.) **Compatibility:** Firefox 66, Firefox ESR 60.6\ **CCK2 Equivalent:** N/A\ @@ -5684,7 +5808,7 @@ Value (string): ``` ### SSLVersionMin -Set and lock the minimum version of TLS. +Set and lock the minimum version of TLS. (Firefox defaults to a minimum of TLS 1.2.) **Compatibility:** Firefox 66, Firefox ESR 60.6\ **CCK2 Equivalent:** N/A\