X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/ea82defbfcc72b10dbb1323f15f023b22841a7be..7a35fbd419163e838e94c14973a381024e267c8f:/README.md?ds=inline diff --git a/README.md b/README.md index 60d8464..6a6faad 100644 --- a/README.md +++ b/README.md @@ -76,6 +76,7 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture. | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed. | **[`Preferences`](#preferences)** | Set and lock some preferences. +| **[`Preferences (deprecated)`](#preferences--deprecated)** | Set and lock some preferences. | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading. | **[`Proxy`](#proxy)** | Configure proxy settings. | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference. @@ -2025,15 +2026,43 @@ Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https #### Windows (Intune) OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value ``` Value (string): ``` - - - - - + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions +``` +Value (string): +``` + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked +``` +Value (string): +``` + or ``` #### macOS ``` @@ -2265,6 +2294,7 @@ Value (string): ``` + } +}'/> ``` #### macOS ``` @@ -2351,7 +2382,7 @@ Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0 #### Windows (Intune) OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate ``` Value (string): ``` @@ -2478,7 +2509,7 @@ Within each handler type, you specify the given mimeType/extension/scheme as a k #### Windows (GPO) ``` -Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) = +Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) = { "mimeTypes": { "application/msword": { @@ -3328,7 +3359,7 @@ Value (string): } ``` ### Permissions -Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below. +Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below. `Allow` is a list of origins where the feature is allowed. @@ -3340,9 +3371,9 @@ Set permissions associated with camera, microphone, location, notifications, and `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68. -**Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\ +**Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\ **CCK2 Equivalent:** N/A\ -**Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default` +**Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`.`permissions.default.xr` #### Windows (GPO) ``` @@ -3367,6 +3398,10 @@ Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://exampl Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu" Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video" Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org" +Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu" +Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0 +Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0 ``` #### Windows (Intune) OMA-URI: @@ -3445,6 +3480,40 @@ Value (string): ``` or ``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked +``` +Value (string): +``` + or +``` #### macOS ``` @@ -3681,6 +3750,145 @@ Value (string): } ``` ### Preferences +Set the default and user values of certain preferences, as well as lock and clear them. + +IMPORTANT: If you set a preference using this mechanism that has be set by a different policy, the behavior is undefined. You should only use one method for setting preferences. + +Preferences that start with the following prefixes are supported: +``` +accessibility. +browser. +datareporting.policy. +dom. +extensions. +geo. +intl. +layout. +media. +network. +places. +print. +ui. +widget. +``` +as well as the following security preferences: +``` +security.default_personal_cert +security.insecure_connection_text.enabled +security.insecure_connection_text.pbmode.enabled +security.insecure_field_warning.contextual.enabled +security.mixed_content.block_active_content +security.osclientcerts.autoload +security.ssl.errorReporting.enabled +security.tls.hello_downgrade_check +security.warn_submit_secure_to_insecure +``` +For a given preferences, set the `Value` to the corresponding preference value. + +`Status` can be "default", "locked", "user" or "clear" + +If a value is locked, it is also set as the default. + +User preferences persist across invocations of Firefox. + +Status +**Compatibility:** Firefox 81, Firefox ESR 78.3\ +**CCK2 Equivalent:** `preferences`\ +**Preferences Affected:** See below + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) = +{ + "accessibility.force_disabled": { + "Value": 1 + "Status": "default", + }, + "browser.cache.disk.parent_directory": { + "Value": "SOME_NATIVE_PATH", + "Status": "user" + }, + "browser.tabs.warnOnClose": { + "Value": false, + "Status": "locked" + } +} +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences +``` +Value (string): +``` + + +``` +#### macOS +``` + + Preferences + + accessibility.force_disabled + + Value + 1 + Status + default + + browser.cache.disk.parent_directory + + Value + SOME_NATIVE_PATH + Status + user + + browser.tabs.warnOnClose + + Value + + Status + locked + + + +``` +#### policies.json +``` +{ + "policies": { + "Preferences": { + "accessibility.force_disabled": { + "Value": 1 + "Status": "default", + }, + "browser.cache.disk.parent_directory": { + "Value": "SOME_NATIVE_PATH", + "Status": "user" + }, + "browser.tabs.warnOnClose": { + "Value": false, + "Status": "locked" + } + } + } +} +``` +### Preferences (deprecated) Set and lock certain preferences. **Compatibility:** See below\ @@ -3706,7 +3914,7 @@ Set and lock certain preferences. | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false |     If true, single words are sent to DNS, not directly to search. | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent -|     If set, a list of URLs to use as the default top sites on the new tab page. +|     If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly. | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2 |     If true, bookmarks are always imported on startup. | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true @@ -3906,7 +4114,7 @@ To specify ports, append them to the hostnames with a colon (:). #### Windows (GPO) ``` -Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig" +Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig" Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0 @@ -3977,7 +4185,7 @@ Value (string): { "policies": { "Proxy": { - "Mode": "none", "system", "manual", "autoDetect", "autoConfig", + "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig", "Locked": true | false, "HTTPProxy": "hostname", "UseHTTPProxyForAllProtocols": true | false, @@ -4448,7 +4656,7 @@ Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0 #### Windows (Intune) OMA-URI: ``` -./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled ``` Value (string): ```