Mozilla Firefox Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +37 −27
Comparison against the immediately-prior release (V5R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 37
- V-251545 High The installed version of Firefox must be supported.
- V-251546 High Firefox must be configured to allow only TLS 1.2 or above.
- V-251547 Medium Firefox must be configured to ask which certificate to present to a website when a certificate is required.
- V-251548 Medium Firefox must be configured to not automatically check for updated versions of installed search plugins.
- V-251549 Medium Firefox must be configured to not automatically update installed add-ons and plugins.
- V-251550 Medium Firefox must be configured to not automatically execute or download MIME types that are not authorized for auto-download.
- V-251551 Medium Firefox must be configured to disable form fill assistance.
- V-251552 Medium Firefox must be configured to not use a password store with or without a master password.
- V-251553 Medium Firefox must be configured to block pop-up windows.
- V-251554 Medium Firefox must be configured to prevent JavaScript from moving or resizing windows.
- V-251555 Medium Firefox must be configured to prevent JavaScript from raising or lowering windows.
- V-251556 Medium Firefox must be configured to prevent JavaScript from disabling or replacing context menus.
- V-251557 Medium Firefox must be configured to disable the installation of extensions.
- V-251558 Medium Background submission of information to Mozilla must be disabled.
- V-251559 Low Firefox development tools must be disabled.
- V-251560 Medium Firefox must have the DoD root certificates installed.
- V-251561 Medium Firefox must be configured to not delete data upon shutdown.
- V-251562 Medium Firefox must prevent the user from quickly deleting data.
- V-251563 Medium Firefox private browsing must be disabled.
- V-251564 Medium Firefox search suggestions must be disabled.
- V-251565 Low Firefox autoplay must be disabled.
- V-251566 Medium Firefox network prediction must be disabled.
- V-251567 Medium Firefox fingerprinting protection must be enabled.
- V-251568 Medium Firefox cryptomining protection must be enabled.
- V-251569 Medium Firefox Enhanced Tracking Protection must be enabled.
- V-251570 Medium Firefox extension recommendations must be disabled.
- V-251571 Medium Firefox deprecated ciphers must be disabled.
- V-251572 Medium Firefox must not recommend extensions as the user is using the browser.
- V-251573 Medium The Firefox New Tab page must not show top sites.
- V-251574 Medium The Firefox New Tab page must not show recommended stories.
- V-251575 Medium The Firefox New Tab page must not show highlights.
- V-251576 Medium The Firefox New Tab page must not show snippets.
- V-251577 Medium Firefox must be configured so that DNS over HTTPS is disabled.
- V-251578 Medium Firefox accounts must be disabled.
- V-251579 Medium Firefox updates must not run in the background.
- V-251580 Medium Firefox feedback reporting must be disabled.
- V-251581 Medium Firefox encrypted media extensions must be disabled.
Removed rules 27
- V-223151 High Installed version of Firefox unsupported.
- V-223152 Medium Firefox must be configured to allow only TLS.
- V-223153 Medium FireFox is configured to ask which certificate to present to a web site when a certificate is required.
- V-223154 Medium Firefox automatically checks for updated version of installed Search plugins.
- V-223155 Medium Firefox automatically updates installed add-ons and plugins.
- V-223156 Medium Firefox automatically executes or downloads MIME types which are not authorized for auto-download.
- V-223157 Medium Network shell protocol is enabled in FireFox.
- V-223158 Medium Firefox is not configured to prompt a user before downloading and opening required file types.
- V-223159 Medium FireFox plug-in for ActiveX controls is installed.
- V-223160 Medium Firefox formfill assistance option is disabled.
- V-223161 Medium Firefox is configured to autofill passwords.
- V-223162 Medium FireFox is configured to use a password store with or without a master password.
- V-223163 Medium FireFox is not configured to block pop-up windows.
- V-223164 Medium FireFox is configured to allow JavaScript to move or resize windows.
- V-223165 Medium Firefox is configured to allow JavaScript to raise or lower windows.
- V-223166 Medium Firefox is configured to allow JavaScript to disable or replace context menus.
- V-223167 Medium Extensions install must be disabled.
- V-223168 Medium Background submission of information to Mozilla must be disabled.
- V-223169 Low Firefox Development Tools Must Be Disabled.
- V-223170 Medium Telemetry must be disabled.
- V-223171 Medium Telemetry archive must be disabled.
- V-223172 Medium Fingerprinting protection must be enabled.
- V-223173 Medium Cryptomining protection must be enabled.
- V-223174 Medium Enhanced Tracking Protection must be enabled.
- V-223175 Medium Extension recommendations must be disabled.
- V-223177 Medium Deprecated ciphers must be disabled.
- V-223179 Medium The DOD Root Certificate is not installed.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- FFOX-00-000001
- Vuln IDs
-
- V-251545
- Rule IDs
-
- SV-251545r807107_rule
Checks: C-54980r807105_chk
Run Firefox. Click the ellipsis button >> Help >> About Firefox, and view the version number. If the Firefox version is not a supported version, this is a finding.
Fix: F-54934r807106_fix
Upgrade the version of the browser to an approved version by obtaining software from the vendor or other trusted source.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- FFOX-00-000002
- Vuln IDs
-
- V-251546
- Rule IDs
-
- SV-251546r807110_rule
Checks: C-54981r807108_chk
Type "about:policies" in the browser window. If "SSLVersionMin" is not displayed under Policy Name or the Policy Value is not "tls1.2", this is a finding.
Fix: F-54935r807109_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Minimum SSL version enabled Policy State: Enabled Policy Value: TLS 1.2 macOS "plist" file: Add the following: <key>SSLVersionMin</key> <string>tls1.2</string> Linux "policies.json" file: Add the following in the policies section: "SSLVersionMin": tls1.2
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- FFOX-00-000003
- Vuln IDs
-
- V-251547
- Rule IDs
-
- SV-251547r807113_rule
Checks: C-54982r807111_chk
Type "about:policies" in the browser address bar. If "security.default_personal_cert" is not displayed with a value of "Ask Every Time", this is a finding.
Fix: F-54936r807112_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "security.default_personal_cert": { "Value": "Ask Every Time", "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>security.default_personal_cert</key> <dict> <key>Value</key> <string>Ask Every Time</string> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "security.default_personal_cert": { "Value": "Ask Every Time", "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000004
- Vuln IDs
-
- V-251548
- Rule IDs
-
- SV-251548r807116_rule
Checks: C-54983r807114_chk
Type "about:policies" in the browser address bar. If "browser.search.update" is not displayed with a value of "false", this is a finding.
Fix: F-54937r807115_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "browser.search.update": { "Value": false, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>browser.search.update</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "browser.search.update": { "Value": false, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000005
- Vuln IDs
-
- V-251549
- Rule IDs
-
- SV-251549r807119_rule
Checks: C-54984r807117_chk
Type "about:policies" in the browser window. If "ExtensionUpdate" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54938r807118_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Extensions Policy Name: Extension Update Policy State: Disabled macOS "plist" file: Add the following: <key>ExtensionUpdate</key> <false/> Linux "policies.json" file: Add the following in the policies section: "ExtensionUpdate": false
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- FFOX-00-000006
- Vuln IDs
-
- V-251550
- Rule IDs
-
- SV-251550r807122_rule
Checks: C-54985r807120_chk
Type "about:preferences" in the browser address bar. Type "Applications" in the Find bar in the upper right. Determine if any of the following file extensions are listed: HTA, JSE, JS, MOCHA, SHS, VBE, VBS, SCT, WSC. If the entry exists and the "Action" is "Save File" or "Always Ask", this is not a finding. If an extension exists and the entry in the Action column is associated with an application that does/can execute the code, this is a finding.
Fix: F-54939r807121_fix
Remove any unauthorized extensions from the auto-download list.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000007
- Vuln IDs
-
- V-251551
- Rule IDs
-
- SV-251551r807125_rule
Checks: C-54986r807123_chk
Type "about:policies" in the browser window. If "DisableFormHistory" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54940r807124_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Form History Policy State: Enabled macOS "plist" file: Add the following: <key>DisableFormHistory</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFormHistory": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000008
- Vuln IDs
-
- V-251552
- Rule IDs
-
- SV-251552r807128_rule
Checks: C-54987r807126_chk
Type "about:policies" in the browser window. If "PasswordManagerEnabled" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54941r807127_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Password Manager Policy State: Disabled macOS "plist" file: Add the following: <key>PasswordManager</key> <false/> Linux "policies.json" file: Add the following in the policies section: "PasswordManager": false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000009
- Vuln IDs
-
- V-251553
- Rule IDs
-
- SV-251553r807131_rule
Checks: C-54988r807129_chk
Type "about:policies" in the browser address bar. If "PopupBlocking" is not displayed under Policy Name or the Policy Value is not "Default" "true", this is a finding.
Fix: F-54942r807130_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Popups Policy Name: Block pop-ups from websites Policy State: Enabled macOS "plist" file: Add the following: <key>PopupBlocking</key> <true/> Linux "policies.json" file: Add the following in the policies section: "PopupBlocking": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000010
- Vuln IDs
-
- V-251554
- Rule IDs
-
- SV-251554r807134_rule
Checks: C-54989r807132_chk
Type "about:policies" in the browser address bar. If "dom.disable_window_move_resize" is not displayed with a value of "true", this is a finding.
Fix: F-54943r807133_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "dom.disable_window_move_resize": { "Value": true, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>dom.disable_window_move_resize</key> <dict> <key>Value</key> <true/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "dom.disable_window_move_resize": { "Value": true, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000011
- Vuln IDs
-
- V-251555
- Rule IDs
-
- SV-251555r807137_rule
Checks: C-54990r807135_chk
Type "about:policies" in the browser address bar. If "dom.disable_window_flip" is not displayed with a value of "true", this is a finding.
Fix: F-54944r807136_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "dom.disable_window_flip": { "Value": true, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>dom.disable_window_flip</key> <dict> <key>Value</key> <true/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "dom.disable_window_flip": { "Value": true, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000012
- Vuln IDs
-
- V-251556
- Rule IDs
-
- SV-251556r807140_rule
Checks: C-54991r807138_chk
Type "about:policies" in the browser address bar. If "dom.event.contextmenu.enabled" is not displayed with a value of "false", this is a finding.
Fix: F-54945r807139_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "dom.event.contextmenu.enabled": { "Value": false, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>dom.event.contextmenu.enabled</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "dom.event.contextmenu.enabled": { "Value": false, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000013
- Vuln IDs
-
- V-251557
- Rule IDs
-
- SV-251557r807143_rule
Checks: C-54992r807141_chk
Type "about:policies" in the browser address bar. If "InstallAddonsPermission" is not displayed under Policy Name or the Policy Value is not "Default" "false", this is a finding.
Fix: F-54946r807142_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Addons Policy Name: Allow add-on installs from websites Policy State: Disabled macOS "plist" file: Add the following: <key>InstallAddonsPermission</key> <false/> Linux "policies.json" file: Add the following in the policies section: "InstallAddonsPermission": false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000014
- Vuln IDs
-
- V-251558
- Rule IDs
-
- SV-251558r807146_rule
Checks: C-54993r807144_chk
Type "about:policies" in the browser window. If "DisableTelemetry" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54947r807145_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Telemetry Policy State: Enabled macOS "plist" file: Add the following: <key>DisableTelemetry</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableTelemetry": true
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- FFOX-00-000015
- Vuln IDs
-
- V-251559
- Rule IDs
-
- SV-251559r807149_rule
Checks: C-54994r807147_chk
Type "about:policies" in the browser window. If "DisableDeveloperTools" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54948r807148_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Developer Tools Policy State: Enabled macOS "plist" file: Add the following: <key>DisableDeveloperTools</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableDeveloperTools": true
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- FFOX-00-000016
- Vuln IDs
-
- V-251560
- Rule IDs
-
- SV-251560r807152_rule
Checks: C-54995r807150_chk
Type "about:preferences#privacy" in the browser window. Scroll down to the bottom and select "View Certificates..." In the Certificate Manager window, select the "Authorities" tab. Scroll through the Certificate Name list to the U.S. Government heading. Look for the entries for DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4. If there are entries for DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4, select them individually. Click the "View" button. Verify the publishing organization is "US Government". If there are no entries for the DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4, this is a finding. Note: In a Windows environment, use of policy setting "security.enterprise_roots.enabled=true" will point Firefox to the Windows Trusted Root Certification Authority Store. This is not a finding. It may also be set via the policy Certificates >> ImportEnterpriseRoots, which can be verified via "about:policies".
Fix: F-54949r807151_fix
Install the DoD root certificates. On Windows, import certificates from the operating system by using Certificates >> Import Enterprise Roots (Certificates) via policy or Group Policy Object (GPO).
- RMF Control
- AC-24
- Severity
- M
- CCI
- CCI-002355
- Version
- FFOX-00-000017
- Vuln IDs
-
- V-251561
- Rule IDs
-
- SV-251561r807155_rule
Checks: C-54996r807153_chk
Type "about:policies" in the browser address bar. If "SanitizeOnShutdown" is not displayed under Policy Name or the Policy Value does not have {"Cache":false,"Cookies":false,"Downloads":false,"FormData":false,"Sessions":false,"History":false,"OfflineApps":false,"SiteSettings":false,"Locked":true}, this is a finding.
Fix: F-54950r807154_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Clear data when browser is closed Policy Name: Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences, Offline Website Data Policy State: Disabled Policy Name: Locked Policy State: Enabled macOS "plist" file: Add the following: <key>SanitizeOnShutdown</key> <dict> <key>Cache</key> <false/> <key>Cookies</key> <false/> <key>Downloads</key> <false/> <key>FormData</key> <false/> <key>History</key> <false/> <key>Sessions</key> <false/> <key>SiteSettings</key> <false/> <key>OfflineApps</key> <false/> <key>Locked</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "SanitizeOnShutdown": { "Cache": false, "Cookies": false, "Downloads": false, "FormData": false, "History": false, "Sessions": false, "SiteSettings": false, "OfflineApps": false, "Locked": true }
- RMF Control
- AC-24
- Severity
- M
- CCI
- CCI-002355
- Version
- FFOX-00-000018
- Vuln IDs
-
- V-251562
- Rule IDs
-
- SV-251562r807158_rule
Checks: C-54997r807156_chk
Type "about:policies" in the browser address bar. If "DisableForgetButton" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54951r807157_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Forget Button Policy State: Enabled macOS "plist" file: Add the following: <key>DisableForgetButton</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableForgetButton": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000019
- Vuln IDs
-
- V-251563
- Rule IDs
-
- SV-251563r807161_rule
Checks: C-54998r807159_chk
Type "about:policies" in the browser window. If "DisablePrivateBrowsing" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54952r807160_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Private Browsing Policy State: Enabled macOS "plist" file: Add the following: <key>DisablePrivateBrowsing</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisablePrivateBrowsing": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000020
- Vuln IDs
-
- V-251564
- Rule IDs
-
- SV-251564r807164_rule
Checks: C-54999r807162_chk
Type "about:policies" in the browser window. If "SearchSuggestEnabled" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54953r807163_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Search Policy Name: Search Suggestions Policy State: Disabled macOS "plist" file: Add the following: <key>SearchSuggestEnabled</key> <false/> Linux "policies.json" file: Add the following in the policies section: "SearchSuggestEnabled": false
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- FFOX-00-000021
- Vuln IDs
-
- V-251565
- Rule IDs
-
- SV-251565r807167_rule
Checks: C-55000r807165_chk
Type "about:policies" in the browser address bar. If "Permissions->Autoplay" is not displayed under Policy Name or the Policy Value is not "block-audio-video" with a value of "true", this is a finding.
Fix: F-54954r807166_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Permissions\Autoplay Policy Name: Default autoplay level Policy State: Enabled Policy Value: Block Audio and Video macOS "plist" file: Add the following: <key>Permissions</key> <dict> <key>Autoplay</key> <dict> <string>block-audio-video</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Permissions": { "Autoplay": { "Default": "block-audio-video" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000022
- Vuln IDs
-
- V-251566
- Rule IDs
-
- SV-251566r807170_rule
Checks: C-55001r807168_chk
Type "about:policies" in the browser window. If "NetworkPrediction" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54955r807169_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Network Prediction Policy State: Disabled macOS "plist" file: Add the following: <key>NetworkPrediction</key> <false/> Linux "policies.json" file: Add the following in the policies section: "NetworkPrediction": false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000023
- Vuln IDs
-
- V-251567
- Rule IDs
-
- SV-251567r807173_rule
Checks: C-55002r807171_chk
Type "about:policies" in the browser address bar. If "EnableTrackingProtection" is not displayed under Policy Name or the Policy Value is not "Fingerprinting" with a value of "true", this is a finding.
Fix: F-54956r807172_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Tracking Protection Policy Name: Fingerprinting Policy State: Enabled macOS "plist" file: Add the following: <key>EnableTrackingProtection</key> <dict> <key>Fingerprinting</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "EnableTrackingProtection": { "Fingerprinting": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000024
- Vuln IDs
-
- V-251568
- Rule IDs
-
- SV-251568r807176_rule
Checks: C-55003r807174_chk
Type "about:policies" in the browser address bar. If "EnableTrackingProtection" is not displayed under Policy Name or the Policy Value is not "Cryptomining" with a value of "true", this is a finding.
Fix: F-54957r807175_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Tracking Protection Policy Name: Cryptomining Policy State: Enabled macOS "plist" file: Add the following: <key>EnableTrackingProtection</key> <dict> <key>Cryptomining</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "EnableTrackingProtection": { "Cryptomining": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000025
- Vuln IDs
-
- V-251569
- Rule IDs
-
- SV-251569r807179_rule
Checks: C-55004r807177_chk
Type "about:policies" in the browser address bar. If "browser.contentblocking.category" is not displayed with a value of "strict", this is a finding.
Fix: F-54958r807178_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "browser.contentblocking.category": { "Value": "strict", "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>browser.contentblocking.category</key> <dict> <key>Value</key> <string>strict</string> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "browser.contentblocking.category": { "Value": "strict", "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000026
- Vuln IDs
-
- V-251570
- Rule IDs
-
- SV-251570r807182_rule
Checks: C-55005r807180_chk
Type "about:policies" in the browser address bar. If "extensions.htmlaboutaddons.recommendations.enabled" is not displayed with a value of "false", this is a finding.
Fix: F-54959r807181_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "extensions.htmlaboutaddons.recommendations.enabled": { "Value": false, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>extensions.htmlaboutaddons.recommendations.enabled</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "extensions.htmlaboutaddons.recommendations.enabled": { "Value": false, "Status": "locked" } }+I420
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000027
- Vuln IDs
-
- V-251571
- Rule IDs
-
- SV-251571r807185_rule
Checks: C-55006r807183_chk
Type "about:policies" in the browser address bar. If "DisabledCiphers" is not displayed under Policy Name or the Policy Value is not "TLS_RSA_WITH_3DES_EDE_CBC_SHA" with a value of "false", this is a finding.
Fix: F-54960r807184_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Disabled Ciphers Policy Name: TLS_RSA_WITH_3DES_EDE_CBC_SHA Update Policy State: Disabled macOS "plist" file: Add the following: <key>DisabledCiphers</key> <dict> <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "DisabledCiphers": { "TLS_RSA_WITH_3DES_EDE_CBC_SHA": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000028
- Vuln IDs
-
- V-251572
- Rule IDs
-
- SV-251572r807188_rule
Checks: C-55007r807186_chk
Type "about:policies" in the browser address bar. If "UserMessaging" is not displayed under Policy Name or the Policy Value is not "ExtensionRecommendations" with a value of "false", this is a finding.
Fix: F-54961r807187_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\User Messaging Policy Name: Extension Recommendations Policy State: Disabled macOS "plist" file: Add the following: <key>UserMessaging</key> <dict> <key>ExtensionRecommendations</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "UserMessaging": { "ExtensionRecommendations": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000029
- Vuln IDs
-
- V-251573
- Rule IDs
-
- SV-251573r807191_rule
Checks: C-55008r807189_chk
Type "about:policies" in the browser address bar. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "TopSites" with a value of "false", this is a finding.
Fix: F-54962r807190_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Customize Firefox Home Policy State: Enabled Policy Value: Uncheck Top Sites macOS "plist" file: Add the following: <key>FirefoxHome</key> <dict> <key>TopSites</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "FirefoxHome": { "TopSites": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000030
- Vuln IDs
-
- V-251574
- Rule IDs
-
- SV-251574r807194_rule
Checks: C-55009r807192_chk
Type "about:policies" in the browser address bar. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Pocket" with a value of "false", this is a finding.
Fix: F-54963r807193_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Customize Firefox Home Policy State: Enabled Policy Value: Uncheck Recommended by Pocket macOS "plist" file: Add the following: <key>FirefoxHome</key> <dict> <key>Pocket</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "FirefoxHome": { "Pocket": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000031
- Vuln IDs
-
- V-251575
- Rule IDs
-
- SV-251575r807197_rule
Checks: C-55010r807195_chk
Type "about:policies" in the browser address bar. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Highlights" with a value of "false", this is a finding.
Fix: F-54964r807196_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Customize Firefox Home Policy State: Enabled Policy Value: Uncheck Download History macOS "plist" file: Add the following: <key>FirefoxHome</key> <dict> <key>Highlights</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "FirefoxHome": { "Highlights": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000032
- Vuln IDs
-
- V-251576
- Rule IDs
-
- SV-251576r807200_rule
Checks: C-55011r807198_chk
Type "about:policies" in the browser address bar. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Snippets" with a value of "false", this is a finding.
Fix: F-54965r807199_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Customize Firefox Home Policy State: Enabled Policy Value: Uncheck Snippets macOS "plist" file: Add the following: <key>FirefoxHome</key> <dict> <key>Snippets</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "FirefoxHome": { "Snippets": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000033
- Vuln IDs
-
- V-251577
- Rule IDs
-
- SV-251577r807203_rule
Checks: C-55012r807201_chk
Type "about:policies" in the browser address bar. If "DNSOverHTTPS" is not displayed under Policy Name or the Policy Value does not have "Enabled" with a value of "false", this is a finding.
Fix: F-54966r807202_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\DNS Over HTTPS Policy Name: Enabled Policy State: Disabled macOS "plist" file: <key>DNSOverHTTPS</key> <dict> <key>Enabled</key> <false/> Linux "policies.json" file: Add the following in the policies section: "DNSOverHTTPS": {"Enabled": false}
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000034
- Vuln IDs
-
- V-251578
- Rule IDs
-
- SV-251578r807206_rule
Checks: C-55013r807204_chk
Type "about:policies" in the browser address bar. If "DisableFirefoxAccounts" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54967r807205_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Disable Firefox Accounts Policy State: Enabled macOS "plist" file: <key>DisableFirefoxAccounts</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFirefoxAccounts": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000035
- Vuln IDs
-
- V-251579
- Rule IDs
-
- SV-251579r807209_rule
Checks: C-55014r807207_chk
Type "about:policies" in the browser address bar. If "BackgroundAppUpdate" is not displayed under Policy Name or the Policy Value is not "false", this is a finding. Note: This is a Windows-only control. For other operating systems, this requirement is Not Applicable.
Fix: F-54968r807208_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Background Updater Policy State: Disabled
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000036
- Vuln IDs
-
- V-251580
- Rule IDs
-
- SV-251580r809561_rule
Checks: C-55015r807210_chk
Type "about:policies" in the browser address bar. If "DisableFeedbackCommands" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54969r807211_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Disable Feedback Commands Policy State: Enabled macOS "plist" file: <key>DisableFeedbackCommands</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFeedbackCommands": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000037
- Vuln IDs
-
- V-251581
- Rule IDs
-
- SV-251581r807215_rule
Checks: C-55016r807213_chk
Type "about:policies" in the browser address bar. If "EncryptedMediaExtensions" is not displayed under Policy Name or the Policy Value does not have "Enabled" set to "false" or the Policy Value does not have "Locked" set to "true", this is a finding.
Fix: F-54970r807214_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Encrypted Media Extensions Policy Name: Enable Encrypted Media Extensions Policy State: Disabled Policy Name: Lock Encrypted Media Extensions Policy State: Enabled macOS "plist" file: <key>EncryptedMediaExtensions</key> <dict> <key>Enabled</key> <false/> <key>Locked</key> <true/> Linux "policies.json" file: Add the following in the policies section: "EncryptedMediaExtensions": { "Enabled": false, "Locked": true }