Mozilla Firefox Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 2
Comparison against the immediately-prior release (V6R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 2
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- FFOX-00-000001
- Vuln IDs
-
- V-251545
- Rule IDs
-
- SV-251545r849960_rule
Checks: C-54980r807105_chk
Run Firefox. Click the ellipsis button >> Help >> About Firefox, and view the version number. If the Firefox version is not a supported version, this is a finding.
Fix: F-54934r807106_fix
Upgrade the version of the browser to an approved version by obtaining software from the vendor or other trusted source.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- FFOX-00-000002
- Vuln IDs
-
- V-251546
- Rule IDs
-
- SV-251546r820745_rule
Checks: C-54981r820743_chk
Type "about:policies" in the browser window. If "SSLVersionMin" is not displayed under Policy Name or the Policy Value is not "tls1.2" or "tls1.3", this is a finding.
Fix: F-54935r820744_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Minimum SSL version enabled Policy State: Enabled Policy Value: TLS 1.2 (or TLS 1.3) macOS "plist" file: Add the following: <key>SSLVersionMin</key> <string>tls1.2</string> (or <string>tls1.3</string>) Linux "policies.json" file: Add the following in the policies section: "SSLVersionMin": "tls1.2" or ("SSLVersionMin": "tls1.3")
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- FFOX-00-000003
- Vuln IDs
-
- V-251547
- Rule IDs
-
- SV-251547r807113_rule
Checks: C-54982r807111_chk
Type "about:policies" in the browser address bar. If "security.default_personal_cert" is not displayed with a value of "Ask Every Time", this is a finding.
Fix: F-54936r807112_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "security.default_personal_cert": { "Value": "Ask Every Time", "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>security.default_personal_cert</key> <dict> <key>Value</key> <string>Ask Every Time</string> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "security.default_personal_cert": { "Value": "Ask Every Time", "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000004
- Vuln IDs
-
- V-251548
- Rule IDs
-
- SV-251548r807116_rule
Checks: C-54983r807114_chk
Type "about:policies" in the browser address bar. If "browser.search.update" is not displayed with a value of "false", this is a finding.
Fix: F-54937r807115_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "browser.search.update": { "Value": false, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>browser.search.update</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "browser.search.update": { "Value": false, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000005
- Vuln IDs
-
- V-251549
- Rule IDs
-
- SV-251549r807119_rule
Checks: C-54984r807117_chk
Type "about:policies" in the browser window. If "ExtensionUpdate" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54938r807118_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Extensions Policy Name: Extension Update Policy State: Disabled macOS "plist" file: Add the following: <key>ExtensionUpdate</key> <false/> Linux "policies.json" file: Add the following in the policies section: "ExtensionUpdate": false
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- FFOX-00-000006
- Vuln IDs
-
- V-251550
- Rule IDs
-
- SV-251550r832305_rule
Checks: C-54985r832304_chk
Type "about:preferences" in the browser address bar. Type "Applications" in the Find bar in the upper-right corner. Determine if any of the following file extensions are listed: HTA, JSE, JS, MOCHA, SHS, VBE, VBS, SCT, WSC, FDF, XFDF, LSL, LSO, LSS, IQY, RQY, DOS, BAT, PS, EPS, WCH, WCM, WB1, WB3, WCH, WCM, AD. If the entry exists and the "Action" is "Save File" or "Always Ask", this is not a finding. If an extension exists and the entry in the Action column is associated with an application that does/can execute the code, this is a finding.
Fix: F-54939r807121_fix
Remove any unauthorized extensions from the auto-download list.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000007
- Vuln IDs
-
- V-251551
- Rule IDs
-
- SV-251551r807125_rule
Checks: C-54986r807123_chk
Type "about:policies" in the browser window. If "DisableFormHistory" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54940r807124_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Form History Policy State: Enabled macOS "plist" file: Add the following: <key>DisableFormHistory</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFormHistory": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000008
- Vuln IDs
-
- V-251552
- Rule IDs
-
- SV-251552r822411_rule
Checks: C-54987r807126_chk
Type "about:policies" in the browser window. If "PasswordManagerEnabled" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54941r822410_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: PasswordManager Policy State: Disabled macOS "plist" file: Add the following: <key>PasswordManagerEnabled</key> <false/> Linux "policies.json" file: Add the following in the policies section: "PasswordManagerEnabled": false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000009
- Vuln IDs
-
- V-251553
- Rule IDs
-
- SV-251553r862958_rule
Checks: C-54988r820748_chk
Type "about:policies" in the browser address bar. If "PopupBlocking" is not displayed under Policy Name or the Policy Value is not "Default" "true", this is a finding. If "PopupBlocking" is not displayed under Policy Name or the Policy Value is not "Locked" "true", this is a finding. "PopupBlocking" "Enabled" may be used to specify an allowlist of sites where pop-ups are desired, this is optional.
Fix: F-54942r862957_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Popups Policy Name: Block pop-ups from websites Policy State: Enabled Policy Name: Do not allow preferences to be changed Policy State: Enabled Optional: Policy Name: Allowed Sites Policy State: Enabled Click "Show..." and enter a list of websites to be allowlisted. macOS "plist" file: Add the following: <key>PopupBlocking</key> <dict> <key>Allow</key> <array> <string>http://example.mil</string> <string>http://example.gov</string> </array> <key>Default</key> <true/> <key>Locked</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "PopupBlocking": { "Allow": ["http://example.mil/", "http://example.gov/"], "Default": true, "Locked": true}
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000010
- Vuln IDs
-
- V-251554
- Rule IDs
-
- SV-251554r807134_rule
Checks: C-54989r807132_chk
Type "about:policies" in the browser address bar. If "dom.disable_window_move_resize" is not displayed with a value of "true", this is a finding.
Fix: F-54943r807133_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "dom.disable_window_move_resize": { "Value": true, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>dom.disable_window_move_resize</key> <dict> <key>Value</key> <true/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "dom.disable_window_move_resize": { "Value": true, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000011
- Vuln IDs
-
- V-251555
- Rule IDs
-
- SV-251555r807137_rule
Checks: C-54990r807135_chk
Type "about:policies" in the browser address bar. If "dom.disable_window_flip" is not displayed with a value of "true", this is a finding.
Fix: F-54944r807136_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "dom.disable_window_flip": { "Value": true, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>dom.disable_window_flip</key> <dict> <key>Value</key> <true/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "dom.disable_window_flip": { "Value": true, "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000013
- Vuln IDs
-
- V-251557
- Rule IDs
-
- SV-251557r820752_rule
Checks: C-54992r807141_chk
Type "about:policies" in the browser address bar. If "InstallAddonsPermission" is not displayed under Policy Name or the Policy Value is not "Default" "false", this is a finding.
Fix: F-54946r820751_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Addons Policy Name: Allow add-on installs from websites Policy State: Disabled macOS "plist" file: Add the following: <key>InstallAddonsPermission</key> <false/> Linux "policies.json" file: Add the following in the policies section: "InstallAddonsPermission": { "Default": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000014
- Vuln IDs
-
- V-251558
- Rule IDs
-
- SV-251558r807146_rule
Checks: C-54993r807144_chk
Type "about:policies" in the browser window. If "DisableTelemetry" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54947r807145_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Telemetry Policy State: Enabled macOS "plist" file: Add the following: <key>DisableTelemetry</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableTelemetry": true
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- FFOX-00-000015
- Vuln IDs
-
- V-251559
- Rule IDs
-
- SV-251559r807149_rule
Checks: C-54994r807147_chk
Type "about:policies" in the browser window. If "DisableDeveloperTools" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54948r807148_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Developer Tools Policy State: Enabled macOS "plist" file: Add the following: <key>DisableDeveloperTools</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableDeveloperTools": true
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- FFOX-00-000016
- Vuln IDs
-
- V-251560
- Rule IDs
-
- SV-251560r862961_rule
Checks: C-54995r862959_chk
Type "about:preferences#privacy" in the browser window. Scroll down to the bottom and select "View Certificates...". In the Certificate Manager window, select the "Authorities" tab. Scroll through the Certificate Name list to the U.S. Government heading. Look for the entries for DoD Root CA 2, DoD Root CA 3, DoD Root CA 4, and DoD Root CA 5. If there are entries for DoD Root CA 2, DoD Root CA 3, DoD Root CA 4, and DoD Root CA 5, select them individually. Click the "View" button. Verify the publishing organization is "US Government". If there are no entries for the DoD Root CA 2, DoD Root CA 3, DoD Root CA 4, and DoD Root CA 5, this is a finding. If other AO-approved certificates are used, this is not a finding. Note: In a Windows environment, use of policy setting "security.enterprise_roots.enabled=true" will point Firefox to the Windows Trusted Root Certification Authority Store. This is not a finding. It may also be set via the policy Certificates >> ImportEnterpriseRoots, which can be verified via "about:policies".
Fix: F-54949r862960_fix
Install the DoD root certificates. Other AO-approved certificates may also be used. On Windows, import certificates from the operating system by using Certificates >> Import Enterprise Roots (Certificates) via policy or Group Policy Object (GPO).
- RMF Control
- AC-24
- Severity
- M
- CCI
- CCI-002355
- Version
- FFOX-00-000018
- Vuln IDs
-
- V-251562
- Rule IDs
-
- SV-251562r849961_rule
Checks: C-54997r807156_chk
Type "about:policies" in the browser address bar. If "DisableForgetButton" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54951r807157_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Forget Button Policy State: Enabled macOS "plist" file: Add the following: <key>DisableForgetButton</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableForgetButton": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000019
- Vuln IDs
-
- V-251563
- Rule IDs
-
- SV-251563r807161_rule
Checks: C-54998r807159_chk
Type "about:policies" in the browser window. If "DisablePrivateBrowsing" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54952r807160_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Private Browsing Policy State: Enabled macOS "plist" file: Add the following: <key>DisablePrivateBrowsing</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisablePrivateBrowsing": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000020
- Vuln IDs
-
- V-251564
- Rule IDs
-
- SV-251564r807164_rule
Checks: C-54999r807162_chk
Type "about:policies" in the browser window. If "SearchSuggestEnabled" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54953r807163_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Search Policy Name: Search Suggestions Policy State: Disabled macOS "plist" file: Add the following: <key>SearchSuggestEnabled</key> <false/> Linux "policies.json" file: Add the following in the policies section: "SearchSuggestEnabled": false
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- FFOX-00-000021
- Vuln IDs
-
- V-251565
- Rule IDs
-
- SV-251565r832307_rule
Checks: C-55000r832306_chk
Type "about:policies" in the browser address bar. If "Permissions" is not displayed under Policy Name or the Policy Value is not "Autoplay" with a value of "Default" and "Block-audio-video", this is a finding.
Fix: F-54954r807166_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Permissions\Autoplay Policy Name: Default autoplay level Policy State: Enabled Policy Value: Block Audio and Video macOS "plist" file: Add the following: <key>Permissions</key> <dict> <key>Autoplay</key> <dict> <string>block-audio-video</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Permissions": { "Autoplay": { "Default": "block-audio-video" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000022
- Vuln IDs
-
- V-251566
- Rule IDs
-
- SV-251566r807170_rule
Checks: C-55001r807168_chk
Type "about:policies" in the browser window. If "NetworkPrediction" is not displayed under Policy Name or the Policy Value is not "false", this is a finding.
Fix: F-54955r807169_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Network Prediction Policy State: Disabled macOS "plist" file: Add the following: <key>NetworkPrediction</key> <false/> Linux "policies.json" file: Add the following in the policies section: "NetworkPrediction": false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000023
- Vuln IDs
-
- V-251567
- Rule IDs
-
- SV-251567r807173_rule
Checks: C-55002r807171_chk
Type "about:policies" in the browser address bar. If "EnableTrackingProtection" is not displayed under Policy Name or the Policy Value is not "Fingerprinting" with a value of "true", this is a finding.
Fix: F-54956r807172_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Tracking Protection Policy Name: Fingerprinting Policy State: Enabled macOS "plist" file: Add the following: <key>EnableTrackingProtection</key> <dict> <key>Fingerprinting</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "EnableTrackingProtection": { "Fingerprinting": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000024
- Vuln IDs
-
- V-251568
- Rule IDs
-
- SV-251568r807176_rule
Checks: C-55003r807174_chk
Type "about:policies" in the browser address bar. If "EnableTrackingProtection" is not displayed under Policy Name or the Policy Value is not "Cryptomining" with a value of "true", this is a finding.
Fix: F-54957r807175_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Tracking Protection Policy Name: Cryptomining Policy State: Enabled macOS "plist" file: Add the following: <key>EnableTrackingProtection</key> <dict> <key>Cryptomining</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "EnableTrackingProtection": { "Cryptomining": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000025
- Vuln IDs
-
- V-251569
- Rule IDs
-
- SV-251569r807179_rule
Checks: C-55004r807177_chk
Type "about:policies" in the browser address bar. If "browser.contentblocking.category" is not displayed with a value of "strict", this is a finding.
Fix: F-54958r807178_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "browser.contentblocking.category": { "Value": "strict", "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>browser.contentblocking.category</key> <dict> <key>Value</key> <string>strict</string> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "browser.contentblocking.category": { "Value": "strict", "Status": "locked" } }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000026
- Vuln IDs
-
- V-251570
- Rule IDs
-
- SV-251570r820759_rule
Checks: C-55005r807180_chk
Type "about:policies" in the browser address bar. If "extensions.htmlaboutaddons.recommendations.enabled" is not displayed with a value of "false", this is a finding.
Fix: F-54959r820758_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Preferences Policy State: Enabled Policy Value: { "extensions.htmlaboutaddons.recommendations.enabled": { "Value": false, "Status": "locked" } } macOS "plist" file: Add the following: <key>Preferences</key> <dict> <key>extensions.htmlaboutaddons.recommendations.enabled</key> <dict> <key>Value</key> <false/> <key>Status</key> <string>locked</string> </dict> </dict> Linux "policies.json" file: Add the following in the policies section: "Preferences": { "extensions.htmlaboutaddons.recommendations.enabled": { "Value": false, "Status": "locked" },
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000027
- Vuln IDs
-
- V-251571
- Rule IDs
-
- SV-251571r820762_rule
Checks: C-55006r820760_chk
Type "about:policies" in the browser address bar. If "DisabledCiphers" is not displayed under Policy Name or the Policy Value is not "TLS_RSA_WITH_3DES_EDE_CBC_SHA" with a value of "true", this is a finding.
Fix: F-54960r820761_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Disabled Ciphers Policy Name: TLS_RSA_WITH_3DES_EDE_CBC_SHA Policy State: Enabled macOS "plist" file: Add the following: <key>DisabledCiphers</key> <dict> <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "DisabledCiphers": { "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000028
- Vuln IDs
-
- V-251572
- Rule IDs
-
- SV-251572r807188_rule
Checks: C-55007r807186_chk
Type "about:policies" in the browser address bar. If "UserMessaging" is not displayed under Policy Name or the Policy Value is not "ExtensionRecommendations" with a value of "false", this is a finding.
Fix: F-54961r807187_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\User Messaging Policy Name: Extension Recommendations Policy State: Disabled macOS "plist" file: Add the following: <key>UserMessaging</key> <dict> <key>ExtensionRecommendations</key> <false/> </dict> Linux "policies.json" file: Add the following in the policies section: "UserMessaging": { "ExtensionRecommendations": false }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000029
- Vuln IDs
-
- V-251573
- Rule IDs
-
- SV-251573r822781_rule
Checks: C-55008r822779_chk
Type "about:policies" in the browser address bar. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Search" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "TopSites" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "SponsoredTopSites" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Pocket" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "SponsoredPocket" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Highlights" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Snippets" with a value of "false", this is a finding. If "FirefoxHome" is not displayed under Policy Name or the Policy Value does not have "Locked" with a value of "true", this is a finding.
Fix: F-54962r822780_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Customize Firefox Home Policy State: Enabled Policy Value: Uncheck "Search" Policy Value: Uncheck "Top Sites" Policy Value: Uncheck "Sponsored Top Sites" Policy Value: Uncheck "Recommended by Pocket" Policy Value: Uncheck "Sponsored Pocket Stories" Policy Value: Uncheck "Download History" Policy Value: Uncheck "Snippets" Policy Value: Check "Do not allow settings to be changed" macOS "plist" file: Add the following: <key>FirefoxHome</key> <dict> <key>Search</key> <false/> <key>TopSites</key> <false/> <key>SponsoredTopSites</key> <false/> <key>Pocket</key> <false/> <key>SponsoredPocket</key> <false/> <key>Highlights</key> <false/> <key>Snippets</key> <false/> <key>Locked</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "FirefoxHome": { "Search": false, "TopSites": false, "SponsoredTopSites": false, "Pocket": false, "SponsoredPocket": false, "Highlights": false, "Snippets": false, "locked": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000033
- Vuln IDs
-
- V-251577
- Rule IDs
-
- SV-251577r807203_rule
Checks: C-55012r807201_chk
Type "about:policies" in the browser address bar. If "DNSOverHTTPS" is not displayed under Policy Name or the Policy Value does not have "Enabled" with a value of "false", this is a finding.
Fix: F-54966r807202_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\DNS Over HTTPS Policy Name: Enabled Policy State: Disabled macOS "plist" file: <key>DNSOverHTTPS</key> <dict> <key>Enabled</key> <false/> Linux "policies.json" file: Add the following in the policies section: "DNSOverHTTPS": {"Enabled": false}
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000034
- Vuln IDs
-
- V-251578
- Rule IDs
-
- SV-251578r807206_rule
Checks: C-55013r807204_chk
Type "about:policies" in the browser address bar. If "DisableFirefoxAccounts" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54967r807205_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Disable Firefox Accounts Policy State: Enabled macOS "plist" file: <key>DisableFirefoxAccounts</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFirefoxAccounts": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000036
- Vuln IDs
-
- V-251580
- Rule IDs
-
- SV-251580r809561_rule
Checks: C-55015r807210_chk
Type "about:policies" in the browser address bar. If "DisableFeedbackCommands" is not displayed under Policy Name or the Policy Value is not "true", this is a finding.
Fix: F-54969r807211_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\ Policy Name: Disable Feedback Commands Policy State: Enabled macOS "plist" file: <key>DisableFeedbackCommands</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFeedbackCommands": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000037
- Vuln IDs
-
- V-251581
- Rule IDs
-
- SV-251581r807215_rule
Checks: C-55016r807213_chk
Type "about:policies" in the browser address bar. If "EncryptedMediaExtensions" is not displayed under Policy Name or the Policy Value does not have "Enabled" set to "false" or the Policy Value does not have "Locked" set to "true", this is a finding.
Fix: F-54970r807214_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Encrypted Media Extensions Policy Name: Enable Encrypted Media Extensions Policy State: Disabled Policy Name: Lock Encrypted Media Extensions Policy State: Enabled macOS "plist" file: <key>EncryptedMediaExtensions</key> <dict> <key>Enabled</key> <false/> <key>Locked</key> <true/> Linux "policies.json" file: Add the following in the policies section: "EncryptedMediaExtensions": { "Enabled": false, "Locked": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000017
- Vuln IDs
-
- V-252881
- Rule IDs
-
- SV-252881r820757_rule
Checks: C-56337r820755_chk
Type "about:policies" in the browser address bar. If "SanitizeOnShutdown" is not displayed under Policy Name or the Policy Value does not have {"Cache":false,"Cookies":false,"Downloads":false,"FormData":false,"Sessions":false,"History":false,"OfflineApps":false,"SiteSettings":false,"Locked":true}, this is a finding.
Fix: F-56287r820756_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox\Clear data when browser is closed Policy Name: Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences, Offline Website Data Policy State: Disabled Policy Name: Locked Policy State: Enabled macOS "plist" file: Add the following: <key>SanitizeOnShutdown</key> <dict> <key>Cache</key> <false/> <key>Cookies</key> <false/> <key>Downloads</key> <false/> <key>FormData</key> <false/> <key>History</key> <false/> <key>Sessions</key> <false/> <key>SiteSettings</key> <false/> <key>OfflineApps</key> <false/> <key>Locked</key> <true/> </dict> Linux "policies.json" file: Add the following in the policies section: "SanitizeOnShutdown": { "Cache": false, "Cookies": false, "Downloads": false, "FormData": false, "History": false, "Sessions": false, "SiteSettings": false, "OfflineApps": false, "Locked": true }
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000038
- Vuln IDs
-
- V-252908
- Rule IDs
-
- SV-252908r836395_rule
Checks: C-56361r836394_chk
Type "about:policies" in the browser address bar. If "DisablePocket" is not displayed under Policy Name or the Policy Value does not have a value of "true", this is a finding.
Fix: F-56311r832309_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Pocket Policy State: Enabled macOS "plist" file: <key>DisablePocket</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisablePocket": true
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- FFOX-00-000039
- Vuln IDs
-
- V-252909
- Rule IDs
-
- SV-252909r836408_rule
Checks: C-56362r836407_chk
Type "about:policies" in the browser address bar. If "DisableFirefoxStudies" is not displayed under Policy Name or the Policy Value does not have a value of "true", this is a finding.
Fix: F-56312r832312_fix
Windows group policy: 1. Open the group policy editor tool with "gpedit.msc". 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Mozilla\Firefox Policy Name: Disable Firefox Studies Policy State: Enabled macOS "plist" file: <key>DisableFirefoxStudies</key> <true/> Linux "policies.json" file: Add the following in the policies section: "DisableFirefoxStudies": true