WebsiteFilter
Block websites from being visited.
As of Firefox 83 and Firefox ESR 78.5, file: URLs are supported.
Compatibility: Firefox 60, Firefox ESR 60
CCK2 Equivalent: N/A
Preferences Affected: N/A
Values
Section titled “Values”WebsiteFilter expects an array of Match Patterns, as described in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
The arrays are limited to 1000 entries each.
- If you want to block all URLs, you can use the value
<all_urls>or the pattern*://*/*(matching<scheme>://<host><path>). A single wildcard (*) as a value is not sufficient. - For specific protocols, use
https://*/*orhttp://*/*.
Windows (GPO)
Section titled “Windows (GPO)”Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"Windows (Intune)
Section titled “Windows (Intune)”OMA-URI:
./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_BlockValue (string):
<enabled/> <data id="WebsiteFilter" value="1<all_urls>"/>OMA-URI:
./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_ExceptionsValue (string):
<enabled/><data id="WebsiteFilter" value="1http://example.org/*"/>If you are using custom ADMX and ADML administrative templates in Intune, you can use this OMA-URI instead to workaround the limit on the length of strings. Put all of your JSON on one line.
OMA-URI:
./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WebsiteFilterOneLineValue (string):
<enabled/><data id="JSONOneLine" value='{"Block": ["<all_urls>"],"Exceptions": ["http://example.org/*"]}'/><dict> <key>WebsiteFilter</key> <dict> <key>Block</key> <array> <string><all_urls></string> </array> <key>Exceptions</key> <array> <string>http://example.org/*</string> </array> </dict>
</dict>policies.json
Section titled “policies.json”{ "policies": { "WebsiteFilter": { "Block": ["<all_urls>"], "Exceptions": ["http://example.org/*"] } }}See also
Section titled “See also”- URI schemes on MDN