The Linux Firefox Extension Policy allows administrators to centrally manage Firefox browser extensions on Linux devices enrolled in Swif.ai. Through this policy, you can automatically install required extensions, remove unwanted ones, and lock mission-critical extensions so users cannot uninstall or disable them.
This policy supports both BYOD and company-owned Linux systems.
Requirements
Device must be running Linux
Firefox browser installed
What This Policy Does
This policy provides centralized management of Firefox extensions, including:
Enforcing installation of specific extensions
Automatically uninstalling disallowed extensions
Locking extensions to prevent removal or disabling
Optionally enabling the Swif Firefox Extension for enhanced monitoring and visibility
Administrators can maintain browser security and compliance without relying on user action.
Policy Settings
The following settings are available in the Linux Firefox Extension Policy:
1. Swif Extension
Enable or disable the Swif Firefox Extension.
Swif Firefox Extension provides:
✔ Browser event telemetry
✔ Security monitoring
✔ User activity insights
✔ Shadow IT detection
✔ Compliance visibility
Setting this to True ensures the Swif extension is automatically installed and locked.
Minimum Requirement: Linux
2. Install
(List of extension URLs or native paths)
This field allows you to force-install Firefox extensions onto the device.
You may add:
Firefox Add-on Store URLs
e.g.,https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Local/native extension paths
(useful for internally packaged extensions)
e.g.,/usr/lib/firefox/extensions/myextension@company.com.xpi
Extensions listed here will be installed automatically and continuously enforced.
3. Uninstall
(List of extension IDs)
This field allows you to automatically remove and block extensions by ID.
Example extension IDs:
jid1-MnnxcxisBPnSXQ@jetpack {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}If these extensions are found on the device, Swif.ai will remove them.
Use this to restrict extensions that:
Pose privacy/security risks
Are not approved for enterprise usage
Bypass company browsing policies
4. Locked
(List of extension IDs)
Extensions listed here:
✔ cannot be removed
✔ cannot be disabled
✔ cannot be modified by the end user
This is typically used for:
Swif Firefox Extension
Security extensions
Productivity or compliance-related plugins
Extensions required for SSO, certificates, or corporate access
Example:
swifteam@swifextension.com
Users attempting to disable or uninstall a locked extension will be blocked.
How the Policy Works Internally
When the policy is applied:
Swif creates a Firefox managed configuration file in the device’s policy directory.
Firefox loads the policy on startup and enforces installation/uninstallation/locking.
Extensions installed through this method are not controlled by the user—they are fully managed by IT.
Any attempt by users to modify locked extensions is rejected.
This ensures consistent browser configuration across your enterprise Linux fleet.
Common Use Cases
1. Deploying the Swif Firefox Extension
Enable visibility into:
Browser activity
Security alerts
Installed extensions
Shadow IT tool usage
2. Enforcing Security Extensions
Examples:
uBlock Origin
HTTPS Everywhere
Password manager plugins
SSO authentication extensions
3. Blocking Risky Extensions
Many extensions can:
Inject scripts
Track user activity
Leak data
Disable security features
Using the “Uninstall” list ensures they are removed automatically.
4. Locking Required Corporate Extensions
Guarantees that essential extensions:
Stay installed
Cannot be disabled
Always remain active for compliance
Troubleshooting
Extension did not install
Check:
URL format (should be Add-on Store or .xpi path)
Device has Firefox installed
Device is online and has synced policies
Extension installed but not locked
Ensure you added the extension ID, not the URL.
User reports extension missing
Confirm extension is still in the "Install" list
Verify Firefox version supports enterprise policies
Retry enrollment or sync the device
Best Practices
✔ Keep all corporate-required extensions in both Install and Locked lists
✔ Add unsafe or unapproved extensions to Uninstall
✔ Always use extension IDs—not URLs—for Locking or Uninstalling
✔ Enable the Swif Firefox Extension for improved monitoring
✔ Test extension installation on one device before broad rollout
Summary
The Linux Firefox Extension Policy provides centralized enforcement of Firefox extension behavior on Linux devices. With installation, uninstallation, locking, and support for the Swif Firefox Extension, this policy ensures secure, compliant, and predictable browser environments across your organization.
