Skip to main content

Linux Firefox Extension Policy

Updated today

The Linux Firefox Extension Policy allows administrators to centrally manage Firefox browser extensions on Linux devices enrolled in Swif.ai. Through this policy, you can automatically install required extensions, remove unwanted ones, and lock mission-critical extensions so users cannot uninstall or disable them.

This policy supports both BYOD and company-owned Linux systems.


Requirements

  • Device must be running Linux

  • Firefox browser installed


What This Policy Does

This policy provides centralized management of Firefox extensions, including:

  • Enforcing installation of specific extensions

  • Automatically uninstalling disallowed extensions

  • Locking extensions to prevent removal or disabling

  • Optionally enabling the Swif Firefox Extension for enhanced monitoring and visibility

Administrators can maintain browser security and compliance without relying on user action.


Policy Settings

The following settings are available in the Linux Firefox Extension Policy:


1. Swif Extension

Enable or disable the Swif Firefox Extension.

Swif Firefox Extension provides:
✔ Browser event telemetry
✔ Security monitoring
✔ User activity insights
✔ Shadow IT detection
✔ Compliance visibility

Setting this to True ensures the Swif extension is automatically installed and locked.

Minimum Requirement: Linux


2. Install

(List of extension URLs or native paths)

This field allows you to force-install Firefox extensions onto the device.

You may add:

  • Firefox Add-on Store URLs
    e.g.,

    https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
  • Local/native extension paths
    (useful for internally packaged extensions)
    e.g.,

    /usr/lib/firefox/extensions/myextension@company.com.xpi

Extensions listed here will be installed automatically and continuously enforced.


3. Uninstall

(List of extension IDs)

This field allows you to automatically remove and block extensions by ID.

Example extension IDs:

jid1-MnnxcxisBPnSXQ@jetpack {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}

If these extensions are found on the device, Swif.ai will remove them.

Use this to restrict extensions that:

  • Pose privacy/security risks

  • Are not approved for enterprise usage

  • Bypass company browsing policies


4. Locked

(List of extension IDs)

Extensions listed here:

✔ cannot be removed
✔ cannot be disabled
✔ cannot be modified by the end user

This is typically used for:

  • Swif Firefox Extension

  • Security extensions

  • Productivity or compliance-related plugins

  • Extensions required for SSO, certificates, or corporate access

Example:

swifteam@swifextension.com

Users attempting to disable or uninstall a locked extension will be blocked.


How the Policy Works Internally

When the policy is applied:

  1. Swif creates a Firefox managed configuration file in the device’s policy directory.

  2. Firefox loads the policy on startup and enforces installation/uninstallation/locking.

  3. Extensions installed through this method are not controlled by the user—they are fully managed by IT.

  4. Any attempt by users to modify locked extensions is rejected.

This ensures consistent browser configuration across your enterprise Linux fleet.


Common Use Cases

1. Deploying the Swif Firefox Extension

Enable visibility into:

  • Browser activity

  • Security alerts

  • Installed extensions

  • Shadow IT tool usage

2. Enforcing Security Extensions

Examples:

  • uBlock Origin

  • HTTPS Everywhere

  • Password manager plugins

  • SSO authentication extensions

3. Blocking Risky Extensions

Many extensions can:

  • Inject scripts

  • Track user activity

  • Leak data

  • Disable security features

Using the “Uninstall” list ensures they are removed automatically.

4. Locking Required Corporate Extensions

Guarantees that essential extensions:

  • Stay installed

  • Cannot be disabled

  • Always remain active for compliance


Troubleshooting

Extension did not install

Check:

  • URL format (should be Add-on Store or .xpi path)

  • Device has Firefox installed

  • Device is online and has synced policies

Extension installed but not locked

Ensure you added the extension ID, not the URL.

User reports extension missing

  • Confirm extension is still in the "Install" list

  • Verify Firefox version supports enterprise policies

  • Retry enrollment or sync the device


Best Practices

✔ Keep all corporate-required extensions in both Install and Locked lists
✔ Add unsafe or unapproved extensions to Uninstall
✔ Always use extension IDs—not URLs—for Locking or Uninstalling
✔ Enable the Swif Firefox Extension for improved monitoring
✔ Test extension installation on one device before broad rollout


Summary

The Linux Firefox Extension Policy provides centralized enforcement of Firefox extension behavior on Linux devices. With installation, uninstallation, locking, and support for the Swif Firefox Extension, this policy ensures secure, compliant, and predictable browser environments across your organization.

Did this answer your question?