Deploy Firefox Collector
To deploy a browser collector, you must:
- Install the browser extension.
- Save AIDR collector configuration in the extension's Managed storage.
Managed storage
All deployment methods populate the browser extension's Managed storage with values required to connect to AIDR.
Firefox reads managed storage configuration from OS-level settings:
- macOS - Configuration profiles
- Windows - Registry entries
Configuration fields
-
Required fields:
registrationIdentity- Encoded credentials the extension uses to authenticate with the AIDR service and obtain an authorization tokenurlTemplate- AIDR API base URL
You can find collector-specific values for
registrationIdentityandurlTemplateon the Install tab in the AIDR console. Configuration files and templates available on the Install tab are pre-populated with these values. -
Optional user identity fields that appear in AIDR event logs:
userId- User identifier (for example, email address). Appears in AIDR logs and findings as a top-level field. If not provided, defaults touser_<device-id>.userFullName- User's display name. Appears in AIDR logs and findings under Extra Info. If not provided, defaults toname_<device-id>.hostname- Device hostname. Appears in AIDR logs and findings under Extra Info. Has no default value. If not configured, the field is sent empty.
System paths
-
macOS - Managed preference plist files
Configuration profile (JAMF deployment)plutil -p /Library/Managed\ Preferences/org.mozilla.firefox.plistExample configuration{
"3rdparty" => {
"Extensions" => {
"pangea-aidr-extension@pangea.cloud" => {
"registrationIdentity" => "eyJzIjp...YiOjF9"
"urlTemplate" => "https://api.eu-1.crowdstrike.com/aidr/aiguard"
"userFullName" => "<user-full-name>"
"userId" => "<user-id>"
"hostname" => "<hostname>"
}
}
}
"EnterprisePoliciesEnabled" => true
"ExtensionSettings" => {
"pangea-aidr-extension@pangea.cloud" => {
"install_url" => "https://pangea.cloud/firefox-aidr-extension/aidr-extension-latest.xpi"
"installation_mode" => "force_installed"
}
}
}Managed Storage (Self-Service deployment)cat /Library/Application\ Support/Mozilla/ManagedStorage/pangea-aidr-extension@pangea.cloud.jsonExample configuration{
"name": "pangea-aidr-extension@pangea.cloud",
"description": "Managed storage for AIDR",
"type": "storage",
"data": {
"urlTemplate": "https://api.crowdstrike.com/aidr/aiguard",
"registrationIdentity": "eyJzIj...IjoxfQ==",
"userId": "<user-id>",
"userFullName": "<user-full-name>",
"hostname": "<hostname>"
}
} -
Windows - Registry keys
Registry keys (machine level)Get-ItemProperty "HKLM:\SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud"Registry keys (user-specific)Get-ItemProperty "HKCU:\SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud"Example configurationurlTemplate : https://api.crowdstrike.com/aidr/aiguard
registrationIdentity : eyJzIj...I6MX0=
userId : <user-id>
userFullName : <user-full-name>
hostname : <hostname>
...
Select Install option
On the collector details page, switch to the Install tab. This tab provides instructions, links, and templates for common deployment methods. This documentation includes step-by-step guides for specific methods.
- JAMF - Use Apple-native Configuration Profiles to enforce extension deployment and system-level settings on macOS.
- Microsoft Intune - Deploy extensions and configuration profiles across Windows and macOS managed endpoints.
- Group Policy (Windows only) - Use Active Directory Group Policy to force-install the extension and configure managed storage via registry settings across domain-joined Windows endpoints.
- Self-Service - Install the extension and apply a configuration profile on a single machine to quickly test the collector.
Group Policy (Windows)
With Active Directory Group Policy, you can force-install the browser extension on domain-joined Windows endpoints and configure its managed storage through registry entries.
Requirements
- Active Directory domain environment with Group Policy Management console (GPMC) installed.
- Permission to create, edit, and link Group Policy Objects (GPOs). For example, membership in Domain Admins or Group Policy Creator Owners.
- Target computer and user accounts in Organizational Units (OUs) linked to the GPO.
Verify OU membership in Active Directory Users and Computers (
dsa.msc). - If you plan to force-install the extension through GPO, you need write access to the domain's SYSVOL share (
\\<domain>\SYSVOL\) to install administrative templates and place startup scripts.
Create or edit Group Policy Object
- Open Group Policy Management console (
gpmc.msc). - Right-click your target OU and select Create a GPO in this domain, and Link it here..., or right-click an existing GPO and select Edit.... This opens Group Policy Management Editor.
Force-install extension
If the extension is already deployed through another method (such as Microsoft Intune), skip to
Configure computer-level registry settings.Install administrative templates
The Mozilla Firefox administrative templates (ADMX/ADML files) aren't included with Windows. Check whether they're installed, and install them if needed.
-
In Group Policy Management Editor, go to Computer Configuration > Policies > Administrative Templates. If Mozilla > Firefox policy settings are already listed, skip to Enable force-install policy.
-
Download the latest policy templates archive from
Policy templates for Firefox on GitHub. Look for thepolicy_templates_v<version>.zipasset.tip:For more info about Firefox enterprise management, see Customizing Firefox Using Group Policy (Windows) on Mozilla Support.
-
Extract the downloaded archive.
-
Inside the extracted folder, locate the
windows/subfolder. It containsmozilla.admxandfirefox.admx, and language-specific subfolders (for example,en-US) withmozilla.admlandfirefox.adml. -
Create the Central Store in SYSVOL. The Central Store is a
PolicyDefinitionsfolder inside the domain'sPoliciesfolder. When this folder exists, GPMC reads administrative templates from the Central Store instead of the local machine. DFS Replication automatically copies the folder to all domain controllers. This folder doesn't exist by default - you must create it manually. CreatePolicyDefinitions\and a subfolder for each language you need (for example,en-US\):\\<domain>\SYSVOL\<domain>\Policies\PolicyDefinitions\\\<domain>\SYSVOL\<domain>\Policies\PolicyDefinitions\en-US\
note:If no Central Store exists in SYSVOL, GPMC reads templates from the local
C:\Windows\PolicyDefinitions\folder on the machine running the console. Every Windows installation includes this folder with built-in OS templates, but the contents aren't replicated to other domain controllers. This approach works for single-admin environments and testing but isn't recommended for production. -
Copy
mozilla.admxandfirefox.admxtoPolicyDefinitions\, and the corresponding.admlfiles from each language subfolder to the matching subfolder underPolicyDefinitions\. -
Close and reopen Group Policy Management Editor to load the new templates.
Enable force-install policy
Firefox uses JSON format in the ExtensionSettings policy to manage extensions.
- In Group Policy Management Editor, go to: Computer Configuration > Policies > Administrative Templates > Mozilla > Firefox > Extensions.
- Double-click Extension Management.
- In the Extension Management dialog:
- Click Enabled.
- In the text field, enter the following JSON to force-install the extension:
{
"pangea-aidr-extension@pangea.cloud": {
"install_url": "https://pangea.cloud/firefox-aidr-extension/aidr-extension-latest.xpi",
"installation_mode": "force_installed"
}
} - Click OK.
The JSON value maps to Firefox's ExtensionSettings policy.
force_installed mode installs the extension automatically and prevents the user from disabling or removing it.
Firefox uses a single ExtensionSettings JSON value for all force-installed extensions.
The JSON you enter replaces the entire value.
Extensions not included in the JSON lose their force-managed status, and users can remove them.
If your organization force-installs other Firefox extensions, include them in the JSON alongside the AIDR extension entry.
Configure computer-level registry settings
Add extension settings that apply to all users under Computer Configuration:
- Go to Computer Configuration > Preferences > Windows Settings > Registry.
- Add AIDR base URL:
- Right-click and select New > Registry Item.
Use these values in the New Registry Properties dialog:
- Action:
Update - Hive:
HKEY_LOCAL_MACHINE - Key Path:
SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud - Value name:
urlTemplate - Value type:
REG_SZ - Value data: Copy the cloud-specific value from the collector's Install tab in the AIDR console.
The AIDR base URL depends on your CrowdStrike cloud:
-
US-1
https://api.crowdstrike.com/aidr/aiguard -
US-2
https://api.us-2.crowdstrike.com/aidr/aiguard -
EU-1
https://api.eu-1.crowdstrike.com/aidr/aiguard
-
- Action:
- Click OK.
- Right-click and select New > Registry Item.
Use these values in the New Registry Properties dialog:
- Add collector credentials:
-
Right-click and select New > Registry Item. Use these values in the New Registry Properties dialog:
- Action:
Update - Hive:
HKEY_LOCAL_MACHINE - Key Path:
SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud - Value name:
registrationIdentity - Value type:
REG_SZ - Value data: Copy the value from the collector's Install tab in the AIDR console.
The value is a base64-encoded string that looks like
eyJzIj...oxfQ==.
- Action:
-
Click OK.
-
- Add device hostname:
-
Right-click and select New > Registry Item. Use these values in the New Registry Properties dialog:
- Action:
Update - Hive:
HKEY_LOCAL_MACHINE - Key Path:
SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud - Value name:
hostname - Value type:
REG_SZ - Value data:
%COMPUTERNAME%
- Action:
-
Click OK.
-
To edit a registry setting, right-click it and select Properties.
- Group Policy Preferences expand variables, such as
%COMPUTERNAME%, at processing time and write the target machine name to the registry as a static string. This differs fromREG_EXPAND_SZ, where the OS expands variables each time the value is read.
GPO Registry Preferences don't remove registry entries when you delete the preference item from the GPO. To enable automatic cleanup, click the Common tab of each registry item and select Remove this item when it is no longer applied. Enable this setting before you apply the GPO to target machines. If you didn't select this option before initial application, you must remove the registry entries manually or with a script.
Configure user identity settings
User identity settings (userId and userFullName) rely on Windows environment variables, such as %USERNAME%, to resolve each user's identity at read time.
These settings require a GPO startup script instead of Registry Preferences:
- GPO Registry Preferences expand
%USERNAME%at write time. The variable resolves when the preference is applied, not when the registry value is read. Registry Preferences provide no escape mechanism to store a literal%USERNAME%string. - Firefox reads managed storage (
3rdparty\Extensions\) only from HKLM, not HKCU. You can't use User Configuration Registry Preferences to write per-user values to HKCU instead.
The startup script bypasses both limitations by writing REG_EXPAND_SZ values directly to HKLM.
The OS then expands the variables per user session at read time.
Add startup script to SYSVOL
-
In the same GPO, go to Computer Configuration > Policies > Windows Settings > Scripts (Startup/Shutdown).
-
Double-click Startup, then select the Scripts tab.
-
Click Show Files. This opens the GPO's
Startupfolder in SYSVOL. -
Copy the following script into a new file named
Configure-FirefoxAIDR-UserFields.batin this folder:Configure-FirefoxAIDR-UserFields.bat@echo off
REM Write user identity fields to Firefox managed storage as REG_EXPAND_SZ.
REM The OS expands %USERNAME% per user session at read time.
REM Double %% is a batch escape - cmd.exe reduces %% to % before passing to reg.exe.
reg add "HKLM\Software\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud" /v userId /t REG_EXPAND_SZ /d "%%USERNAME%%" /f
reg add "HKLM\Software\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud" /v userFullName /t REG_EXPAND_SZ /d "%%USERNAME%%" /f -
Back in the Startup Properties dialog, click Add.
-
In the Script Name field, enter the path or browse to the
.batfile you just placed. Leave Script Parameters blank. -
Click OK to close each dialog.
The script runs at every machine boot in the SYSTEM context. It writes the registry values before any user logs in.
-
You can also use a PowerShell startup script to set the user identity fields.
This guide uses a
.batscript becausecmd.exehas no execution policy - the script runs without additional configuration.On some systems, Windows security zone settings classify SYSVOL's UNC path (
\\<domain>\SYSVOL\...) as an internet zone. This causesRemoteSignedto block unsigned.ps1scripts stored there. -
%USERNAME%resolves to the Windows SAM account name (for example,jhammond), not an email address or display name. -
Multi-domain environments
By default,
userIdis set to%USERNAME%(the SAM account name - for example,jhammond). In multi-domain environments, you can use%USERDOMAIN%\%USERNAME%(for example,INGENHQ\jhammond) to distinguish users who share a SAM name across domains.To use this format, update the
userIdline in the script:reg add "..." /v userId /t REG_EXPAND_SZ /d "%%USERDOMAIN%%\%%USERNAME%%" /f
-
Script placement
The standard location is the GPO's SYSVOL
Startupfolder (opened by Show Files above). For testing or restricted environments where you can't write to SYSVOL, place the script on target machines locally (for example,C:\Scripts\Configure-FirefoxAIDR-UserFields.bat). Then reference that local path in the startup script configuration.
Link GPO and verify
-
Link the GPO to target OUs.
This GPO uses only Computer Configuration settings. Ensure target computer accounts are in OUs linked to the GPO.
-
On the Scope tab of the GPO, check the Security Filtering section. By default, this section includes Authenticated Users, which covers all domain-joined accounts. If your organization has narrowed filtering to a specific security group, confirm that target computer accounts are members. Otherwise, no endpoints receive the policy.
-
Run
gpupdate /forceon the target machine.gpupdate /force -
Restart the machine. The startup script runs at boot, not on
gpupdate. -
After restart, log in and verify the registry values:
reg query "HKLM\SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud"- Confirm that all five values are present:
urlTemplate,registrationIdentity,userId,userFullName, andhostname. - Confirm that
userIdanduserFullNameresolve to the logged-in user's name.
- Confirm that all five values are present:
-
In Firefox on the target machine:
- Go to
about:addonsand verify that the extension is installed. If you force-installed the extension through GPO, verify that it can't be disabled. - Go to
about:policies. Confirm that the AIDR extension policy shows all five values with the correct per-user expansion.
- Go to
To confirm that the extension connects to AIDR, see Verify Deployment. After successful registration, the extension status progresses through Configured and Ready to Active.
Self-Service (testing)
Select the Self-Service option to quickly evaluate the collector on your own machine before deploying it at scale. This option:
- Introduces the key browser collector deployment steps
- Requires no management tools
- Lets you perform both installation and configuration steps manually on your machine
- Describes the extension deployment statuses and functionality, also applicable to production deployments using enterprise management tools
Self-service deployment is intended for testing and evaluation purposes. It isn't a supported option for production deployments.
The first time you select this option, you must acknowledge these limitations in a confirmation dialog before proceeding.
Install extension
The AIDR Firefox collector is available as a Firefox Add-on, which you can download by following instructions on the collector's Install page in the AIDR console.
- Use the Get the AIDR Extension button on the collector Install page to download the Firefox extension (
.xpifile). - In Firefox, go to the
about:addonspage. - Click the gear icon (
⛭- Tools for all add-ons) next to Manage Your Extensions title and select Install Add-on From File. - In the file system dialog go to and open the downloaded
.xpifile. - Follow the prompts to install the extension.
Once the extension is installed, you can manage it on the about:addons page.
Configure extension
-
Return to the Install tab and download the configuration file for your operating system:
- macOS - AIDR Firefox settings file (
.json) - Windows - AIDR Windows Firefox policy file (
.reg)
This file contains the collector instance configuration, including credentials to authenticate the extension with the AIDR service.
- macOS - AIDR Firefox settings file (
-
Apply the configuration:
-
macOS
-
Copy the downloaded
.jsonfile to/Library/Application Support/Mozilla/ManagedStorage/. Create theManagedStoragefolder if it does not exist. Administrator privileges are required to write to this location.Example copy commandsudo rsync -av ~/Downloads/pangea-aidr-extension@pangea.cloud.json /Library/Application\ Support/Mozilla/ManagedStorage/
-
-
Windows - Double-click the
.regfile to merge it into the Registry and confirm the prompts.warning:The registry file modifies the Windows Registry under the extension-specific key path. This doesn't affect other settings, but as a precaution, you can make a registry backup before applying the file. If you're unsure how to back up the Registry, contact your IT or system administrator.
-
-
Fully close and restart Firefox for the settings to take effect.
Uninstall collector
When you're done testing, remove the browser extension and its system configuration.
-
Remove the browser extension in Firefox's add-on manager (
about:addons). -
Remove the system configuration:
-
macOS - Delete the JSON configuration file from
/Library/Application Support/Mozilla/ManagedStorage/:Remove the Firefox managed storage file on macOSsudo rm /Library/Application\ Support/Mozilla/ManagedStorage/pangea-aidr-extension@pangea.cloud.json -
Windows - Delete the registry key for Firefox.
warning:This modifies the Windows Registry. You can make a registry backup before proceeding. If you're unsure how to back up the Registry, contact your IT or system administrator.
Run the following command in a PowerShell session as Administrator:
Remove the registry key for FirefoxRemove-Item -Path "HKCU:\SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\pangea-aidr-extension@pangea.cloud" -Recurse
-