Edit

Share via


Apple device restriction settings in Microsoft Intune

Note

Intune might support more settings than the settings listed in this article. Not all settings are documented, and won't be documented. To see the settings you can configure, create a device configuration policy, and select Settings catalog. For more information, go to settings catalog.

This article describes the different device restriction settings you can configure on iOS, iPadOS, and macOS devices. As part of your mobile device management (MDM) solution, use these settings to allow or disable features, set password rules, allow or restrict specific apps, and more.

Add these settings to a device configuration profile in Intune, and then assign or deploy the profile to your iOS, iPadOS, and macOS devices.

These settings use Apple's restriction settings. For more information, see Apple's mobile device management settings site (opens Apple's web site).

Prerequisites

Device platform requirements

This feature supports the following platforms:

  • iOS/iPadOS
  • macOS

Roles requirements

Device configuration requirements

App Store, Doc Viewing, Gaming

Settings apply to: All enrollment types

  • Block viewing corporate documents in unmanaged apps: Yes blocks viewing corporate documents in unmanaged apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow corporate documents to be viewed in any app.

    For example, you want to prevent users from saving files from the OneDrive app to Dropbox. Configure this setting as Yes. After devices receive the policy (for example, after a restart), it no longer allows saving.

    Note

    When you block this setting (set to Yes), you also block third party keyboards installed from the App Store.

    • Allow unmanaged apps to read from managed contacts accounts: Yes lets unmanaged apps, such as the built-in iOS/iPadOS Contacts app, read and access contact information from managed apps, including the Outlook mobile app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent reading from the built-in Contacts app on devices.

      This setting allows or prevents reading contact information. It doesn't control syncing contacts between the apps.

      To use this setting, set the Block viewing corporate documents in unmanaged apps setting to Yes.

    For more information about these two settings, and their impact on Outlook for iOS/iPadOS contact export synchronization, see Support Tip: Use Intune custom profile settings with the iOS/iPadOS Native Contacts App.

  • Treat AirDrop as an unmanaged destination: Yes forces AirDrop to be considered an unmanaged drop target. It stops managed apps from sending data using Airdrop. When set to Not configured (default), Intune doesn't change or update this setting.

  • Block viewing non-corporate documents in corporate apps: Yes blocks viewing non-corporate documents in corporate apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow any document to be viewed in corporate managed apps.

    Yes also prevents contact export synchronization in Outlook for iOS/iPadOS. For more information, see Support Tip: Enabling Outlook iOS/iPadOS Contact Sync with iOS12 MDM Controls.

  • Allow copy/paste to be affected by managed open-in: Yes enforces copy/paste restrictions based on how you configured Block viewing corporate documents in unmanaged apps and Block viewing non-corporate documents in corporate apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not enforce any copy/paste restrictions.

Settings apply to: Device enrollment, Automated device enrollment (supervised)

  • Require iTunes Store password for all purchases: Yes requires users to enter the Apple ID password for each in-app or iTunes purchase. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow purchases without prompting for a password every time.

  • Block in-app purchases: Yes blocks in-app purchases from the store. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow store purchases within a running app.

  • Block download of explicit sexual content in Apple Books: Yes blocks users from downloading media from the iBook store that's tagged as erotica. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to download books with the "Erotica" category.

  • Allow managed apps to write contacts to unmanaged contacts accounts: Yes lets managed apps, such as the Outlook mobile app, save or sync contact information, including business and corporate contacts, to the built-in iOS/iPadOS Contacts app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent managed apps from saving or syncing contact information to the built-in iOS/iPadOS Contacts app on devices.

    To use this setting, set the Block viewing corporate documents in unmanaged apps setting to Yes.

  • Ratings region: Select the ratings region you want to use for allowed downloads. Then select the allowed ratings for Movies, TV Shows, and Apps.

Settings apply to: Automated device enrollment (supervised)

  • Block App store: Yes prevents access to the app store on supervised devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

    • Block installing apps using App Store: When set to Yes, the app store isn't shown on the device home screen. Users can continue to use iTunes or the Apple Configurator to install apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the app store on the home screen.
    • Block automatic app downloads: Yes prevents automatic downloading of apps bought on other devices and automatic updates to new apps. It doesn't affect updates to existing apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow apps bought on other iOS/iPadOS devices to download and update on the device.
  • Block playback of explicit music, podcast, and iTunes U: Yes prevents explicit iTunes music, podcast, or news content. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the device to access content rated as adult from the store.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block adding Game Center friends: Yes prevents users from adding Game Center friends. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to add friends in Game Center.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block Game Center: Yes prevents using the Game Center app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Game Center app on devices.

  • Block multiplayer gaming in Game Center: Yes prevents multiplayer gaming. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to play multiplayer games on devices.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block access to network drive in Files app: By using the Server Message Block (SMB) protocol, devices can access files or other resources on a network server. Yes prevents accessing files on a network SMB drive. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer

Settings apply to: Automated device enrollment (supervised)

  • Block adding Game Center friends: Yes prevents users from adding friends to Game Center. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to add friends to Game Center.

    This setting applies to:

    • macOS 10.13 and newer
  • Block Game Center: Yes disables Game Center, and the Game Center icon is removed from the home screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might make Game Center available to users.

    This setting applies to:

    • macOS 10.13 and newer
  • Block multiplayer gaming in the Game Center: Yes prevents multiplayer gaming when using Game Center. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to play multiplayer games.

    This setting applies to:

    • macOS 10.13 and newer

Autonomous single app mode (ASAM)

Use these settings to configure iOS/iPadOS devices to run specific apps in autonomous single app mode (ASAM). When you configure ASAM and users start one of the configured apps, the device locks to that app. App and task switching is disabled until users exit the allowed app.

For the ASAM configuration to apply, users must manually open the specific app. This task also applies to the Company Portal.

  • For example, in a school or university environment, add an app that lets users take a test on the device. Or, lock the device in the Company Portal until the user authenticates. When the users complete the app's actions, or you remove this policy, the device returns to its normal state.

  • Not all apps support autonomous single app mode. To put an app in ASAM, you typically need a bundle ID or a key value pair delivered by an app config policy. For more information, see the autonomousSingleAppModePermittedAppIDs restriction in Apple's MDM documentation. For more information on the specific settings required for the app you're configuring, see the vendor documentation.

    For example, to configure Zoom Rooms in autonomous single app mode, Zoom says to use the us.zoom.zpcontroller bundle ID. In this instance, you also make a change in the Zoom web portal. For more information, see the Zoom help center.

  • On iOS/iPadOS devices, the Company Portal supports ASAM. When the Company Portal is in ASAM, users must manually open the Company Portal. Then the device locks in the Company Portal until the user authenticates. When users sign in to the Company Portal, they can use other apps and the Home screen button on the device. When they sign out of the Company Portal, the device returns to single app mode, and locks on the Company Portal.

    To turn the Company Portal into a 'sign in/sign out' app (enable ASAM), enter the Company Portal app name, such as Microsoft Intune Company Portal, and the bundle ID (com.microsoft.CompanyPortal) in these settings. After you assign this profile, you must open the Company Portal to lock the app so users can sign in and sign out of it. For the ASAM configuration to apply, users must manually open the Company Portal.

    When the device configuration profile is removed, and the user signs out, the device isn't locked in the Company Portal.

Settings apply to: Automated device enrollment (supervised)

You can also Import a CSV file with the list of app names and their bundle IDs. Or, Export an existing list that includes the apps.

Built-in Apps

Settings apply to: All enrollment types

  • Block Siri: Yes blocks access to Siri. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Siri voice assistant on devices.

    • Block Siri while device is locked: Yes prevents access to Siri when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Siri voice assistant on devices when they're locked.
  • Require Safari fraud warnings: Yes requires fraud warnings to be shown in the web browser on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show these warnings.

Settings apply to: Device enrollment and Automated device enrollment (supervised)

  • Block internet search results from Spotlight: Yes stops Spotlight from returning any results from an Internet search. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Spotlight search to connect to the Internet to provide search results.

  • Safari cookies: By default, Apple allows all cookies, and blocks cross site tracking. Use this setting to allow users to enable or disable these features. Your options:

    • Not configured (default): Intune doesn't change or update this setting. By default, the OS allows all cookies and blocks cross site tracking, and might allow users to enable and disable these features.
    • Allow all cookies, and allow cross site tracking: Cookies are allowed, and users can disable the cookies. By default, cross site tracking is blocked, and users can enable cross site tracking.
    • Block all cookies, and block cross site tracking: Cookies and cross site tracking are both blocked. Users can't enable or disable either setting.
    • Allow all cookies, and block cross site tracking: Cookies are allowed, and users can disable the cookies. By default, cross site tracking is blocked, and users can't enable or disable cross site tracking.
  • Block Safari JavaScript: Yes prevents Java scripts in the browser from running on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Java scripts.

  • Block Safari Pop-ups: Yes blocks all pop-ups in the Safari web browser. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the pop-up blocker.

  • Block Siri for dictation: Yes prevents connections to Siri servers. Users can't use Siri to dictate text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to be used for dictation. Also available for user enrollment.

    This setting applies to:

    • iOS/iPadOS 14.5 and newer
  • Block Siri for translation: Yes prevents connections to Siri servers so that users can't use Siri to translate text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to be used for translation. Also available for user enrollment.

    This setting applies to:

    • iOS/iPadOS 15.0 and newer

Settings apply to: Automated device enrollment (supervised)

  • Block camera: Yes prevents access to the camera on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the device's camera.

    Intune only manages access to the device camera. It doesn't have access to pictures or videos.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

    • Block FaceTime: Yes prevents access to the FaceTime app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the FaceTime app on devices.

      Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Require Siri profanity filter: Yes turns on the filter, and prevents Siri from dictating, or speaking profane language. When set to Not configured (default), Intune doesn't change or update this setting.

    To use this setting, set the Block Siri setting to Not configured.

    This setting applies to:

    • iOS 11.0 and newer
  • Block user-generated content in Siri: Yes prevents Siri from accessing websites to answer questions. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to access user-generated content from the internet.

    To use this setting, set the Block Siri setting to Not configured.

  • Block Apple News: Yes prevents access to the Apple News app on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Apple News app.

  • Block Apple Books: Yes prevents access to the iBooks store. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to browse and buy books from the iBooks store.

  • Block iMessage: Yes prevents using the Messages app for iMessage. If devices support text messaging, then users can still send and receive text messages using SMS. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Messages app to send and read messages over the internet.

  • Block Podcasts: Yes prevents using the Podcasts app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Podcasts app.

  • Music service: Yes disables the Music Service, and reverts the Music app to classic mode. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Apple Music app.

  • Block iTunes Radio: Yes prevents using the iTunes Radio app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the iTunes Radio app.

  • Block iTunes store: Yes prevents using iTunes on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow iTunes.

    This setting applies to:

    • iOS 4.0 and newer
    • iPadOS 13.0 and newer
  • Block Find My iPhone: In the Find My app, Yes disables/hides the Devices tab. Yes may also prevent pairing of AirTags. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Devices tab in the Find My app to get the approximate location of the device.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer
  • Block Find My Friends: Yes prevents this feature in the Find My app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using this Find My app feature to find family and friends from an Apple device or iCloud.com.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer
  • Block user modification to the Find My Friends settings: Yes prevents changes to the Find My Friends app settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change settings for the Find My Friends app.

  • Block removal of system apps from device: Yes prevents removing system apps from devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to remove system apps.

  • Block Safari: Yes prevents using the Safari browser on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use the Safari browser.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block Safari Autofill: Yes disables the autofill feature in Safari on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change autocomplete settings in the web browser.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

Settings apply to: All enrollment types

  • Block Safari AutoFill: Yes disables the autofill feature in Safari on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change autocomplete settings in the web browser.

  • Block use of camera: Yes prevents access to the camera on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the device camera.

    Intune only manages access to the device camera. It doesn't have access to pictures or videos.

  • Block Apple Music: Yes reverts the Music app to classic mode, and disables the Music service. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Apple Music app.

  • Block spotlight suggestions: Yes stops Spotlight from returning any results from an Internet search. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Spotlight search to connect to the Internet, and get search results.

  • Block file transfer using Finder or iTunes: Yes disables application file sharing services. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow application file sharing services.

    This setting applies to:

    • macOS 10.13 and newer

Cloud and Storage

Settings apply to: All enrollment types

  • Force encrypted backup: Yes requires device backups be encrypted. When set to Not configured (default), Intune doesn't change or update this setting.
  • Block managed apps from storing data in iCloud: Yes prevents Intune-managed apps from syncing data to the user's iCloud account. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this data sync to iCloud.
  • Block backup of enterprise books: Yes prevents backing up enterprise books. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to back up these books.
  • Block notes and highlights sync for enterprise books: Yes prevents syncing notes and highlights in enterprise books. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the syncing.

Settings apply to: Device enrollment, Automated device enrollment (supervised)

  • Block iCloud Photos sync: Yes prevents photo stream syncing to iCloud. Blocking this feature might cause data loss. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users enable My Photo Stream on their device to sync to iCloud, and have photos available on all the user's devices.
  • Block iCloud Photo Library: Yes disables using iCloud photo library to store photos and videos in the cloud. Any photos not fully downloaded from iCloud Photo Library to devices are removed from the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the iCloud photo library.
  • Block My Photo Stream: Yes disables iCloud Photo Sharing on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow shared photo streaming.
  • Block Handoff: Yes prevents users from starting work on an iOS/iPadOS device, and then continuing the work on another iOS/iPadOS or macOS device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this handoff.

Settings apply to: Automated device enrollment (supervised)

  • Block iCloud backup: Yes stops users from backing up devices to iCloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to back up devices to iCloud.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block iCloud document and data sync: Yes prevents iCloud from syncing documents and data. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow document and key-value synchronization to your iCloud storage space.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block iCloud Keychain sync: Yes disables syncing credentials stored in the Keychain to iCloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to sync these credentials.

    Starting with iOS/iPadOS 13.0, this setting requires supervised devices.

  • Block iCloud Private Relay: Yes disables the iCloud Private Relay. When disabled, Apple doesn't encrypt internet traffic leaving the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this setting, which prevents networks and servers from monitoring a user's activity across the internet.

    This setting applies to:

    • iOS/iPadOS 15 and newer

Settings apply to: All enrollment types

  • Block iCloud Keychain sync: Yes disables syncing credentials stored in the Keychain to iCloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to sync these credentials.

  • Block iCloud desktop and documents sync: Yes blocks iCloud from syncing the desktop and documents folders to the cloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow syncing the desktop and documents folders to iCloud.

  • Block iCloud Document and Data Sync: Yes prevents iCloud from syncing documents and data. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow document and key-value synchronization to your iCloud storage space.

  • Block iCloud Mail Backup: Yes prevents iCloud from syncing to the macOS Mail app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Mail synchronization to iCloud.

  • Block iCloud Contact Backup: Yes prevents iCloud from syncing the device contacts. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow contact sync using iCloud.

  • Block iCloud Calendar Backup: Yes prevents iCloud from syncing to the macOS Calendar app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Calendar synchronization to iCloud.

  • Block iCloud Reminder Backup: Yes prevents iCloud from syncing to the macOS Reminders app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Reminders synchronization to iCloud.

  • Block iCloud Bookmark Backup: Yes prevents iCloud from syncing the device Bookmarks. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Bookmark synchronization to iCloud.

  • Block iCloud Notes Backup: Yes prevents iCloud from syncing the device Notes. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Notes synchronization to iCloud.

  • Block iCloud Photos backup: Yes disables iCloud Photo Library, and prevents iCloud from syncing the device photos. Any photos not fully downloaded from iCloud Photo Library are removed from local storage on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow syncing photos between the device and the iCloud Photo Library.

  • Block Handoff: This setting allows users to start work on a macOS device, and then continue the work they started on another iOS/iPadOS or macOS device. Yes prevents the Handoff feature on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature on devices.

    This setting applies to:

    • macOS 10.15 and newer

Settings apply to: User approved device enrollment, Automated device enrollment (supervised)

  • Block iCloud Private Relay: Yes disables the iCloud Private Relay. When disabled, Apple doesn't encrypt internet traffic leaving the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature, which prevents networks and servers from monitoring a user's activity across the internet.

    This setting applies to:

    • macOS 12 and newer

iCloud Private Relay (opens Apple's web site)

Connected Devices

Settings apply to: All enrollment types

  • Force Apple Watch wrist detection: Yes forces a paired Apple watch to use wrist detection. When required, the Apple Watch doesn't display notifications when it's not being worn. When set to Not configured (default), Intune doesn't change or update this setting.

Settings apply to: Device enrollment, Automated device enrollment (supervised)

  • Require AirPlay outgoing requests pairing password: Yes requires a pairing password when using AirPlay to stream content to other Apple devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to stream content using AirPlay without entering a password.

  • Block Apple Watch auto unlock: Yes prevents users from unlocking their device with Apple Watch when an obstruction, such as a mask, prevents Face ID from recognizing a user's face. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Apple Watch to auto unlock a device if an obstruction is preventing Face ID from recognizing the user.

    This setting applies to:

    • iOS/iPadOS 14.5 and newer

Settings apply to: Automated device enrollment (supervised)

  • Block AirDrop: Yes blocks using AirDrop on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the AirDrop feature to exchange content with nearby devices.

  • Block pairing with Apple Watch: Yes prevents pairing with an Apple Watch. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to pair with an Apple Watch.

  • Block modifying Bluetooth settings: Yes stops users from changing Bluetooth settings on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.

  • Block pairing with non-Configurator hosts: Yes prevents host pairing. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow host pairing to let the administrator control which devices an iOS/iPadOS device can pair with.

  • Block AirPrint: Yes prevents using the AirPrint feature on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use AirPrint.

    • Block storage of AirPrint credentials in Keychain: Block prevents using Keychain storage for username and password on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow storing the AirPrint username and password in the Keychain app.
    • Require AirPrint to destinations with trusted certificates: Yes forces devices to use trusted certificates for TLS printing communication. When set to Not configured (default), Intune doesn't change or update this setting.
    • Block iBeacon discovery of AirPrint printers: Yes prevents malicious AirPrint Bluetooth beacons from phishing for network traffic. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow advertising AirPrint printers on devices.
  • Block setting up new nearby devices: Yes disables the prompt to set up new devices that are nearby. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow prompts for users to connect to other nearby Apple devices.

    This setting applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer
  • Block access to USB drive in Files app: Devices can connect and open files on a USB drive. Yes prevents device access to the USB drive in the Files app when a USB is connected to the device. Blocking this feature also blocks users from transferring files onto a USB drive connected to an iPad. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to a USB drive in the Files app.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer
  • Disable near-field communication (NFC): Yes disables NFC, and prevents devices from pairing with other NFC-enabled devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, users might be allowed to use NFC, and connect to other NFC-enabled devices.

    This setting applies to:

    • iOS 14.2 and newer
    • iPadOS 14.2 and newer
  • Allow users to boot devices into recovery mode with unpaired devices: Yes lets a user boot a device into recovery mode with an unpaired device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent users from booting devices into recovery mode with an unpaired device.

    This setting applies to:

    • iOS/iPadOS 14.5 and newer

Settings apply to: All enrollment types

  • Block AirDrop: Yes blocks using AirDrop on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the AirDrop feature to exchange content with nearby devices.
  • Block Apple Watch auto unlock: Yes blocks users from unlocking their macOS device with their Apple Watch. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock their macOS device with their Apple Watch.

Domains

Settings apply to: Device enrollment and Automated device enrollment (supervised)

  • Unmarked email domains: Add one or more domain URLs to the list. When users receive an email from a domain other than the domains you enter, the Mail app marks the email as untrusted in the iOS/iPadOS Mail app.

  • Managed Safari web domains: Add one or more web domain URLs to the list. When documents are downloaded from the domains you enter, they're considered managed. This setting applies only to documents downloaded using the Safari browser.

Settings apply to: Automated device enrollment (supervised)

  • Safari password domains: Add one or more domain URLs to the list. Users can only save web passwords from URLs in this list. This setting applies only to the Safari browser, and devices in supervised mode. If you don't enter any URLs, then passwords can be saved from all web sites.

    This setting applies to:

    • iOS 9.3 and newer
    • iPadOS 13.0 and newer

Settings apply to: All enrollment types

  • Unmarked Email Domains: Enter one or more Email domain URLs to the list. When users send or receive an email from a domain other than the domains you add, the macOS Mail app marks the email as untrusted.

General

Settings apply to: All enrollment types

  • Block sending diagnostic and usage data to Apple: Yes prevents devices from sending diagnostic and usage data to Apple. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this data to be sent.

  • Block screenshots and screen recording: Yes prevents screenshots or screen captures on devices. In iOS/iPadOS 9.0 and newer, it also blocks screen recordings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users capture the screen contents as an image or as a video.

Settings apply to: Device enrollment and Automated device enrollment (supervised)

  • Block Untrusted TLS certificates: Yes prevents untrusted Transport Layer Security (TLS) certificates on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow TLS certificates.

  • Block over-the-air PKI updates: Yes prevents your users from receiving software updates unless devices are connected to a computer. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow a device to receive software updates without being connected to a computer.

  • Force limited ad tracking: Yes disables the device advertising identifier. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might keep it enabled.

  • Block trusting new enterprise app authors: Yes removes the Trust Enterprise Developer button in Settings > General > Profiles & Device Management on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users choose to trust apps that aren't downloaded from the app store.

  • Limit Apple personalized advertising: Yes limits Apple's personalized advertising in the App Store, Apple News, and Stocks apps. On the device, the Settings > Privacy > Apple Advertising is toggled off. This setting only impacts personalized ads in these apps. It doesn't impact non-personalized ads, and may not reduce ads. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might turn on personalized ads.

    For more information on Apple's policy, see Apple Advertising & Privacy (opens Apple's web site).

    This setting applies to:

    • iOS 14.0 and newer
    • iPadOS 14.0 and newer

Settings apply to: Automated device enrollment (supervised)

  • Block modification of diagnostics settings: Yes prevents users from changing the diagnostic submission and app analytics settings in Diagnostics and Usage (device Settings). When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these device settings.

    To use this setting, set the Block sending diagnostic and usage data to Apple setting to Not configured.

    This setting applies to:

    • iOS 9.3.2 and newer
    • iPadOS 13.0 and newer
  • Block remote AirPlay, view screen by Classroom app, and screen sharing: Yes prevents the Classroom app from remotely viewing the screen on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the Apple Classroom app to view the screen.

    To use this setting, set the Block screenshots and screen recording setting to Not configured.

    This setting applies to:

    • iOS 9.3 - iOS 12.x: Requires supervised devices
    • iOS 13.0 and newer: Doesn't require supervised devices
    • iPadOS 13.0 and newer: Devices must be enrolled using Device Enrollment or Automated Device Enrollment (ADE)
  • Allow Classroom app to perform AirPlay and view screen without prompting: Yes lets teachers silently observe students' iOS/iPadOS screens using the Classroom app without the students knowing. Student devices enrolled in a class using the Classroom app automatically give permission to that course's teacher. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent this feature.

    To use this setting, set the Block screenshots and screen recording setting to Not configured.

  • Block modification of account settings: Yes prevents users from updating device-specific settings from the iOS/iPadOS settings app. For example, users can't create new device accounts, or change the user name or password. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.

    This feature also applies to settings in the iOS/iPadOS settings app, such as Mail, Contacts, Calendar, Twitter, and more. This feature doesn't apply to apps with account settings that aren't configurable in the iOS/iPadOS settings app, such as the Microsoft Outlook app.

  • Block Screen time: Yes prevents users from setting their own restrictions in Screen Time (device settings). When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure device restrictions (such as parental controls or content, and privacy restrictions) on devices.

    This setting was renamed from Enabling restrictions in the device settings. Impact of this change:

    • iOS 11.4.1 and older: Yes prevents users from setting their own restrictions in the device settings. The behavior is the same; and there are no changes for users.
    • iOS 12.0 and newer: Yes prevents users from setting their own Screen Time in the device settings (Settings > General > Screen Time), including content and privacy restrictions. Devices upgraded to iOS 12.0 won't see the restrictions tab in the device settings anymore (Settings > General > Device Management > Management Profile > Restrictions). These settings are in Screen Time.
  • Block users from erasing all content and settings on device: Yes prevents use of the erase all content and settings option on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might give users access to these settings.

  • Block modification of device name: Yes prevents changing the device name locally. When set to Yes, you can remotely rename a device with a remote device action. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the name of devices.

  • Block modification of notifications settings: Yes prevents changing the notification settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the device notification settings.

  • Block modification of Wallpaper: Yes prevents the wallpaper from being changed. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the wallpaper on devices.

  • Block configuration profile changes: Yes prevents configuration profile changes on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to install configuration profiles.

  • Allow activation Lock: Yes enables Activation Lock on supervised iOS/iPadOS devices. Activation Lock makes it harder for a lost or stolen device to be reactivated. When set to Not configured (default), Intune doesn't change or update this setting.

  • Block removing apps: Yes prevents removing apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to remove apps from devices.

  • Block app clips: Yes blocks App Clips on managed devices. Specifically, setting to Yes:

    • Prevents users from adding App Clips on devices.
    • Removes existing App Clips on devices.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow adding and removing App Clips on devices.

    This setting applies to:

    • iOS 14.0 and newer
    • iPadOS 14.0 and newer
  • Allow USB accessories while device is locked: Yes lets USB accessories exchange data with devices that are locked for over an hour. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not update USB Restricted mode on devices, and USB accessories are blocked from transferring data from devices if locked for over an hour.

    This setting applies to:

    • iOS/iPadOS 11.4.1 and newer
  • Force automatic date and time: Yes forces supervised devices to set the Date & Time automatically. The device's time zone is updated when the device has cellular connections or has Wi-Fi with location services enabled. When set to Not configured (default), Intune doesn't change or update this setting.

  • Require teacher permission to leave Classroom app unmanaged classes: Yes forces students enrolled in an unmanaged course using the Classroom app to request permission from the teacher to leave the course. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not force the student to ask for permission.

    This setting applies to:

    • iOS 11.3 and newer
    • iPadOS 13.0 and newer
  • Allow Classroom to lock to an app and lock the device without prompting: Yes allows teacher to lock apps or lock devices using the Classroom app without prompting the student. Locking apps means devices can only access teacher specified apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent teachers from locking apps or devices using the Classroom app without prompting the student.

    This setting applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer
  • Allow students to automatically join Classroom classes without prompting: Yes automatically allows students to join a class that's in the Classroom app without prompting the teacher. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prompt the teacher that students want to join a class that's in the Classroom app.

    This setting applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer
  • Block VPN creation: Yes prevents users from creating VPN configuration settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users create VPNs on devices.

  • Block modification of eSIM settings: Yes prevents removing or adding a cellular plan to the eSIM on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.

    This setting applies to:

    • iOS 12.1 and newer
    • iPadOS 13.0 and newer
  • Defer software updates: Enable delays when software updates show up on devices, from 1-90 days. This setting doesn't control when updates are or aren't installed.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show software updates on devices as Apple releases them. For example, if an iOS/iPadOS update gets released by Apple on a specific date, then that update naturally shows up on devices around the release date.

    • Delay visibility of software updates: Enter a value from 1-90 days. When the delay expires, users get notified to update to the earliest OS version available when the delay is triggered. Don't set this value to zero (0) days.

      For example, if iOS 12.a is available on January 1, and Delay visibility is set to 5 days, then iOS 12.a isn't shown as an available update on user devices. On the sixth day following the release, that update is available, and users can install it.

      This setting applies to:

      • iOS 11.3 and newer
      • iPadOS 13.0 and newer

Settings apply to: All enrollment types

  • Block Lookup: Yes prevents users from highlighting a word, and then looking up its definition on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the definition lookup feature.

  • Block dictation: Yes stops users from using voice input to enter text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use dictation input.

  • Block content caching: Yes prevents content caching. Content caching stores app data, web browser data, downloads, and more locally on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might enable content caching.

    For more information on content caching on macOS, see Manage content caching on Mac (opens another website).

    This setting applies to:

    • macOS 10.13 and newer
  • Block screenshots and screen recording: Yes prevents users from saving screenshots of the display. It also prevents the Classroom app from observing remote screens. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to capture screenshots, and allows the Classroom app to view remote screens.

Settings apply to: User approved device enrollment, Automated device enrollment (supervised)

  • Defer software updates: This setting defers the visibility of software updates on devices for up to 90 days. For example, if Apple releases a macOS update on a specific date, it naturally shows on devices around the release date. This setting can hide the update so that users don't see it as soon as it's available.

    This setting doesn't control when updates are installed and doesn't impact scheduled updates. Seed build updates are allowed without delay.

    To use this setting, select the software updates you want to delay. Your options:

    • Not configured (default): Intune doesn't change or update this setting. By default, the OS might show newly released software updates to users as soon as they're released.
    • Major OS software updates: Major OS software updates, such as macOS 12, are deferred for 30 days by default, unless otherwise specified in the Delay visibility of major OS software updates field. Requires macOS 11.3 and newer.
    • Minor OS software updates: Minor OS software updates, such as macOS 12.x, are deferred for 30 days by default, unless otherwise specified in the Delay visibility of minor OS software updates field. Requires macOS 11.3 and newer.
    • Non-OS software updates: Non-OS software updates, such as Safari updates, are deferred for 30 days by default, unless otherwise specified in the Delay visibility of non OS software updates field. Requires macOS 11.0 and later.

    Then enter how long you want to delay each type of update, from 1-90 days. For example, if a macOS update is available on January 1, and Delay visibility is set to 5 days, then the update isn't shown as an available update. On the sixth day following the release, that update becomes available, and users are notified to update to the earliest version available when the delay was triggered. Your options:

    • Delay default visibility of software updates: Enter the number of days to delay all software updates, from 1-90. If you don't enter anything, updates are deferred for 30 days, by default. Intune overrides this value if you choose to delay major OS, minor OS, or non-OS software updates individually.

    • Delay visibility of major OS software updates: Enter the number of days to delay all major OS software updates, from 1-90. If you don't enter anything, updates are deferred for 30 days, by default. This value overrides the value in Delay default visibility of software updates.

      This setting applies to:

      • macOS 11.3 and newer
    • Delay visibility of minor OS software updates: Enter the number of days to delay all minor OS software updates, from 1-90. If you don't enter anything, updates are deferred for 30 days, by default. This value overrides the value in Delay default visibility of software updates.

      This setting applies to:

      • macOS 11.3 and newer
    • Delay visibility of non-OS software updates: Enter the number of days to delay all non-OS software updates, from 1-90. If you don't enter anything, updates are deferred for 30 days, by default. This value overrides the value in Delay default visibility of software updates.

      This setting applies to:

      • macOS 11.0 and newer

Settings apply to: Automated device enrollment

  • Disable AirPlay, view screen by Classroom app, and screen sharing: Yes blocks AirPlay, and prevents screen sharing to other devices. It also prevents teachers from using the Classroom app to see their students' screens. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow teachers to see their students' screens.

    To use this setting, set the Block screenshots and screen recording setting to Not configured (screenshots are allowed).

  • Allow Classroom app to perform AirPlay and view screen without prompting: Yes lets teachers see their students' screens without requiring students to agree. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might require students to agree before teachers can see the screens.

    To use this setting, set the Block screenshots and screen recording setting to Not configured (screenshots are allowed).

  • Require teacher permission to leave Classroom app unmanaged classes: Yes forces students enrolled in an unmanaged Classroom course to get teacher approval to leave the course. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow students to leave the course whenever the student chooses.

  • Allow Classroom to lock the device without prompting: Yes lets teachers lock a student's device or app without the student's approval. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might require students agree before teachers can lock the device or app.

  • Students can automatically join Classroom class without prompting: Yes lets students join a class without prompting the teacher. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might require teacher approval to join a class.

  • Block modification of wallpaper: Yes prevents users from changing the device wallpaper. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the wallpaper.

    This setting applies to:

    • macOS 10.13 and newer
  • Block users from erasing all content and settings on device: Yes disables the reset option on supervised devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to erase all content and settings on their device.

    This setting applies to:

    • macOS 12 and newer

    • Allow activation lock: Yes, enables Activation Lock on supervised macOS devices. Activation Lock makes it harder for a lost or stolen device to be reactivated. When set to Not configured (default), Intune doesn't change or update this setting.

      This setting applies to:

      • macOS 10.15 or later

Keyboard and Dictionary

Settings apply to: Automated device enrollment (supervised)

  • Block word definition lookup: Yes prevents highlighting a word, and then looking up its definition. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the definition lookup feature.

  • Block predictive keyboards: Yes prevents using predictive keyboards to suggest words users might want. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.

  • Block auto-correction: Yes prevents using autocorrection. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to automatically correct misspelled words.

  • Block spell-check: Yes prevents spell checker. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using spellchecker.

  • Block keyboard shortcuts: Yes stops users from using keyboard shortcuts. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using keyboard shortcuts on devices.

  • Block dictation: Yes stops users from using voice input to enter text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use dictation input.

  • Block QuickPath: Yes prevents users from using QuickPath. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use QuickPath, which allows a continuous input on the device's keyboard. Users can type by swiping across the keys to create words.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer

Kiosk

App Lock (opens Apple's web site) is referred to as Kiosk mode in Intune.

Settings apply to: Automated device enrollment (supervised)

  • App to run in kiosk mode: Select the type of app you want to run in kiosk mode. Your options:

    • Not configured (default): Intune doesn't change or update this setting. By default, the OS might not apply kiosk settings. The device doesn't run in kiosk mode.
    • Store App: Enter the URL to an app in the iTunes App Store.
    • Managed App: Select an app you previously added to Intune.
    • Built-In App: Enter the bundle ID of the built-in app. To get the bundle ID of an app added to Intune, you can use the Intune admin center.
  • Require Assistive touch: Yes requires the Assistive Touch accessibility setting on devices. This feature helps users with on-screen gestures that might be difficult for them. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.

  • Require invert colors: Yes requires the Invert Colors accessibility setting so users with visual impairments can change the display screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.

  • Require mono audio: Yes requires the Mono audio accessibility setting on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.

  • Require Voice control: Yes enables voice control on devices, and allows users to fully control the OS using Siri commands. Users can't turn it off. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable voice control.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer

    Tip

    If you have LOB apps available for your organization, and they're not Voice Control ready on day 0 when iOS 13.0 releases, then we recommend you leave this setting as Not configured.

  • Require VoiceOver: Yes requires the VoiceOver accessibility setting to read text on the screen out loud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.

  • Require zoom: Yes requires the zoom setting so users can touch to zoom in on the screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.

  • Block auto lock: Yes prevents automatic locking of devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.

  • Block ringer switch: Yes disables the ringer (mute) switch on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.

  • Block screen rotation: Yes prevents changing the screen orientation when users rotate the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.

  • Block screen sleep button: Yes disables the screen sleep wake button on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.

  • Block touch: Yes disables the touchscreen on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use the touchscreen.

  • Block volume buttons: Yes prevents using the volume buttons on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the volume buttons.

  • Allow Assistive touch control: Yes lets users use the assistive touch function. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.

  • Allow invert colors control: Yes inverts color changes to let users adjust the invert colors function. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.

  • Speak on selected text: Yes allows the Speak Selection accessibility settings be on devices. This feature reads text out loud that users select. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.

  • Allow Voice Control: Yes allows users to change the state of voice control on their devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might block users from changing the state of voice control on their devices.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer
  • Allow VoiceOver control: Yes allows voiceover changes to let users update the VoiceOver function, such as how fast on-screen text is read out loud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent voiceover changes.

  • Allow zoom control: Yes allows zoom changes by users. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent zoom changes.

Note

Before you can configure an iOS/iPadOS device for kiosk mode, you must use the Apple Configurator tool or the Apple Device Enrollment Program to put devices into supervised mode. See Apple's guide on using the Apple Configurator tool. If the iOS/iPadOS app you enter is installed after you assign the profile, the device doesn't enter kiosk mode until the device is restarted.

Locked Screen Experience

Settings apply to: All enrollment types

  • Block Control Center access in lock screen: Yes blocks access to the Control Center app while the device is locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the Control Center app when devices are locked.
  • Block Notifications Center access in lock screen: Yes blocks access to notifications when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to notifications without unlocking devices.
  • Block Today view in lock screen: Yes blocks access to the Today view when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to see the Today view when devices are locked.

Settings apply to: Device enrollment, Automated device enrollment (supervised)

  • Block Wallet notifications in lock screen: Yes blocks access to the Wallet app when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the Wallet app while devices are locked.

Password

These settings use the Passcode payload (opens Apple's web site).

Settings apply to: All enrollment types

  • Require password: Yes requires users to enter a password to access devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to access devices without entering a password.

Settings apply to: Device enrollment, Automated device enrollment (supervised)

Important

On user-enrolled devices, if you configure any password setting, Intune automatically sets the Block simple passwords setting to Yes and enforces a 6-digit PIN.

For example, you configure the Password expiration setting and push this policy to user-enrolled devices. On the devices, the following happens:

  • The Password expiration setting is ignored.
  • Simple passwords, such as 1111 or 1234, aren't allowed.
  • A 6-digit PIN is enforced.
  • Block simple passwords: Yes blocks simple passwords, and requires more complex passwords. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow simple passwords, such as 0000 and 1234.

  • Required password type: Enter the required password complexity level your organization requires. Your options:

    • Device default
    • Numeric: Can be alphabetic characters, such as abcdef, and numeric characters, such as 123456789.
    • Alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters.

    Note

    Selecting alphanumeric can impact a paired Apple Watch. For more information, see Set passcode restrictions for an Apple Watch (opens Apple's web site).

  • Number of non-alphanumeric characters in password: Enter the number of symbol characters, such as # or @, that must be included in the password, from 1-4. When set to Not configured (default), Intune doesn't change or update this setting.

  • Minimum password length: Enter the minimum length the password must have, from 4-16 characters. On user enrolled devices, enter a length between 4 and 6 characters.

    Note

    For devices that are user enrolled, users can set a PIN greater than 6 digits. But, no more than 6 digits are enforced on devices. For example, an administrator sets the minimum length to 8. On user-enrolled devices, users are only required to set a 6-digit PIN. Intune doesn't force a PIN greater than 6 digits on user-enrolled devices.

  • Number of sign-in failures before wiping device: Enter the number of failed sign-ins before the device is wiped, from 2-11. It's not recommended to set this value to 2 or 3. It's common to enter the wrong password. Wiping the device after two or three incorrect password attempts happens often. It's recommended to set this value to at least 4.

    iOS/iPadOS has built-in security that can impact this setting. For example, iOS/iPadOS might delay triggering the policy depending on the number of sign-in failures. It might also consider repeatedly entering the same passcode as one attempt. Apple's iOS/iPadOS security guide (opens Apple's web site) is a good resource and provides more specific details on passcodes.

  • Maximum minutes after screen lock before password is required1: Enter how long devices stay idle before users must reenter their password. If the time you enter is longer than what's currently set on the device, the device ignores the time you enter.

    This setting applies to:

    • iOS 8.0+
    • iPadOS 13.0+
  • Maximum minutes of inactivity until screen locks1: Enter the maximum number of minutes of inactivity allowed on devices until the screen locks.

    iOS/iPadOS options:

    • Not configured (Default): Intune doesn't change or update this setting.
    • Immediately: Screen locks after 30 seconds of inactivity.
    • 1: Screen locks after 1 minute of inactivity.
    • 2: Screen locks after 2 minutes of inactivity.
    • 3: Screen locks after 3 minutes of inactivity.
    • 4: Screen locks after 4 minutes of inactivity.
    • 5: Screen locks after 5 minutes of inactivity.

    iPadOS options:

    • Not configured (Default): Intune doesn't change or update this setting.
    • Immediately: Screen locks after 2 minutes of inactivity.
    • 2: Screen locks after 2 minutes of inactivity.
    • 5: Screen locks after 5 minutes of inactivity.
    • 10: Screen locks after 10 minutes of inactivity.
    • 15: Screen locks after 15 minutes of inactivity.

    If a value doesn't apply to iOS and iPadOS, then Apple uses the closest lowest value. For example, if you enter 4 minutes, iPadOS devices use 2 minutes. If you enter 10 minutes, iOS devices use 5 minutes. This behavior is an Apple limitation.

    Note

    The Intune UI for this setting doesn't separate the iOS and iPadOS supported values. The UI might be updated in a future release.

  • Password expiration (days): Enter the number of days before the device password must be changed, from 1-730.

  • Prevent reuse of previous passwords: Restrict users from creating previous passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter 5 so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.

  • Block Touch ID and Face ID unlock: Yes prevents using a fingerprint or face to unlock devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock devices using biometrics.

    Setting to Yes also prevents using FaceID authentication to unlock devices.

    Face ID applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer

Settings apply to: Automated device enrollment (supervised)

  • Block passcode modification: Yes stops the passcode from being changed, added, or removed. After blocking this feature, changes to passcode restrictions are ignored on supervised devices. This setting is ignored on Shared iPads. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passcodes to be added, changed, or removed.

    • Block modification of Touch ID fingerprints and Face ID faces: Yes stops users from changing, adding, or removing TouchID fingerprints and Face ID. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to update the TouchID fingerprints and Face ID on devices.

      Blocking this setting also stops users from changing, adding, or removing FaceID authentication.

      Face ID applies to:

      • iOS 11.0 and newer
      • iPadOS 13.0 and newer
  • Block password AutoFill: Yes prevents using the AutoFill Passwords feature. Choosing Yes also has the following impact:

    • Users aren't prompted to use a saved password in Safari or in any apps.
    • Automatic Strong Passwords are disabled, and strong passwords aren't suggested to users.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these features.

  • Block password proximity requests: Yes prevents devices from requesting passwords from nearby devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these password requests.

  • Block password sharing: Yes prevents sharing passwords between devices using AirDrop. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passwords to be shared.

  • Require Touch ID or Face ID authentication for AutoFill of password or credit card information: Yes forces users to authenticate using TouchID or FaceID before passwords or credit card information can be auto filled in Safari and other apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to control this feature in the device settings.

    This setting applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer

1 When you configure the Maximum minutes of inactivity until screen locks and Maximum minutes after screen lock before password is required settings, they're applied in sequence. For example, if you set the value for both settings to 5 minutes, then the screen turns off automatically after five minutes, and devices are locked after another five minutes. However, if users turn off the screen manually, then the second setting is immediately applied. In the same example, after users turn off the screen, the device locks five minutes later.

Important

  • On macOS devices running 10.14.2 and later (except all versions of macOS 10.15 Catalina), users are prompted to change the device password when the device updates to a new major OS version. This password update happens once. After users update the password, any other password policies are enforced. If a passcode is required in at least one policy, then this behavior only occurs for the local machine user.

  • Any time the password policy is updated, all users running these macOS versions must change the password, even if the current password is compliant with the new requirements. For example, when your macOS device turns on after upgrading to a new major OS version such as Big Sur (macOS 11) or Monterey (macOS 12), users need to change the device password before they can sign in.

Settings apply to: All enrollment types

  • Require password: Yes requires users to enter a password to access devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not require a password. It also doesn't force any restrictions, such as blocking simple passwords or setting a minimum length.

    • Required password type: Enter the required password complexity level your organization requires. When left blank, Intune doesn't change or update this setting. Your options:

      • Not configured: Uses the device default.
      • Alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters.
      • Numeric: Password must only be numbers, such as 123456789.

      This setting applies to:

      • macOS 10.10.3 and newer
    • Number of non-alphanumeric characters in password: Enter the number of complex characters required in the password, from 0-4. A complex character is a symbol, such as ?. When left blank or set to Not configured, Intune doesn't change or update this setting.

    • Minimum password length: Enter the minimum length the password must have, from 4-16 characters. When left blank, Intune doesn't change or update this setting.

    • Block simple passwords: Yes prevents using simple passwords, such as 0000 or 1234. When the value is blank or set to Not configured, Intune doesn't change or update this setting. By default, the OS might allow simple passwords.

    • Maximum minutes of inactivity until screen locks: Enter the length of time devices must be idle before the screen is automatically locked. For example, enter 5 to lock devices after 5 minutes of being idle. When the value is blank or set to Not configured, Intune doesn't change or update this setting.

    • Maximum minutes after screen lock before password is required: Enter the length of time devices must be inactive before a password is required to unlock it. When the value is blank or set to Not configured, Intune doesn't change or update this setting.

    • Password expiration (days): Enter the number of days until the device password must be changed, from 1-65535. For example, enter 90 to expire the password after 90 days. When the password expires, users are prompted to create a new password. When the value is blank or set to Not configured, Intune doesn't change or update this setting.

    • Prevent reuse of previous passwords: Restrict users from creating previously used passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter 5 so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.

    • Maximum allowed sign-in attempts: Enter the maximum number of times that users can consecutively try to sign in before the device locks users out, from 2-11. When this number is exceeded, the device is locked. We recommend not setting this value to a low number, such as 2 or 3. It's common for users to enter the wrong password. We recommend setting to a higher value.

      For example, enter 5 so users can enter the wrong password up to five times. After the fifth attempt, the device is locked. If you leave this value blank, or don't change it, then 11 is used by default.

      After six failed attempts, macOS automatically forces a time delay before a passcode can be entered again. The delay increases with each attempt. Set the Lockout duration to add a delay before the next passcode can be entered.

      • Lockout duration: Enter the number of minutes a lockout lasts, from 0-10000. During a device lockout, the sign-in screen is inactive, and users can't sign in. When the lockout ends, user can try to sign in again.

        If you leave this value blank, or don't change it, then 30 minutes is used by default.

        This setting applies to:

        • macOS 10.10 and newer
  • Block user from modifying passcode: Yes stops the passcode from being changed, added, or removed. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passcodes to be added, changed, or removed.

  • Block Touch ID to unlock device: Yes prevents using fingerprints to unlock devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock the device using a fingerprint.

  • Timeout (hours of inactivity): Enter a value of inactive hours that users must enter their password, instead of TouchID. The default inactivity period is 48 hours. After 48 hours of inactivity, the device prompts for the password, instead of Touch ID.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might set the timeout to 48 hours (172,800 seconds).

    This setting applies to:

    • macOS 12 and newer
  • Block password AutoFill: Yes prevents using the AutoFill Passwords feature on macOS. Choosing Yes also has the following impact:

    • Users aren't prompted to use a saved password in Safari or in any apps.
    • Automatic Strong Passwords are disabled, and strong passwords aren't suggested to users.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these features.

  • Block password proximity requests: Yes prevents devices from requesting passwords from nearby devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these password requests.

  • Block password sharing: Yes prevents sharing passwords between devices using AirDrop. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passwords to be shared.

Privacy preferences

On macOS devices, apps and processes often prompt users to allow or deny access to device features, such as the camera, microphone, calendar, Documents folder, and more. These settings allow administrators to pre-approve or pre-deny access to these device features. When you configure these settings, you manage data access consent on behalf of your users. Your settings override their previous decisions.

The goal of these settings is to reduce the number of prompts by apps and processes.

This feature applies to:

  • macOS 10.14 and newer
  • Some settings apply to macOS 10.15 and newer.
  • These settings only apply on devices that have the privacy preferences profile installed before being upgraded.

Note

When you allow apps using a policy, these apps aren't shown in System settings (Privacy + Security) on the device. Only apps manually allowed by end users are shown.

Settings apply to: User approved device enrollment, Automated device enrollment

  • Apps and processes: Add apps or processes to configure access. Also enter:
    • Name: Enter a name for your app or process. For example, enter Microsoft Remote Desktop or Microsoft 365.

    • Identifier type: Your options:

      • Bundle ID: Select this option for apps.
      • Path: Select this option for non-bundled binaries, which is a process or executable.

      Helper tools embedded within an application bundle automatically inherit the permissions of their enclosing application bundle.

    • Identifier: Enter the app bundle ID, or the installation file path of the process or executable. For example, enter com.contoso.appname.

      To get the app bundle ID:

      • Open the Terminal app, and run the codesign command. This command identifies the code signature. You can get the bundle ID and the code signature simultaneously.
      • For apps added to Intune, you can use the Intune admin center.
    • Code requirement: Enter the code signature for the application or process.

      A code signature is created when an app or binary is signed by a developer certificate. To find the designation, run the codesign command manually in the Terminal app: codesign --display -r - /path/to/app/binary. The code signature is everything that appears after =>.

    • Enable static code validation: Choose Yes for the app or process to statically validate the code requirement. When set to Not configured, Intune doesn't change or update this setting.

      Enable this setting only if the process invalidates its dynamic code signature. Otherwise, use Not configured.

    • Block Camera: Yes prevents the app from accessing the system camera. You can't allow access to the camera. When set to Not configured, Intune doesn't change or update this setting.

    • Block Microphone: Yes prevents the app from accessing the system microphone. You can't allow access to the microphone. When set to Not configured, Intune doesn't change or update this setting.

    • Block screen recording: Yes blocks the app from capturing the contents of the system display. You can't allow access to screen recording and screen capture. When set to Not configured, Intune doesn't change or update this setting.

      Requires macOS 10.15 and newer.

    • Block input monitoring: Yes blocks the app from using CoreGraphics and HID APIs to listen to CGEvents and HID events from all processes. Yes also denies apps and processes from listening to and collecting data from input devices, such as a mouse, keyboard, or trackpad. You can't allow access to the CoreGraphics and HID APIs.

      When set to Not configured, Intune doesn't change or update this setting.

      Requires macOS 10.15 and newer.

    • Speech recognition: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access the system speech recognition, and allows sending speech data to Apple.
      • Block: Prevents the app from accessing the system speech recognition, and prevents sending speech data to Apple.

      Requires macOS 10.15 and newer.

    • Accessibility: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access the system Accessibility app. This app includes closed captions, hover text, and voice control.
      • Block: Prevents the app from accessing the system Accessibility app.
    • Contacts: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access contact information managed by the system Contacts app.
      • Block: Prevents the app from accessing this contact information.
    • Calendar: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access calendar information managed by the system Calendar app.
      • Block: Prevents the app from accessing this calendar information.
    • Reminders: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access reminder information managed by the system Reminders app.
      • Block: Prevents the app from accessing this reminder information.
    • Photos: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access the pictures managed by the system Photos app in ~/Pictures/.photoslibrary.
      • Block: Prevents the app from accessing these pictures.
    • Media library: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access Apple Music, music and video activity, and the media library.
      • Block: Prevents the app from accessing this media.

      Requires macOS 10.15 and newer.

    • File provider presence: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access the File Provider app, and know when users are using files managed by the File Provider. A File Provider app allows other File Provider apps to access the documents and directories stored and managed by the containing app.
      • Block: Prevents the app from accessing the File Provider app.

      Requires macOS 10.15 and newer.

    • Full disk access: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access all protected files, including system administration files. Apply this setting with caution.
      • Block: Prevents the app from accessing these protected files.
    • System admin files: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access some files used in system administration.
      • Block: Prevents the app from accessing these files.
    • Desktop folder: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access files in the user's Desktop folder.
      • Block: Prevents the app from accessing these files.

      Requires macOS 10.15 and newer.

    • Documents folder: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access files in the user's Documents folder.
      • Block: Prevents the app from accessing these files.

      Requires macOS 10.15 and newer.

    • Downloads folder: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access files in the user's Downloads folder.
      • Block: Prevents the app from accessing these files.

      Requires macOS 10.15 and newer.

    • Network volumes: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access files on network volumes.
      • Block: Prevents the app from accessing these files.

      Requires macOS 10.15 and newer.

    • Removable volumes: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to access files on removable volumes, such as a hard disk.
      • Block: Prevents the app from accessing these files.

      Requires macOS 10.15 and newer.

    • System events: Your options:

      • Not configured: Intune doesn't change or update this setting.
      • Allow: Allows the app to use CoreGraphics APIs to send CGEvents to the system event stream.
      • Block: Prevents the app from using CoreGraphics APIs to send CGEvents to the system event stream.
    • Apple events: This setting allows apps to send a restricted Apple event to another app or process. Select Add to add a receiving app or process. Enter the following information of the receiving app or process:

      • Identifier type: Select Bundle ID if the receiving identifier is an application. Select Path if the receiving identifier is a process or executable.

      • Identifier: Enter the app bundle ID, or the installation path of the process receiving an Apple event.

      • Code requirement: Enter the code signature for the receiving application or process.

        A code signature is created when an app or binary is signed by a developer certificate. To find the designation, run the codesign command manually in the Terminal app: codesign --display -r -/path/to/app/binary. The code signature is everything that appears after =>.

      • Access: Allow a macOS Apple Event to be sent to the receiving app or process. Your options:

        • Not configured: Intune doesn't change or update this setting.
        • Allow: Allows the app or process to send the restricted Apple event to the receiving app or process.
        • Block: Prevents the app or process from sending a restricted Apple event to the receiving app or process.

Restricted apps

Important

Device profiles that use the restricted app settings must be assigned to user groups, not device groups.

The restricted apps settings don't prevent users from installing and opening specific apps. Instead, devices with restricted apps installed populate the Devices with restricted apps report in the Intune admin center (Devices > Monitor).

Settings apply to: Device enrollment and Automated device enrollment (supervised)

Note

These settings create lists of approved and prohibited apps. They don't block users from installing or running apps. Instead, if a user installs or runs an app on either list, it's reported in Intune. You can use this information to help inform your app management strategy.

To prevent an app from running or being shown on iOS/iPadOS, create an Intune settings catalog policy > Restrictions > Allow Listed App Bundle IDs or Blocked App Bundle IDs settings.

Settings apply to: All enrollment types

  • Type of restricted apps list: Create a list of apps that are approved or prohibited for users. Your options:

    • Not configured (default): Intune doesn't change or update this setting. By default, the OS might allow access to apps you assign, and built-in apps.

    • Prohibited apps: List the apps (not managed by Intune) that aren't approved for users. Users aren't prevented from installing or running a prohibited app. If a user installs an app from this list, it's reported in Intune.

      If there's a prohibited app on the device, this setting can report an error or as Not compliant.

    • Approved apps: List the apps that users are allowed to install. To stay compliant, users must not install other apps. If users install apps that aren't allowed, then it's reported in Intune. Apps that are managed by Intune are automatically allowed. Users aren't prevented from installing an app that isn't on the approved list. But if they do, it's reported in Intune.

      If an app is installed that isn't on the approved apps list, this setting can report an error or as Not compliant.

    Note

    • Intune collects but doesn't store the full app inventory on all enrollment methods except automated device enrollment (ADE). On ADE-enrolled devices, Intune collects and stores the full app inventory.

To add apps to these lists, you can:

  • App store URL: Enter the iTunes App store URL of the app you want. For example, to add the Microsoft Work Folders app, enter https://itunes.apple.com/us/app/work-folders/id950878067?mt=8 or https://apps.apple.com/us/app/work-folders/id950878067?mt=8.

    To find the URL of an app, open the iTunes App Store, and search for the app. For example, search for Microsoft Remote Desktop or Microsoft Word. Select the app, and copy the URL. You can also use iTunes to find the app, and then use the Copy Link task to get the app URL.

  • App Bundle ID: Enter the bundle ID of the app. You can add built-in apps and line-of-business apps.

    To get the bundle ID:

  • App name: Enter a user-friendly name to help you identify the bundle ID.

  • Publisher: Enter the publisher of the app.

  • Import a CSV file with details about the app, including the URL. Use the <app url>, <app name>, <app publisher> format. Or, Export an existing list that includes the restricted apps list in the same format.
  • Import a CSV file with details about the app, including the URL. Use the <app bundle ID>, <app name>, <app publisher> format. Or, Export to create a list of apps you added, in the same format.

Shared iPad

This feature applies to:

  • iPadOS 13.4 and newer
  • Shared iPad

Settings apply to: Automated device enrollment (supervised)

  • Block Shared iPad temporary sessions: Temporary sessions allow users to sign in as Guest, and users aren't required to enter a Managed Apple ID or password.

    When set to Yes:

    • Shared iPad users can't use temporary sessions.
    • Users must sign in to the device with their Managed Apple ID and password.
    • The Guest account option isn't shown on the lock screen on the devices.

    When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS allows a Shared iPad user to sign in to the device with the Guest account. When the user signs out, none of the user's data is saved or synced to iCloud.

Show or hide apps

This feature applies to:

  • iOS 9.3 and newer
  • iPadOS 13.0 and newer

Settings apply to: Automated device enrollment (supervised)

  • Type of apps list: Create a list of apps to show or hide. You can show or hide built-in apps and line-of-business apps. Apple's web site has a list of built-in Apple apps. Your options:

    • Not configured (default): Intune doesn't change or update this setting.

    • Hidden apps: Enter a list of apps that are hidden from users. Users can't view or open these apps.

      Apple prevents hiding some native apps. For example, you can't hide the Settings app on the device. Delete built-in Apple apps lists the apps that can be hidden.

    • Visible apps: Enter a list of apps that users can view and launch. No other apps can be viewed or launched.

  • App URL: Enter the store app URL of the app you want to show or hide. For example:

    • To add the Microsoft Work Folders app, enter https://itunes.apple.com/us/app/work-folders/id950878067?mt=8 or https://apps.apple.com/us/app/work-folders/id950878067?mt=8.

    • To add the Microsoft Word app, enter https://itunes.apple.com/de/app/microsoft-word/id586447913 or https://apps.apple.com/de/app/microsoft-word/id586447913.

    To find the URL of an app, open the iTunes App Store, and search for the app. For example, search for Microsoft Remote Desktop or Microsoft Word. Select the app, and copy the URL.

    You can also use iTunes to find the app, and then use the Copy Link task to get the app URL.

  • App Bundle ID: Enter the app bundle ID of the app you want. You can show or hide built-in apps and line-of-business apps.

    To get the app bundle ID:

  • App name: Enter the app name of the app you want. You can show or hide built-in apps and line-of-business apps. Apple's web site has a list of built-in Apple apps.

  • Publisher: Enter the publisher of the app you want.

You can also:

  • Import a CSV file with details about the app, including the URL. Use the <app url>, <app name>, <app publisher> format. Or, Export to create a list of the restricted apps you added, in the same format.

Wireless

Settings apply to: Device enrollment and Automated device enrollment (supervised)

  • Block data roaming: Yes prevents data roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow data roaming when the device is on a cellular network.

    Important

    The Intune service treats this setting as a remote device action. So, the management profile on devices doesn't show this setting. Every time the data roaming status changes on the device, Intune service blocks Data roaming. In Intune, if the reporting status shows a success, then it's working, even though the management profile on the device doesn't show the setting.

  • Block global background fetch while roaming: Yes prevents using the global background fetch feature when roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to fetch data, such as email, when it's roaming on a cellular network.

  • Block voice dialing while device is locked: Yes prevents using the voice dialing feature on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow voice dialing on devices.

  • Block voice roaming: Yes prevents voice roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow voice roaming when devices are on a cellular network.

  • Block personal Hotspot: Yes turns off the personal hotspot on devices with every device sync. This setting might not be compatible with some carriers. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might keep the personal hotspot configuration as the default set by users.

    Important

    The Intune service treats this setting as a remote device action. So, the management profile on devices doesn't show this setting. Every time the personal hotspot status changes on the device, Intune service blocks Personal Hotspot. In Intune, if the reporting status shows a success, then it's working, even though the management profile on the device doesn't show the setting.

  • Cellular usage rules (managed apps only): Allow defines the data types that managed apps can use when on cellular networks. When set to Not configured (default), Intune doesn't change or update this setting. Your options:

    • Block use of cellular data: Choose the apps that can't use cellular data. Your options:
      • Not configured: Intune doesn't change or update this setting.
      • All managed apps
      • Choose specific apps: Add the app bundle ID, app name, and publisher.
    • Block use of cellular data when roaming: Choose the apps that can't use cellular data when roaming. Your options:
      • Not configured: Intune doesn't change or update this setting.
      • All managed apps
      • Choose specific apps: Add the app bundle ID, app name, and publisher.

Settings apply to: Automated device enrollment (supervised)

  • Block changes to app cellular data usage settings: Yes prevents changes to the app cellular data usage settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to control which apps are allowed to use cellular data.

  • Block changes to cellular plan settings: Yes prevents changing any settings in the cellular plan. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to make changes.

    This setting applies to:

    • iOS 11.0 and newer
    • iPadOS 13.0 and newer
  • Block modification of personal hotspot: Yes prevents changing the personal hotspot setting. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to enable or disable their personal hotspot.

    If you set this setting and the Block personal Hotspot setting to Yes, the personal hotspot is turned off.

    This setting applies to:

    • iOS 12.2 and newer
    • iPadOS 13.0 and newer
  • Require joining Wi-Fi networks only using configuration profiles: Yes forces devices to use only Wi-Fi networks set up through Intune configuration profiles. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to use other Wi-Fi networks.

    • This setting is available for iOS/iPadOS 14.4 and older devices. On iOS/iPadOS 14.5 and newer devices, use the Require devices to use Wi-Fi networks set up via configuration profiles setting.

    • When set to Yes, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, the device might be blocked from connecting to the internet.

    • If the device can't connect, unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to Yes in a device restrictions profile, and assign the profile to the device.

      This setting applies to:

      • iOS/iPadOS 14.4 and older
  • Require Wi-Fi always on: Yes keeps Wi-Fi on in the Settings app. It can't be turned off in Settings or in the Control Center, even when the device is in airplane mode. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to turn on or turn off Wi-Fi.

    Configuring this setting doesn't prevent users from selecting a Wi-Fi network.

    This setting applies to:

    • iOS 13.0 and newer
    • iPadOS 13.0 and newer
  • Require devices to use Wi-Fi networks set up via configuration profiles: Yes forces the device to use Wi-Fi networks set up through configuration profiles. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to use other Wi-Fi networks.

    • On iOS/iPadOS 14.5 and newer devices, use this setting. Don't use the Require joining Wi-Fi networks only using configuration profiles setting.

    • When set to Yes:

      • Make sure you configure a Wi-Fi device configuration profile using the built-in Wi-Fi template (not the settings catalog). Don't assign Wi-Fi profiles created using custom profiles, as this setting doesn't support custom Wi-Fi profiles.

        If you don't use the built-in Wi-Fi device configuration template, the policy shows an error state for this setting (Require devices to use Wi-Fi networks set up via configuration profiles).

      • Make sure that the Wi-Fi device configuration profile is already on the devices before you assign this setting (Require devices to use Wi-Fi networks set up via configuration profiles).

        If you don't assign a Wi-Fi profile, this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, the device might be blocked from connecting to the internet.

    • If the device can't connect, unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to Yes in a device restrictions profile, and assign the profile to the device.

      This setting applies to:

      • iOS/iPadOS 14.5 and newer