App Blocking
Published by Iru, Inc.
Configure App Blocking settings to enforce application execution policies across Mac, Windows, and Android endpoints, preventing unauthorized or non-compliant software from running on managed devices. This profile enables IT administrators to create comprehensive blocklists based on application identifiers, executable names, or certificate signatures, leveraging platform-native enforcement mechanisms including Windows AppLocker for granular control. App Blocking protects organizational security by preventing shadow IT applications, blocking productivity-draining software, enforcing compliance with software licensing agreements, and mitigating security risks from unauthorized tools while maintaining consistent application governance policies across heterogeneous device environments.
Configure Avert settings to establish comprehensive malware detection and prevention policies that protect managed endpoints from malicious software, potentially unwanted programs (PUPs), and security threats. This profile enables IT administrators to define organizational threat tolerance levels, create custom allow and block lists for specific applications or file types, and enforce real-time threat response actions. Avert provides layered security by combining signature-based detection with behavioral analysis to identify emerging threats while offering granular control over application execution policies, ensuring endpoints remain secure without impacting legitimate business operations or user productivity.
Control device behavior and security with granular configuration policies across your Apple devices. Apply comprehensive restrictions to manage functionality, security settings, and user experience—from app limitations and content filters to hardware features and network controls. Supervision-required options unlock advanced restrictions for iPhone, iPad, Apple TV, and Vision Pro devices, enabling deeper organizational control.
Gatekeeper enforces code signing and notarization requirements to protect Mac devices from malicious software. Configure policies to allow applications from the App Store only, identified developers, or custom trust settings. Manage security assessments for downloaded files, control Gatekeeper bypass permissions, and enforce application execution policies across your Apple devices. Essential for organizations maintaining security compliance while balancing user productivity needs and managing software deployment workflows.