Accessories and Storage Access
Published by Iru, Inc
Configure Accessories and Storage Access settings to establish granular control over external storage devices, peripheral connectivity, and removable media interactions on managed endpoints. This profile enables IT administrators to define security policies for USB drives, external hard drives, network-attached storage, SD cards, and disk image files while managing accessory permissions for Bluetooth devices, dongles, and other peripherals. Accessories and Storage Access protects against data exfiltration, unauthorized file transfers, and malware introduction through external media by enforcing read-only access, blocking specific device types, or restricting DMG mounting capabilities based on organizational security requirements.
Enable full-disk encryption on Mac devices using Apple's FileVault technology to protect data at rest with XTS-AES-128 encryption. Configure FileVault to require user authentication at startup, manage recovery key escrow options, and enforce encryption policies across your devices. Deploy this profile to ensure compliance with data protection regulations, safeguard sensitive information on lost or stolen devices, and maintain centralized control over encryption settings. Supports both institutional recovery keys and personal recovery keys for flexible key management strategies.
Configure firewall rules and network security policies for Mac devices to control inbound and outbound network traffic. Define application-specific firewall rules, enable stealth mode to prevent network discovery, block all incoming connections, or allow signed applications automatically. Deploy this profile to enforce consistent network security policies across managed devices, protect endpoints from unauthorized access, and ensure compliance with organizational security requirements. Essential for securing devices in enterprise, education, and remote work environments.
Gatekeeper enforces code signing and notarization requirements to protect Mac devices from malicious software. Configure policies to allow applications from the App Store only, identified developers, or custom trust settings. Manage security assessments for downloaded files, control Gatekeeper bypass permissions, and enforce application execution policies across your Apple devices. Essential for organizations maintaining security compliance while balancing user productivity needs and managing software deployment workflows.