iOS and iPadOS device settings to allow or restrict features using Intune
Note
Intune may support more settings than the settings listed in this article. Not all settings are documented, and won't be documented. To see the settings you can configure, create a device configuration policy, and select Settings Catalog. For more information, go to Settings catalog.
This article describes the different settings you can control on iOS and iPadOS devices. As part of your mobile device management (MDM) solution, use these settings to allow or disable features, set password rules, allow or restrict specific apps, and more.
This feature applies to:
- iOS/iPadOS
These settings are added to a device configuration profile in Intune, and then assigned or deployed to your iOS/iPadOS devices.
Tip
These settings use Apple's restriction settings. For more information on these settings, see Apple's mobile device management settings site (opens Apple's web site).
Before you begin
When configuring device restriction policies, the broad range of settings enable you to tailor protection to your specific needs.
When you're ready to proceed, create an iOS/iPadOS device restrictions configuration profile.
Note
These settings apply to different enrollment types, with some settings applying to all enrollment options. For more information on the different enrollment types, see iOS/iPadOS enrollment.
App Store, Doc Viewing, Gaming
Settings apply to: All enrollment types
Block viewing corporate documents in unmanaged apps: Yes prevents viewing corporate documents in unmanaged apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow corporate documents to be viewed in any app.
For example, you want to prevent users from saving files from the OneDrive app to Dropbox. Configure this setting as Yes. After devices receive the policy (for example, after a restart), it no longer allows saving.
Note
When this setting is blocked (set to Yes), third party keyboards installed from the App Store are also blocked.
Allow unmanaged apps to read from managed contacts accounts: Yes lets unmanaged apps, such as the built-in iOS/iPadOS Contacts app, to read and access contact information from managed apps, including the Outlook mobile app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent reading from the built-in Contacts app on devices.
This setting allows or prevents reading contact information. It doesn't control syncing contacts between the apps.
To use this setting, set the Block viewing corporate documents in unmanaged apps setting to Yes.
For more information about these two settings, and their impact on Outlook for iOS/iPadOS contact export synchronization, see Support Tip: Use Intune custom profile settings with the iOS/iPadOS Native Contacts App.
Treat AirDrop as an unmanaged destination: Yes forces AirDrop to be considered an unmanaged drop target. It stops managed apps from sending data using Airdrop. When set to Not configured (default), Intune doesn't change or update this setting.
Block viewing non-corporate documents in corporate apps: Yes prevents viewing non-corporate documents in corporate apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow any document to be viewed in corporate managed apps.
Yes also prevents contact export synchronization in Outlook for iOS/iPadOS. For more information, see Support Tip: Enabling Outlook iOS/iPadOS Contact Sync with iOS12 MDM Controls.
Allow copy/paste to be affected by managed open-in: Yes enforces copy/paste restrictions based on how you configured Block viewing corporate documents in unmanaged apps and Block viewing non-corporate documents in corporate apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not enforce any copy/paste restrictions.
Settings apply to: Device enrollment, Automated device enrollment (supervised)
Require iTunes Store password for all purchases: Yes forces users to enter the Apple ID password for each in-app or ITunes purchase. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow purchases without prompting for a password every time.
Block in-app purchases: Yes prevents in-app purchases from the store. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow store purchases within a running app.
Block download of explicit sexual content in Apple Books: Yes prevents users from downloading media from the iBook store that's tagged as erotica. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to download books with the "Erotica" category.
Allow managed apps to write contacts to unmanaged contacts accounts: Yes lets managed apps, such as the Outlook mobile app, save or sync contact information, including business and corporate contacts, to the built-in iOS/iPadOS Contacts app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent managed apps from saving or syncing contact information to the built-in iOS/iPadOS Contacts app on devices.
To use this setting, set the Block viewing corporate documents in unmanaged apps setting to Yes.
Ratings region: Select the ratings region you want to use for allowed downloads. And then select the allowed ratings for Movies, TV Shows, and Apps.
Settings apply to: Automated device enrollment (supervised)
Block App store: Yes prevents access to the app store on supervised devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
- Block installing apps using App Store: Yes doesn't show the app store on the device home screen. Users can continue to use iTunes or the Apple Configurator to install apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the app store on the home screen.
- Block automatic app downloads: Yes prevents automatic downloading of apps bought on other devices and automatic updates to new apps. It doesn't affect updates to existing apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow apps bought on other iOS/iPadOS devices to download and update on the device.
Block playback of explicit music, podcast, and iTunes U: Yes prevents explicit iTunes music, podcast, or news content. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the device to access content rated as adult from the store.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block adding Game Center friends: Yes prevents users from adding Game Center friends. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to add friends in Game Center.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block Game Center: Yes prevents using the Game Center app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Game Center app on devices.
Block multiplayer gaming in Game Center: Yes prevents multiplayer gaming. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to play multiplayer games on devices.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block access to network drive in Files app: Using the Server Message Block (SMB) protocol, devices can access files or other resources on a network server. Yes prevents accessing files on a network SMB drive. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Autonomous single app mode (ASAM)
Use these settings to configure iOS/iPadOS devices to run specific apps in autonomous single app mode (ASAM). When ASAM is configured, and users start one of the configured apps, then the device is locked to that app. App/task switching is disabled until users exit the allowed app.
For the ASAM configuration to apply, users must manually open the specific app. This task also applies to the Company Portal app.
For example, in a school or university environment, add an app that lets users take a test on the device. Or, lock the device into the Company Portal app until the user authenticates. When the apps actions are completed by users, or you remove this policy, the device returns to its normal state.
Not all apps support autonomous single app mode. To put an app in ASAM, a bundle ID or a key value pair delivered by an app config policy are typically required. For more information, see the
autonomousSingleAppModePermittedAppIDs
restriction in Apple's MDM documentation. For more information on the specific settings required for the app you're configuring, see the vendor documentation.For example, to configure Zoom Rooms in autonomous single app mode, Zoom says to use the
us.zoom.zpcontroller
bundle ID. In this instance, you also make a change in the Zoom web portal. For more information, see the Zoom help center.On iOS/iPadOS devices, the Company Portal app supports ASAM. When the Company Portal app is in ASAM, users must manually open the Company Portal app. Then the device is locked in the Company Portal app until the user authenticates. When users sign in to the Company Portal app, they can use other apps and the Home screen button on the device. When they sign out of the Company Portal app, the device returns to single app mode, and locks on the Company Portal app.
To turn the Company Portal app into a 'sign in/sign out' app (enable ASAM), enter the Company Portal app name, such as
Microsoft Intune Company Portal
, and the bundle ID (com.microsoft.CompanyPortal
) in these settings. After this profile is assigned, you must open the Company Portal app to lock the app so users can sign in and sign out of it. For the ASAM configuration to apply, users must manually open the Company Portal app.When the device configuration profile is removed, and the user signs out, the device isn't locked in the Company Portal app.
Settings apply to: Automated device enrollment (supervised)
- App name: Enter the name of the app you want.
- App Bundle ID: Enter the bundle ID of the app you want. To get the bundle ID of an app added to Intune, you can use the Intune admin center.
You can also Import a CSV file with the list of app names and their bundle IDs. Or, Export an existing list that includes the apps.
Built-in Apps
Settings apply to: All enrollment types
Block Siri: Yes prevents access to Siri. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Siri voice assistant on devices.
- Block Siri while device is locked: Yes prevents access to Siri when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Siri voice assistant on devices when they're locked.
Require Safari fraud warnings: Yes requires fraud warnings to be shown in the web browser on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show these warnings.
Block Siri for dictation: Yes prevents connections to Siri servers. Users can't use Siri to dictate text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to be used for dictation. Also available for user enrollment.
This feature applies to:
- iOS/iPadOS 14.5 and newer
Block Siri for translation: Yes prevents connections to Siri servers so that users can't use Siri to translate text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to be used for translation. Also available for user enrollment.
This feature applies to:
- iOS/iPadOS 15.0 and newer
Settings apply to: Device enrollment and Automated device enrollment (supervised)
Block internet search results from Spotlight: Yes stops Spotlight from returning any results from an Internet search. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Spotlight search connect to the Internet to provide search results.
Safari cookies: By default, Apple allows all cookies, and blocks cross site tracking. Use this setting to allow users to enable or disable these features. Your options:
- Not configured (default): Intune doesn't change or update this setting. By default, the OS allows all cookies and blocks cross site tracking, and might allow users to enable and disable these features.
- Allow all cookies, and allow cross site tracking: Cookies are allowed, and can be disabled by users. By default, cross site tracking is blocked, and can be enabled by users.
- Block all cookies, and block cross site tracking: Cookies and cross site tracking are both blocked. Users can't enable or disable either setting.
- Allow all cookies, and block cross site tracking: Cookies are allowed, and can be disabled by users. By default, cross site tracking is blocked, and can't be enabled or disabled by users.
Block Safari JavaScript: Yes prevents Java scripts in the browser from running on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Java scripts.
Block Safari Pop-ups: Yes blocks all pop-ups in the Safari web browser. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the pop-up blocker.
Settings apply to: Automated device enrollment (supervised)
Block camera: Yes prevents access to the camera on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the device's camera.
Intune only manages access to the device camera. It doesn't have access to pictures or videos.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block FaceTime: Yes prevents access to the FaceTime app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the FaceTime app on devices.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Require Siri profanity filter: Yes turns on the filter, and prevents Siri from dictating, or speaking profane language. When set to Not configured (default), Intune doesn't change or update this setting.
To use this setting, set the Block Siri setting to Not configured.
This feature applies to:
- iOS 11.0 and newer
Block user-generated content in Siri: Yes prevents Siri from accessing websites to answer questions. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Siri to access user-generated content from the internet.
To use this setting, set the Block Siri setting to Not configured.
Block Apple News: Yes prevents access to the Apple News app on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Apple News app.
Block Apple Books: Yes prevents access to the iBooks store. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to browse and buy books from the iBooks store.
Block iMessage: Yes prevents using the Messages app for iMessage. If devices support text messaging, then users can still send and receive text messages using SMS. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Messages app to send and read messages over the internet.
Block Podcasts: Yes prevents using the Podcasts app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Podcasts app.
Music service: Yes disables the Music Service, and reverts the Music app to classic mode. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Apple Music app.
Block iTunes Radio: Yes prevents using the iTunes Radio app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the iTunes Radio app.
Block iTunes store: Yes prevents using iTunes on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow iTunes.
This feature applies to:
- iOS 4.0 and newer
- iPadOS 13.0 and newer
Block Find My iPhone: In the Find My app, Yes disables/hides the Devices tab. Yes may also prevent pairing of AirTags. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the Devices tab in the Find My app to get the approximate location of the device.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Block Find My Friends: Yes prevents this feature in the Find My app. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using this Find My app feature to find family and friends from an Apple device or iCloud.com.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Block user modification to the Find My Friends settings: Yes prevents changes to the Find My Friends app settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change settings for the Find My Friends app.
Block removal of system apps from device: Yes prevents removing system apps from devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to remove system apps.
Block Safari: Yes prevents using the Safari browser on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use the Safari browser.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block Safari Autofill: Yes disables the autofill feature in Safari on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change autocomplete settings in the web browser.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Cloud and Storage
Settings apply to: All enrollment types
- Force encrypted backup: Yes requires device backups be encrypted. When set to Not configured (default), Intune doesn't change or update this setting.
- Block managed apps from storing data in iCloud: Yes prevents Intune-managed apps to sync data to the user's iCloud account. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this data sync to iCloud.
- Block backup of enterprise books: Yes prevents backing up enterprise books. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to back up these books.
- Block notes and highlights sync for enterprise books: Yes prevents syncing notes and highlights in enterprise books. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the syncing.
Settings apply to: Device enrollment, Automated device enrollment (supervised)
- Block iCloud Photos sync: Yes prevents photo stream syncing to iCloud. Blocking this feature may cause data loss. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users enable My Photo Stream on their device to sync to iCloud, and have photos available on all the user's devices.
- Block iCloud Photo Library: Yes disables using iCloud photo library to store photos and videos in the cloud. Any photos not fully downloaded from iCloud Photo Library to devices are removed from the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the iCloud photo library.
- Block My Photo Stream: Yes disables iCloud Photo Sharing on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow shared photo streaming.
- Block Handoff: Yes prevents users from starting work on an iOS/iPadOS device, and then continuing the work on another iOS/iPadOS or macOS device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this handoff.
Settings apply to: Automated device enrollment (supervised)
Block iCloud backup: Yes stops users from backing up devices to iCloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to back up devices to iCloud.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block iCloud document and data sync: Yes prevents iCloud from syncing documents and data. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow document and key-value synchronization to your iCloud storage space.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block iCloud Keychain sync: Yes disables syncing credentials stored in the Keychain to iCloud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to sync these credentials.
Starting with iOS/iPadOS 13.0, this setting requires supervised devices.
Block iCloud Private Relay: Yes disables the iCloud Private Relay. When disabled, Apple doesn't encrypt internet traffic leaving the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature, which prevents networks and servers from monitoring a user's activity across the internet.
This feature applies to:
- iOS/iPadOS 15 and newer
iCloud Private Relay (opens Apple's web site)
Connected Devices
Settings apply to: All enrollment types
- Force Apple Watch wrist detection: Yes forces a paired Apple watch to use wrist detection. When required, the Apple Watch won't display notifications when it's not being worn. When set to Not configured (default), Intune doesn't change or update this setting.
Settings apply to: Device enrollment, Automated device enrollment (supervised)
Require AirPlay outgoing requests pairing password: Yes requires a pairing password when using AirPlay to stream content to other Apple devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to stream content using AirPlay without entering a password.
Block Apple Watch auto unlock: Yes prevents users from unlocking their device with Apple Watch when an obstruction, such as a mask, prevents Face ID from recognizing a user's face. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow Apple Watch to auto unlock a device if an obstruction is preventing Face ID from recognizing the user.
This feature applies to:
- iOS/iPadOS 14.5 and newer
Settings apply to: Automated device enrollment (supervised)
Block AirDrop: Yes prevents using AirDrop on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the AirDrop feature to exchange content with nearby devices.
Block pairing with Apple Watch: Yes prevents pairing with an Apple Watch. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to pair with an Apple Watch.
Block modifying Bluetooth settings: Yes stops users from changing Bluetooth settings on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.
Block pairing with non-Configurator hosts: Yes prevents host pairing. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow host pairing to let the administrator control which devices an iOS/iPadOS device can pair with.
Block AirPrint: Yes prevents using the AirPrint feature on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use AirPrint.
- Block storage of AirPrint credentials in Keychain: Block prevents using Keychain storage for username and password on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow storing the AirPrint username and password in the Keychain app.
- Require AirPrint to destinations with trusted certificates: Yes forces devices to use trusted certificates for TLS printing communication. When set to Not configured (default), Intune doesn't change or update this setting.
- Block iBeacon discovery of AirPrint printers: Yes prevents malicious AirPrint Bluetooth beacons from phishing for network traffic. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow advertising AirPrint printers on devices.
Block setting up new nearby devices: Yes disables the prompt to set up new devices that are nearby. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow prompts for users to connect to other nearby Apple devices.
This feature applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Block access to USB drive in Files app: Devices can connect and open files on a USB drive. Yes prevents device access to the USB drive in the Files app when a USB is connected to the device. Blocking this feature also blocks users from transferring files onto a USB drive connected to an iPad. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to a USB drive in the Files app.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Disable near-field communication (NFC): Yes disables NFC, and prevents devices from pairing with other NFC-enabled devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, users might be allowed to use NFC, and connect to other NFC-enabled devices.
This feature applies to:
- iOS 14.2 and newer
- iPadOS 14.2 and newer
Allow users to boot devices into recovery mode with unpaired devices: Yes lets a user boot a device into recovery mode with an unpaired device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent users from booting devices into recovery mode with an unpaired device.
This feature applies to:
- iOS/iPadOS 14.5 and newer
Domains
Settings apply to: Device enrollment and Automated device enrollment (supervised)
Unmarked email domains: Add one or more domain URLs to the list. When users receive an email from a domain other than the domains you enter, the email is marked as untrusted in the iOS/iPadOS Mail app.
Managed Safari web domains: Add one or more web domain URLs to the list. When documents are downloaded from the domains you enter, they're considered managed. This setting applies only to documents downloaded using the Safari browser.
Settings apply to: Automated device enrollment (supervised)
Safari password domains: Add one or more domain URLs to the list. Users can only save web passwords from URLs in this list. This setting applies only to the Safari browser, and devices in supervised mode. If you don't enter any URLs, then passwords can be saved from all web sites.
This feature applies to:
- iOS 9.3 and newer
- iPadOS 13.0 and newer
General
Settings apply to: All enrollment types
Block sending diagnostic and usage data to Apple: Yes prevents devices from sending diagnostic and usage data to Apple. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this data to be sent.
Block screenshots and screen recording: Yes prevents screenshots or screen captures on devices. In iOS/iPadOS 9.0 and newer, it also blocks screen recordings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users capture the screen contents as an image or as a video.
Settings apply to: Device enrollment and Automated device enrollment (supervised)
Block Untrusted TLS certificates: Yes prevents untrusted Transport Layer Security (TLS) certificates on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow TLS certificates.
Block over-the-air PKI updates: Yes prevents your users from receiving software updates unless devices are connected to a computer. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow a device to receive software updates without being connected to a computer.
Force limited ad tracking: Yes disables the device advertising identifier. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might keep it enabled.
Block trusting new enterprise app authors: Yes removes the Trust Enterprise Developer button in Settings > General > Profiles & Device Management on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users choose to trust apps that aren't downloaded from the app store.
Block app clips: Yes blocks App Clips on managed devices. Specifically, setting to Yes:
- Prevents users from adding App Clips on devices.
- Removes existing App Clips on devices.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow adding and removing App Clips on devices.
This feature applies to:
- iOS 14.0 and newer
- iPadOS 14.0 and newer
Limit Apple personalized advertising: Yes limits Apple's personalized advertising in the App Store, Apple News, and Stocks apps. On the device, the Settings > Privacy > Apple Advertising is toggled off. This setting only impacts personalized ads in these apps. It doesn't impact non-personalized ads, and may not reduce ads. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might turn on personalized ads.
For more information on Apple's policy, see Apple Advertising & Privacy (opens Apple's web site).
This feature applies to:
- iOS 14.0 and newer
- iPadOS 14.0 and newer
Settings apply to: Automated device enrollment (supervised)
Block modification of diagnostics settings: Yes prevents users from changing the diagnostic submission and app analytics settings in Diagnostics and Usage (device Settings). When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these device settings.
To use this setting, set the Block sending diagnostic and usage data to Apple setting to Not configured.
This feature applies to:
- iOS 9.3.2 and newer
- iPadOS 13.0 and newer
Block remote AirPlay, view screen by Classroom app, and screen sharing: Yes prevents the Classroom app from remotely viewing the screen on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the Apple Classroom app to view the screen.
To use this setting, set the Block screenshots and screen recording setting to Not configured.
This feature applies to:
- iOS 9.3 - iOS 12.x: Requires supervised devices
- iOS 13.0 and newer: Doesn't require supervised devices
- iPadOS 13.0 and newer: Devices must be enrolled using Device Enrollment or Automated Device Enrollment (ADE)
Allow Classroom app to perform AirPlay and view screen without prompting: Yes lets teachers silently observe students' iOS/iPadOS screens using the Classroom app without the students knowing. Student devices enrolled in a class using the Classroom app automatically give permission to that course's teacher. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent this feature.
To use this setting, set the Block screenshots and screen recording setting to Not configured.
Block modification of account settings: Yes prevents users from updating device-specific settings from the iOS/iPadOS settings app. For example, users can't create new device accounts, or change the user name or password. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.
This feature also applies to settings in the iOS/iPadOS settings app, such as Mail, Contacts, Calendar, Twitter, and more. This feature doesn't apply to apps with account settings that aren't configurable in the iOS/iPadOS settings app, such as the Microsoft Outlook app.
Block Screen time: Yes prevents users from setting their own restrictions in Screen Time (device settings). When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure device restrictions (such as parental controls or content, and privacy restrictions) on devices.
This setting was renamed from Enabling restrictions in the device settings. Impact of this change:
- iOS 11.4.1 and older: Yes prevents users from setting their own restrictions in the device settings. The behavior is the same; and there are no changes for users.
- iOS 12.0 and newer: Yes prevents users from setting their own Screen Time in the device settings (Settings > General > Screen Time), including content and privacy restrictions. Devices upgraded to iOS 12.0 won't see the restrictions tab in the device settings anymore (Settings > General > Device Management > Management Profile > Restrictions). These settings are in Screen Time.
Block use of erase all content and settings: Yes prevents using the erase all content and settings option on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might give users access to these settings.
Block modification of device name: Yes prevents changing the device name locally. When set to Yes, you can remotely rename a device with a remote device action. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the name of devices.
Block modification of notifications settings: Yes prevents changing the notification settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the device notification settings.
Block modification of Wallpaper: Yes prevents the wallpaper from being changed. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the wallpaper on devices.
Block configuration profile changes: Yes prevents configuration profile changes on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to install configuration profiles.
Allow activation Lock: Yes enables Activation Lock on supervised iOS/iPadOS devices. Activation Lock makes it harder for a lost or stolen device to be reactivated. When set to Not configured (default), Intune doesn't change or update this setting.
Block removing apps: Yes prevents removing apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to remove apps from devices.
Allow USB accessories while device is locked: Yes lets USB accessories exchange data with devices that are locked for over an hour. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not update USB Restricted mode on devices, and USB accessories are blocked from transferring data from devices if locked for over an hour.
This feature applies to:
- iOS/iPadOS 11.4.1 and newer
Force automatic date and time: Yes forces supervised devices to set the Date & Time automatically. The device's time zone is updated when the device has cellular connections or has Wi-Fi with location services enabled. When set to Not configured (default), Intune doesn't change or update this setting.
Require teacher permission to leave Classroom app unmanaged classes: Yes forces students enrolled in an unmanaged course using the Classroom app to request permission from the teacher to leave the course. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not force the student to ask for permission.
This feature applies to:
- iOS 11.3 and newer
- iPadOS 13.0 and newer
Allow Classroom to lock to an app and lock the device without prompting: Yes allows teacher to lock apps or lock devices using the Classroom app without prompting the student. Locking apps means devices can only access teacher specified apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent teachers from locking apps or devices using the Classroom app without prompting the student.
This feature applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Allow students to automatically join Classroom classes without prompting: Yes automatically allows students to join a class that's in the Classroom app without prompting the teacher. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prompt the teacher that students want to join a class that's in the Classroom app.
This feature applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Block VPN creation: Yes prevents users from creating VPN configuration settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users create VPNs on devices.
Block modification of eSIM settings: Yes prevents removing or adding a cellular plan to the eSIM on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change these settings.
This feature applies to:
- iOS 12.1 and newer
- iPadOS 13.0 and newer
Defer software updates: Enable allows you to delay when software updates are shown on devices, from 1-90 days. This setting doesn't control when updates are or aren't installed.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show software updates on devices as Apple releases them. For example, if an iOS/iPadOS update gets released by Apple on a specific date, then that update naturally shows up on devices around the release date.
Delay visibility of software updates: Enter a value from 1-90 days. When the delay expires, users get notified to update to the earliest OS version available when the delay is triggered. Don't set this value to zero (
0
) days.For example, if iOS 12.a is available on January 1, and Delay visibility is set to 5 days, then iOS 12.a isn't shown as an available update on user devices. On the sixth day following the release, that update is available, and users can install it.
This feature applies to:
- iOS 11.3 and newer
- iPadOS 13.0 and newer
Keyboard and Dictionary
Settings apply to: Automated device enrollment (supervised)
Block word definition lookup: Yes prevents highlighting a word, and then looking up its definition. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the definition lookup feature.
Block predictive keyboards: Yes prevents using predictive keyboards to suggest words users might want. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.
Block auto-correction: Yes prevents using autocorrection. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to automatically correct misspelled words.
Block spell-check: Yes prevents spell checker. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using spellchecker.
Block keyboard shortcuts: Yes stops users from using keyboard shortcuts. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using keyboard shortcuts on devices.
Block dictation: Yes stops users from using voice input to enter text. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use dictation input.
Block QuickPath: Yes prevents users from using QuickPath. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use QuickPath, which allows a continuous input on the device's keyboard. Users can type by swiping across the keys to create words.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Kiosk
App Lock (opens Apple's web site) is referred to as Kiosk mode in Intune.
Settings apply to: Automated device enrollment (supervised)
App to run in kiosk mode: Select the type of apps you want to run in kiosk mode. Your options:
- Not configured (default): Intune doesn't change or update this setting. By default, the OS might not apply kiosk settings. The device doesn't run in kiosk-mode.
- Store App: Enter the URL to an app in the iTunes App store.
- Managed App: Select an app you previously added to Intune.
- Built-In App: Enter the bundle ID of the built-in app. To get the bundle ID of an app added to Intune, you can use the Intune admin center.
Require Assistive touch: Yes requires the Assistive Touch accessibility setting be on devices. This feature helps users with on-screen gestures that might be difficult for them. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.
Require invert colors: Yes requires the Invert Colors accessibility setting so users with visual impairments can change the display screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.
Require mono audio: Yes requires the Mono audio accessibility setting be on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.
Require Voice control: Yes enables voice control on devices, and allows users to fully control the OS using Siri commands. Users can't turn it off. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable voice control.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Tip
If you have LOB apps available for your organization, and they're not Voice Control ready on day 0 when iOS 13.0 releases, then we recommend you leave this setting as Not configured.
Require VoiceOver: Yes requires the VoiceOver accessibility setting to read text on the screen out loud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.
Require zoom: Yes requires the zoom setting so users can touch to zoom in on the screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not run or enable this feature in kiosk mode.
Block auto lock: Yes prevents automatic locking of devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.
Block ringer switch: Yes disables the ringer (mute) switch on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.
Block screen rotation: Yes prevents changing the screen orientation when users rotate the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.
Block screen sleep button: Yes disables the screen sleep wake button on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow this feature.
Block touch: Yes disables the touchscreen on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use the touchscreen.
Block volume buttons: Yes prevents using the volume buttons on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow the volume buttons.
Allow Assistive touch control: Yes lets users use the assistive touch function. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.
Allow invert colors control: Yes inverts color changes to let users adjust the invert colors function. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.
Speak on selected text: Yes allows the Speak Selection accessibility settings be on devices. This feature reads text out loud that users select. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.
Allow Voice Control: Yes allows users to change the state of voice control on their devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might block users from changing the state of voice control on their devices.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Allow VoiceOver control: Yes allows voiceover changes to let users update the VoiceOver function, such as how fast on-screen text is read out loud. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent voiceover changes.
Allow zoom control: Yes allows zoom changes by users. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent zoom changes.
Note
Before you can configure an iOS/iPadOS device for kiosk mode, you must use the Apple Configurator tool or the Apple Device Enrollment Program to put devices into supervised mode. See Apple's guide on using the Apple Configurator tool. If the iOS/iPadOS app you enter is installed after you assign the profile, then the device doesn't enter kiosk mode until the device is restarted.
Locked Screen Experience
Settings apply to: All enrollment types
- Block Control Center access in lock screen: Yes prevents access to the Control Center app while device is locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the Control Center app when devices are locked.
- Block Notifications Center access in lock screen: Yes prevents access to notifications when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to notifications without unlocking devices.
- Block Today view in lock screen: Yes prevents access to the Today view when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to see the Today view when devices are locked.
Settings apply to: Device enrollment, Automated device enrollment (supervised)
- Block Wallet notifications in lock screen: Yes prevents access to the Wallet app when devices are locked. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the Wallet app while devices are locked.
Password
Settings apply to: All enrollment types
- Require password: Yes requires users to enter a password to access devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to access devices without entering a password.
Settings apply to: Device enrollment, Automated device enrollment (supervised)
Important
On user-enrolled devices, if you configure any password setting, then the Simple passwords settings is automatically set to Yes, and a 6 digit PIN is enforced.
For example, you configure the Password expiration setting, and push this policy to user-enrolled devices. On the devices, the following happens:
- The Password expiration setting is ignored.
- Simple passwords, such as
1111
or1234
, aren't allowed. - A 6 digit pin is enforced.
Block simple passwords: Yes blocks simple passwords, and requires more complex passwords. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow simple passwords, such as
0000
and1234
.Required password type: Enter the required password complexity level your organization requires. Your options:
- Device default
- Numeric: Can be alphabetic characters, such as abcdef, and numeric characters, such as 123456789.
- Alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters.
Note
Selecting alphanumeric can impact a paired Apple Watch. For more information, see Set passcode restrictions for an Apple Watch (opens Apple's web site).
Number of non-alphanumeric characters in password: Enter the number of symbol characters, such as
#
or@
, that must be included in the password, from 1-4. When set to Not configured (default), Intune doesn't change or update this setting.Minimum password length: Enter the minimum length the password must have, from 4-16 characters. On user enrolled devices, enter a length between 4 and 6 characters.
Note
For devices that are user enrolled, users can set a PIN greater than 6 digits. But, no more than 6 digits are enforced on devices. For example, an administrator sets the minimum length to
8
. On user-enrolled devices, users are only required to set a 6 digit PIN. Intune doesn't force a PIN greater than 6 digits on user-enrolled devices.Number of sign-in failures before wiping device: Enter the number of failed sign-ins before the device is wiped, from 2-11. It's not recommended to set this value to
2
or3
. It's common to enter the wrong password. Wiping the device after two or three incorrect password attempts happens often. It's recommended to set this value to at least4
.iOS/iPadOS has built-in security that can impact this setting. For example, iOS/iPadOS may delay triggering the policy depending on the number of sign-in failures. It may also consider repeatedly entering the same passcode as one attempt. Apple's iOS/iPadOS security guide (opens Apple's web site) is a good resource, and provides more specific details on passcodes.
Maximum minutes after screen lock before password is required1: Enter how long devices stay idle before users must reenter their password. If the time you enter is longer than what's currently set on the device, then the device ignores the time you enter.
This feature applies to:
- iOS 8.0+
- iPadOS 13.0+
Maximum minutes of inactivity until screen locks1: Enter the maximum number of minutes of inactivity allowed on devices until the screen locks.
iOS/iPadOS options:
- Not configured (Default): Intune doesn't change or update this setting.
- Immediately: Screen locks after 30 seconds of inactivity.
- 1: Screen locks after 1 minute of inactivity.
- 2: Screen locks after 2 minutes of inactivity.
- 3: Screen locks after 3 minutes of inactivity.
- 4: Screen locks after 4 minutes of inactivity.
- 5: Screen locks after 5 minutes of inactivity.
iPadOS options:
- Not configured (Default): Intune doesn't change or update this setting.
- Immediately: Screen locks after 2 minutes of inactivity.
- 2: Screen locks after 2 minutes of inactivity.
- 5: Screen locks after 5 minutes of inactivity.
- 10: Screen locks after 10 minutes of inactivity.
- 15: Screen locks after 15 minutes of inactivity.
If a value doesn't apply to iOS and iPadOS, then Apple uses the closest lowest value. For example, if you enter
4
minutes, then iPadOS devices use2
minutes. If you enter10
minutes, then iOS devices use5
minutes. This behavior is an Apple limitation.Note
The Intune UI for this setting doesn't separate the iOS and iPadOS supported values. The UI might be updated in a future release.
Password expiration (days): Enter the number of days before the device password must be changed, from 1-730.
Prevent reuse of previous passwords: Restrict users from creating previous passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter 5 so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.
Block Touch ID and Face ID unlock: Yes prevents using a fingerprint or face to unlock devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock devices using biometrics.
Setting to Yes also prevents using FaceID authentication to unlock devices.
Face ID applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Settings apply to: Automated device enrollment (supervised)
Block passcode modification: Yes stops the passcode from being changed, added, or removed. After blocking this feature, changes to passcode restrictions are ignored on supervised devices. This setting is ignored on Shared iPads. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passcodes to be added, changed, or removed.
Block modification of Touch ID fingerprints and Face ID faces: Yes stops users from changing, adding, or removing TouchID fingerprints and Face ID. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to update the TouchID fingerprints and Face ID on devices.
Blocking this setting also stops users from changing, adding, or removing FaceID authentication.
Face ID applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Block password AutoFill: Yes prevents using the AutoFill Passwords feature. Choosing Yes also has the following impact:
- Users aren't prompted to use a saved password in Safari or in any apps.
- Automatic Strong Passwords are disabled, and strong passwords aren't suggested to users.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these features.
Block password proximity requests: Yes prevents devices from requesting passwords from nearby devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow these password requests.
Block password sharing: Yes prevents sharing passwords between devices using AirDrop. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow passwords to be shared.
Require Touch ID or Face ID authentication for AutoFill of password or credit card information: Yes forces users to authenticate using TouchID or FaceID before passwords or credit card information can be auto filled in Safari and other apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to control this feature in the device settings.
This feature applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
1 When you configure the Maximum minutes of inactivity until screen locks and Maximum minutes after screen lock before password is required settings, they're applied in sequence. For example, if you set the value for both settings to 5 minutes, then the screen turns off automatically after five minutes, and devices are locked after another five minutes. However, if users turn off the screen manually, then the second setting is immediately applied. In the same example, after users turn off the screen, the device locks five minutes later.
Restricted apps
Settings apply to: Device enrollment and Automated device enrollment (supervised)
Type of restricted apps list: Create a list of apps that users aren't allowed to install or use. Your options:
- Not configured (default): Intune doesn't change or update this setting. By default, the OS might allow access to apps you assign, and built-in apps.
- Prohibited apps: List the apps (not managed by Intune) that users aren't allowed to install and run. Users aren't prevented from installing a prohibited app. If a user installs an app from this list, then the device is reported in the Devices with restricted apps report (Intune admin center > Devices > Monitor > Devices with restricted apps).
- Approved apps: List the apps that users are allowed to install. To stay compliant, users must not install other apps. Apps that are managed by Intune are automatically allowed, including the Company Portal app. Users aren't prevented from installing an app that isn't on the approved list. But if they do, it's reported in Intune.
Note
When there's a restricted app on the device, this setting reports as 'Not compliant'.
To add apps to these lists, you can:
Enter the iTunes App store URL of the app you want. For example, to add the Microsoft Work Folders app, enter
https://itunes.apple.com/us/app/work-folders/id950878067?mt=8
orhttps://apps.apple.com/us/app/work-folders/id950878067?mt=8
.To find the URL of an app, open the iTunes App Store, and search for the app. For example, search for
Microsoft Remote Desktop
orMicrosoft Word
. Select the app, and copy the URL.You can also use iTunes to find the app, and then use the Copy Link task to get the app URL.
Import a CSV file with details about the app, including the URL. Use the
<app url>, <app name>, <app publisher>
format. Or, Export an existing list that includes the restricted apps list in the same format.
Important
Device profiles that use the restricted app settings must be assigned to user groups, not device groups.
Shared iPad
This feature applies to:
- iPadOS 13.4 and newer
- Shared iPad
Settings apply to: Automated device enrollment (supervised)
Block Shared iPad temporary sessions: Temporary sessions allow users to sign in as Guest, and users aren't required to enter a Managed Apple ID or password.
When set to Yes:
- Shared iPad users can't use temporary sessions.
- Users must sign in to the device with their Managed Apple ID and password.
- The Guest account option isn't shown on the lock screen on the devices.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS allows a Shared iPad user to sign in to the device with the Guest account. When the user signs out, none of the user's data is saved or synced to iCloud.
Show or hide apps
This feature applies to:
- iOS 9.3 and newer
- iPadOS 13.0 and newer
Settings apply to: Automated device enrollment (supervised)
Type of apps list: Create a list of apps to show or hide. You can show or hide built-in apps and line-of-business apps. Apple's web site has a list of built-in Apple apps. Your options:
Not configured (default): Intune doesn't change or update this setting.
Hidden apps: Enter a list of apps that are hidden from users. Users can't view, or open these apps.
Apple prevents hiding some native apps. For example, you can't hide the Settings app on the device. Delete built-in Apple apps lists the apps that can be hidden.
Visible apps: Enter a list of apps that users can view and launch. No other apps can be viewed or launched.
App URL: Enter the store app URL of the app you want to show or hide. For example:
To add the Microsoft Work Folders app, enter
https://itunes.apple.com/us/app/work-folders/id950878067?mt=8
orhttps://apps.apple.com/us/app/work-folders/id950878067?mt=8
.To add the Microsoft Word app, enter
https://itunes.apple.com/de/app/microsoft-word/id586447913
orhttps://apps.apple.com/de/app/microsoft-word/id586447913
.
To find the URL of an app, open the iTunes App Store, and search for the app. For example, search for
Microsoft Remote Desktop
orMicrosoft Word
. Select the app, and copy the URL.You can also use iTunes to find the app, and then use the Copy Link task to get the app URL.
App Bundle ID: Enter the app bundle ID of the app you want. You can show or hide built-in apps and line-of-business apps.
To get the app bundle ID:
- Apple's web site has a list of built-in Apple apps.
- For apps added to Intune, you can use the Intune admin center.
App name: Enter the app name of the app you want. You can show or hide built-in apps and line-of-business apps. Apple's web site has a list of built-in Apple apps.
Publisher: Enter the publisher of the app you want.
You can also:
Import a CSV file with details about the app, including the URL. Use the
<app url>, <app name>, <app publisher>
format. Or, Export to create a list of the restricted apps you added, in the same format.Tip
You can import a list of preinstalled Apple apps by downloading the Apple App BundleIDs CSV (opens a Microsoft GitHub site).
Wireless
Settings apply to: Device enrollment and Automated device enrollment (supervised)
Block data roaming: Yes prevents data roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow data roaming when the device is on a cellular network.
Important
This setting is treated as a remote device action. So, this setting isn't shown in the management profile on devices. Every time the data roaming status changes on the device, Data roaming is blocked by the Intune service. In Intune, if the reporting status shows a success, then know that it's working, even though the setting isn't shown in the management profile on the device.
Block global background fetch while roaming: Yes prevents using the global background fetch feature when roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to fetch data, such as email, when it's roaming on a cellular network.
Block voice dialing while device is locked: Yes prevents using the voice dialing feature on devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow voice dialing on devices.
Block voice roaming: Yes prevents voice roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow voice roaming when devices are on a cellular network.
Block personal Hotspot: Yes turns off the personal hotspot on devices with every device sync. This setting might not be compatible with some carriers. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might keep the personal hotspot configuration as the default set by users.
Important
This setting is treated as a remote device action. So, this setting isn't shown in the management profile on devices. Every time the personal hotspot status changes on the device, Personal Hotspot is blocked by the Intune service. In Intune, if the reporting status shows a success, then know that it's working, even though the setting isn't shown in the management profile on the device.
Cellular usage rules (managed apps only): Allow defines the data types that managed apps can use when on cellular networks. When set to Not configured (default), Intune doesn't change or update this setting. Your options:
- Block use of cellular data: Choose the apps that can't use cellular data. Your options:
- Not configured: Intune doesn't change or update this setting.
- All managed apps
- Choose specific apps: Add the app bundle ID, app name, and publisher.
- Block use of cellular data when roaming: Choose the apps that can't use cellular data when roaming. Your options:
- Not configured: Intune doesn't change or update this setting.
- All managed apps
- Choose specific apps: Add the app bundle ID, app name, and publisher.
- Block use of cellular data: Choose the apps that can't use cellular data. Your options:
Settings apply to: Automated device enrollment (supervised)
Block changes to app cellular data usage settings: Yes prevents changes to the app cellular data usage settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to control which apps are allowed to use cellular data.
Block changes to cellular plan settings: Yes prevents changing any settings in the cellular plan. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to make changes.
This feature applies to:
- iOS 11.0 and newer
- iPadOS 13.0 and newer
Block modification of personal hotspot: Yes prevents changing the personal hotspot setting. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to enable or disable their personal hotspot.
If you set this setting and the Block personal Hotspot setting to Yes, then the personal hotspot is turned off.
This feature applies to:
- iOS 12.2 and newer
- iPadOS 13.0 and newer
Require joining Wi-Fi networks only using configuration profiles: Yes forces devices to use only Wi-Fi networks set up through Intune configuration profiles. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to use other Wi-Fi networks.
This setting is available for iOS/iPadOS 14.4 and older devices. On iOS/iPadOS 14.5 and newer devices, use the Require devices to use Wi-Fi networks set up via configuration profiles setting.
When set to Yes, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet.
If the device can't connect, then unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to Yes in a device restrictions profile, and assign the profile to the device.
This feature applies to:
- iOS/iPadOS 14.4 and older
Require Wi-Fi always on: Yes keeps Wi-Fi on in the Settings app. It can't be turned off in Settings or in the Control Center, even when the device is in airplane mode. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to turn on or turn off Wi-Fi.
Configuring this setting doesn't prevent users from selecting a Wi-Fi network.
This feature applies to:
- iOS 13.0 and newer
- iPadOS 13.0 and newer
Require devices to use Wi-Fi networks set up via configuration profiles: Yes forces the device to use Wi-Fi networks set up through configuration profiles. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow devices to use other Wi-Fi networks.
On iOS/iPadOS 14.5 and newer devices, use this setting. Don't use the Require joining Wi-Fi networks only using configuration profiles setting.
When set to Yes, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet.
If the device can't connect, then unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to Yes in a device restrictions profile, and assign the profile to the device.
Note
Require devices to use Wi-Fi networks set up via configuration profiles does not support Wi-Fi profiles deployed using custom profiles.
This feature applies to:
- iOS/iPadOS 14.5 and newer
Next steps
Assign the profile and monitor its status.
You can also restrict device features and settings on macOS devices.