Use iOS and iPadOS restriction policies to control how users interact with managed Apple devices. By applying these policies, you can manage general usage, network settings, app installations, and cloud access to ensure all devices remain secure and compliant with your organization's standards.
With SuperOps’ multi-tenancy feature, you can set up and manage specific access restrictions for each client.
You can apply restrictions across multiple categories, including:
General: Core system and feature access
Security: Authentication and data protection controls
Network: Connectivity and pairing management
Apps: App installation, browsing, and media usage
iCloud & Apple ID: Cloud sync and Apple Intelligence controls
These restrictions work together to help you protect company data, prevent unauthorized access, and ensure devices operate according to your organization’s policies.
How to Configure iOS and iPadOS Restrictions
Navigate to Settings and select Policy Management from the Asset Management section. You will see a list of available hierarchical policies.
Click on Apple iOS Device policies from the list to open the configuration page.
Note: You can filter configurations based on Supervised and Unsupervised devices. Unsupervised devices offer limited configuration options, as restricted by Apple.General Settings
Control access to key system features and personalization options.
Restrict account modifications and device name changes.
Disable features like AirDrop, Camera, FaceTime, Handoff, or Siri.
Limit personalization options such as keyboard features and screen time controls.
Manage content filters, Apple Watch pairing, and Bluetooth access for consistent usage.
In the General Restrictions tab, click Add General Configuration to toggle desired settings.
Security
Enforce authentication, access control, and data protection measures.
Restrict Touch ID or Face ID usage and passcode changes.
Disable password autofill and require encrypted backups.
Prevent Wi-Fi password sharing and Auto Unlock from paired devices.
Maintain compliance with organizational security policies.
Go to the Security category and click Add Security Configuration to apply settings.
Network
Control device connectivity and pairing behavior.
Restrict cellular plan changes and enforce approved Wi-Fi networks.
Block untrusted certificates and host pairing with unauthorized systems.
Disable external drive access to reduce data exfiltration risk.
Enforce managed VPN use and prevent users from disabling Wi-Fi.
In the Network category, click Add Network Configuration to manage connectivity policies.
Apps
Manage how users install, remove, and interact with applications.
Disable App Store access, app installation or uninstallation, and in-app purchases.
Restrict alternative marketplace apps for better control over software sources.
Customize Safari settings by disabling private browsing, JavaScript, or pop-ups.
Restrict services like iMessage, iTunes, Apple Music, and Podcasts.
Go to the Apps category and click Add Apps Configuration to set application policies.
iCloud & Apple ID Settings
Protect company data and prevent unauthorized syncing.
Disable iCloud Backup, Document Sync, Keychain, and Photo Library.
Restrict Managed Apps from using iCloud services.
Disable Apple Intelligence features such as summarization, visual intelligence, and generative tools.
Prevent users from signing in to external AI or intelligence services.
In the iCloud and Apple ID Settings category, click Add iCloud and Apple ID Settings Configuration to apply restrictions.







