Skip to main content

How to Configure iOS and iPadOS Device Restrictions [EARLY ACCESS]

Configure iOS & iPadOS device restrictions for security, app management, and network compliance.

Updated this week

Use iOS and iPadOS restriction policies to control how users interact with managed Apple devices. By applying these policies, you can manage general usage, network settings, app installations, and cloud access to ensure all devices remain secure and compliant with your organization's standards.

With SuperOps’ multi-tenancy feature, you can set up and manage specific access restrictions for each client.

You can apply restrictions across multiple categories, including:

  • General: Core system and feature access

  • Security: Authentication and data protection controls

  • Network: Connectivity and pairing management

  • Apps: App installation, browsing, and media usage

  • iCloud & Apple ID: Cloud sync and Apple Intelligence controls

These restrictions work together to help you protect company data, prevent unauthorized access, and ensure devices operate according to your organization’s policies.

How to Configure iOS and iPadOS Restrictions

  1. Navigate to Settings and select Policy Management from the Asset Management section. You will see a list of available hierarchical policies.

    Screenshot 0

  2. Click on Apple iOS Device policies from the list to open the configuration page.

    Note: You can filter configurations based on Supervised and Unsupervised devices. Unsupervised devices offer limited configuration options, as restricted by Apple.

  3. General Settings

    Control access to key system features and personalization options.

    • Restrict account modifications and device name changes.

    • Disable features like AirDrop, Camera, FaceTime, Handoff, or Siri.

    • Limit personalization options such as keyboard features and screen time controls.

    • Manage content filters, Apple Watch pairing, and Bluetooth access for consistent usage.

    • In the General Restrictions tab, click Add General Configuration to toggle desired settings.

  4. Security

    Enforce authentication, access control, and data protection measures.

    • Restrict Touch ID or Face ID usage and passcode changes.

    • Disable password autofill and require encrypted backups.

    • Prevent Wi-Fi password sharing and Auto Unlock from paired devices.

    • Maintain compliance with organizational security policies.

    • Go to the Security category and click Add Security Configuration to apply settings.

  5. Network

    Control device connectivity and pairing behavior.

    • Restrict cellular plan changes and enforce approved Wi-Fi networks.

    • Block untrusted certificates and host pairing with unauthorized systems.

    • Disable external drive access to reduce data exfiltration risk.

    • Enforce managed VPN use and prevent users from disabling Wi-Fi.

    • In the Network category, click Add Network Configuration to manage connectivity policies.

  6. Apps

    Manage how users install, remove, and interact with applications.

    • Disable App Store access, app installation or uninstallation, and in-app purchases.

    • Restrict alternative marketplace apps for better control over software sources.

    • Customize Safari settings by disabling private browsing, JavaScript, or pop-ups.

    • Restrict services like iMessage, iTunes, Apple Music, and Podcasts.

    • Go to the Apps category and click Add Apps Configuration to set application policies.

  7. iCloud & Apple ID Settings

    Protect company data and prevent unauthorized syncing.

    • Disable iCloud Backup, Document Sync, Keychain, and Photo Library.

    • Restrict Managed Apps from using iCloud services.

    • Disable Apple Intelligence features such as summarization, visual intelligence, and generative tools.

    • Prevent users from signing in to external AI or intelligence services.

    • In the iCloud and Apple ID Settings category, click Add iCloud and Apple ID Settings Configuration to apply restrictions.

Did this answer your question?