This article covers the user experience on macOS, Windows, and Android devices
If you reached this page through a notification, it is because your organization blocked the app you attempted to open. Contact your Iru Endpoint Administrator or IT department for more details. Depending on how the block is configured, the notification window may vary in content.
Platform-Specific Experiences
- macOS
- Windows
- Android
Application Blocking Experience
1
User Attempts to Open App
A user attempts to open an application that is blocked.
2
Application Closes
The application is immediately closed.
3
Block Dialog Appears
Iru Endpoint displays a block dialog with:
- The configured Message
- Optionally, a Button Title (e.g. Learn More)
- Optionally, the Button URL, which opens in the user’s default browser if clicked
4
User Clicks Button
If the user clicks the Learn More (or equivalent) button, the browser opens to the URL configured in the Library Item.
If no button title or URL is configured, the button will not appear in the dialog.
Example Block Dialog
The macOS block dialog provides clear messaging to users about why an application has been blocked and includes options for additional information if configured by the administrator.Configuration Options
You can configure application blocking through the Application Blocking Library Item with the following options:- Blocked Applications: Specify which applications to block
- Custom Messages: Configure user-facing messages (macOS only)
- Button Configuration: Add custom buttons with URLs (macOS only)
- Enforcement Level: Choose between different blocking methods
Best Practices
1
Test blocking policies
Before deploying application blocking policies to production devices, test them on designated test devices to ensure they work as expected.
2
Communicate with users
Inform users about application blocking policies through your organization’s communication channels to set proper expectations.
3
Provide alternatives
When blocking applications, consider providing approved alternatives or explaining why certain applications are restricted.
4
Monitor and adjust
Regularly review blocked applications and user feedback to ensure policies remain appropriate and effective.