Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.iru.com/llms.txt

Use this file to discover all available pages before exploring further.

This Library Item is available for macOS, Windows, and Android devices
The App Blocking Library Item lets you block applications from running on macOS, Windows, and Android devices. When a user attempts to open a blocked application, it will be prevented from launching. On macOS, the app will immediately close and display a block message. On Windows, blocking is powered by AppLocker. With Android work profile enrollment, App Blocking applies to the personal profile only: Android removes blocked package names from that profile if they are installed. The managed work profile is handled separately—deploy and update work apps through managed Google Play, not through App Blocking. To block apps on iOS or iPadOS devices, use a Restrictions Library Item instead.
As of January 8, 2025, App Blocking is configured using the App Blocking Library Item. This replaces the previous Application Blocking Parameter for macOS. Blueprints that already include the Parameter can still be edited, but the Parameter cannot be added to Blueprints that do not already have it.

Create an App Blocking Library Item

To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.
1

Navigate to Library

Navigate to the Library and select Add Library Item.
2

Select App Blocking

Search for and select App Blocking.
3

Name the Library Item

Give the Library Item a Name.
4

Select Platforms

Under Install on, select one or more platforms (Apple, Windows, Android).
5

Assign to Blueprints

Assign the Library Item to one or more Blueprints.
Iru Endpoint web application showing App Blocking Library Item Install on and Blueprint assignment
In the Library Item, blocking is split into Apple only settings, Windows only settings, and Android only settings sections, so you configure each platform in its own area.

Platform-Specific Configuration

Mac Settings

On macOS, App Blocking evaluates running applications against the identifiers you configure. When a launch matches a block rule, the app stops immediately and the user sees the block message (and optional Learn More link) from the Library Item.Expand Apple only settings, then open the nested Mac only settings section to configure process identifiers, match types, and optional block notifications.
1

Configure blocking identifiers

Configure the processes, paths, developer IDs or bundle IDs you’d like to block.
2

Select match type

Select the desired Match type:
  • Contains: Matches that contain the string.
  • Exact: Matches the exact string provided.
  • Regex: Matches based on regular expression using Swift regex syntax.
Iru Endpoint web application showing App Blocking Apple only settings with Mac only settings expanded, block rules, and notification fields
3
Regex is a very powerful tool that should be used with caution. Ensure that you test the implementation before broadly deploying it.
4

Customize block message (optional)

Optionally, customize the message, button title, and button URL users will be presented with when an application is blocked.
5

Save configuration

Click Save.

Blocking an Application from Device Record (macOS)

Adding an item to the block list can also be performed from an individual macOS device record. These updates can either be added to an existing App Blocking Library Item or you can create a new one.
1

Open device record

Log in to Iru Endpoint and open a device record with the application you wish to block installed.
2

Navigate to Apps tab

Click the Apps tab and locate the application in question.
3

Block the application

Click the More (…) button to the right of the application and click “Block Application”.
4

Select Library Item

Select the Add rule to the following Library Item(s) drop-down and select a Library Item or type to create new one.
5

Configure Blueprint and identifiers

Select the desired Blueprint that should receive the Blocking Rule, and customize the identifiers as needed.
6

Create blocking rule

Click Create.

Example: Find a macOS App Bundle ID

To find the bundle ID of a macOS app, you can use the codesign command in Terminal, replacing /path/to/yourapp.app with the path to your desired application:
codesign -dr - /path/to/yourapp.app
The output of this command will include information about the app, including the Team ID, Bundle ID, and Code Requirement which can be helpful when creating PPPC Profiles. The Bundle ID will usually be at the end of the output, after the word identifier. In the example output below, the Bundle ID for Keynote is com.apple.iWork.Keynote.
identifier=com.apple.iWork.Keynote

User Experience

  • On Mac, users attempting to open a blocked app will see the configured block message.
  • If you configure a Learn More button, users can click it to be directed to your specified URL. You can read more about this in our User Experience with Application Blocking article.

Considerations

  • Cross-platform: The App Blocking Library Item works across macOS, Windows, and Android. Choose which platforms to target under Install on.
  • Import from Parameter: On macOS, you can import settings from the legacy Application Blocking Parameter in a Blueprint into the App Blocking Library Item.
  • Multiple Library Items: You can assign more than one App Blocking Library Item to the same Blueprint; all block rules are combined.
  • Assignment maps: You can add multiple App Blocking Library Items to an Assignment Map; all App Blocking rules are combined when evaluated.
  • Parameter vs Library Item: When both exist in a Blueprint, Iru Endpoint uses the Library Item settings.
  • Activity: Blocked actions are logged in both the device and Blueprint activity streams.

Best Practices

1

Test blocking rules

Test application blocking rules on a small group of devices before deploying to your entire fleet.
2

Document blocked applications

Maintain documentation of which applications are blocked and why for audit and troubleshooting purposes.
3

Communicate with users

Inform users about application blocking policies to set proper expectations.
4

Monitor blocking activity

Regularly review blocking activity logs to ensure policies are working as intended.

Troubleshooting

Possible causes:
  • Block configuration not yet deployed to device
  • Application not in the blocked applications list
  • Device not enrolled or agent not installed Solutions:
  • Verify the App Blocking Library Item is assigned to the device’s Blueprint
  • Check that the application is correctly identified in the blocked list
  • Ensure device is properly enrolled and agent is running
Possible causes:
  • No custom message configured
  • Agent not installed or not running
  • Application not properly identified Solutions:
  • Configure a custom message in the App Blocking Library Item
  • Verify Iru Agent is installed and running on the device
  • Check application identification in the blocked applications list
Possible causes:
  • AppLocker service not running
  • Group Policy not applied
  • Device not domain-joined (for some features)
  • Publisher, Path, or SHA256 file hash values do not match what AppLocker expects for the executable Solutions:
  • Check that AppLocker service is running
  • Verify Group Policy is applied correctly
  • Ensure device meets AppLocker requirements
  • For each block rule, confirm the Publisher, Path, or SHA256 file hash you configured matches the executable and what AppLocker expects; use Gather File Details for Block Rules to validate values
Possible causes:
  • App not in personal profile
  • Device not properly enrolled
  • Package name incorrect Solutions:
  • Verify the app is installed in the personal profile
  • Check device enrollment status
  • Confirm the package name is correct

Security Considerations

Regular Review

Regularly review blocked applications to ensure they remain appropriate for your security policies.

Exception Management

Establish a process for managing exceptions to blocking rules when business needs require it.

Audit Logging

Monitor blocking activity logs to detect potential security issues or policy violations.

User Education

Educate users about application blocking policies and approved alternatives.