Documentation Index
Fetch the complete documentation index at: https://docs.iru.com/llms.txt
Use this file to discover all available pages before exploring further.
This Library Item is available for macOS, Windows, and Android devices
As of January 8, 2025, App Blocking is configured using the App Blocking Library Item. This replaces the previous Application Blocking Parameter for macOS. Blueprints that already include the Parameter can still be edited, but the Parameter cannot be added to Blueprints that do not already have it.
Create an App Blocking Library Item
To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.
In the Library Item, blocking is split into Apple only settings, Windows only settings, and Android only settings sections, so you configure each platform in its own area.
Platform-Specific Configuration
- Mac
- Windows
- Android
Mac Settings
On macOS, App Blocking evaluates running applications against the identifiers you configure. When a launch matches a block rule, the app stops immediately and the user sees the block message (and optional Learn More link) from the Library Item.Expand Apple only settings, then open the nested Mac only settings section to configure process identifiers, match types, and optional block notifications.Configure blocking identifiers
Configure the processes, paths, developer IDs or bundle IDs you’d like to block.
Select match type
Select the desired Match type:
- Contains: Matches that contain the string.
- Exact: Matches the exact string provided.
- Regex: Matches based on regular expression using Swift regex syntax.

Regex is a very powerful tool that should be used with caution. Ensure that you test the implementation before broadly deploying it.
Customize block message (optional)
Optionally, customize the message, button title, and button URL users will be presented with when an application is blocked.
Blocking an Application from Device Record (macOS)
Adding an item to the block list can also be performed from an individual macOS device record. These updates can either be added to an existing App Blocking Library Item or you can create a new one.Open device record
Log in to Iru Endpoint and open a device record with the application you wish to block installed.
Block the application
Click the More (…) button to the right of the application and click “Block Application”.
Select Library Item
Select the Add rule to the following Library Item(s) drop-down and select a Library Item or type to create new one.
Configure Blueprint and identifiers
Select the desired Blueprint that should receive the Blocking Rule, and customize the identifiers as needed.
Example: Find a macOS App Bundle ID
To find the bundle ID of a macOS app, you can use the codesign command in Terminal, replacing/path/to/yourapp.app with the path to your desired application:User Experience
- On Mac, users attempting to open a blocked app will see the configured block message.
- If you configure a Learn More button, users can click it to be directed to your specified URL. You can read more about this in our User Experience with Application Blocking article.
Considerations
- Cross-platform: The App Blocking Library Item works across macOS, Windows, and Android. Choose which platforms to target under Install on.
- Import from Parameter: On macOS, you can import settings from the legacy Application Blocking Parameter in a Blueprint into the App Blocking Library Item.
- Multiple Library Items: You can assign more than one App Blocking Library Item to the same Blueprint; all block rules are combined.
- Assignment maps: You can add multiple App Blocking Library Items to an Assignment Map; all App Blocking rules are combined when evaluated.
- Parameter vs Library Item: When both exist in a Blueprint, Iru Endpoint uses the Library Item settings.
- Activity: Blocked actions are logged in both the device and Blueprint activity streams.
Best Practices
Test blocking rules
Test application blocking rules on a small group of devices before deploying to your entire fleet.
Document blocked applications
Maintain documentation of which applications are blocked and why for audit and troubleshooting purposes.
Troubleshooting
Application still launches after blocking
Application still launches after blocking
Possible causes:
- Block configuration not yet deployed to device
- Application not in the blocked applications list
- Device not enrolled or agent not installed Solutions:
- Verify the App Blocking Library Item is assigned to the device’s Blueprint
- Check that the application is correctly identified in the blocked list
- Ensure device is properly enrolled and agent is running
Block dialog not appearing on macOS
Block dialog not appearing on macOS
Possible causes:
- No custom message configured
- Agent not installed or not running
- Application not properly identified Solutions:
- Configure a custom message in the App Blocking Library Item
- Verify Iru Agent is installed and running on the device
- Check application identification in the blocked applications list
Windows AppLocker not working
Windows AppLocker not working
Possible causes:
- AppLocker service not running
- Group Policy not applied
- Device not domain-joined (for some features)
- Publisher, Path, or SHA256 file hash values do not match what AppLocker expects for the executable Solutions:
- Check that AppLocker service is running
- Verify Group Policy is applied correctly
- Ensure device meets AppLocker requirements
- For each block rule, confirm the Publisher, Path, or SHA256 file hash you configured matches the executable and what AppLocker expects; use Gather File Details for Block Rules to validate values
Android app not uninstalling
Android app not uninstalling
Possible causes:
- App not in personal profile
- Device not properly enrolled
- Package name incorrect Solutions:
- Verify the app is installed in the personal profile
- Check device enrollment status
- Confirm the package name is correct
Security Considerations
Regular Review
Regularly review blocked applications to ensure they remain appropriate for your security policies.
Exception Management
Establish a process for managing exceptions to blocking rules when business needs require it.
Audit Logging
Monitor blocking activity logs to detect potential security issues or policy violations.
User Education
Educate users about application blocking policies and approved alternatives.
