Skip to main content

Apple USB Policy

Updated today

The Apple USB Policy allows administrators to control USB functionality on managed macOS devices.
This policy is designed for organizations that need to restrict data transfer, prevent unauthorized USB peripherals, or enhance security by limiting external device access.

This is especially useful in environments with strict compliance requirements (e.g., SOC 2, HIPAA, PCI DSS, ISO 27001) or where USB usage must be tightly controlled.


Overview

USB ports provide convenient connectivity for peripherals and storage devices, but they can also introduce significant security risks, such as:

  • Data exfiltration via removable drives

  • Malware introduced via USB storage devices

  • Unauthorized hardware, such as keyboards or network adapters

The Apple USB Policy provides IT admins with a simple, centralized way to block USB functionality on macOS devices enrolled in Swif.ai.


Requirements

  • macOS 12.0 or later


Configurable Settings

Disable USB

Controls whether USB functionality is allowed on the device.

Setting

Behavior

True

USB functionality is disabled. New USB devices cannot connect, and data transfer is blocked.

False

USB functionality remains enabled.

Notes:

  • When USB is disabled, essential built-in components (keyboard, trackpad, internal devices) are not affected.

  • USB power remains functional (for charging), but data transfer is blocked.

  • Requires macOS 12.0+ for enforcement.


When to Use This Policy

Enable USB restrictions when you need to:

  • Prevent data loss or unauthorized copying

  • Restrict use of untrusted external devices

  • Comply with security frameworks requiring removable media controls

  • Harden security on devices in high-risk environments (labs, retail, kiosks, manufacturing, finance, healthcare, etc.)

  • Prevent users from connecting USB mass storage or rogue USB injection devices


How to Configure

  1. Open the Swif Admin Console

  2. Navigate to Policies β†’ Create New Policy

  3. Select Apple USB Policy

  4. Set Disable USB to True or False depending on your security requirements

  5. Click Continue

  6. Assign the policy to devices or device groups

  7. Save and apply

Devices will apply the new USB restrictions during their next MDM sync.


Best Practices

  • Combine USB blocking with Apple Security, Firewall, and Disk Encryption policies for comprehensive protection

  • Use device groups to apply USB restrictions based on department or security level

  • Test USB restrictions on a pilot group before organization-wide rollout

  • Ensure users understand that charging still works, but data transfer is restricted


Troubleshooting

USB still appears to work after enabling the policy

  • Ensure the device is on macOS 12+

  • Confirm the device has checked in with MDM recently

  • Rebooting the device may help apply restrictions immediately

Built-in keyboard/trackpad stops working

  • This should not happen; USB restrictions only apply to external peripherals

  • If observed, verify that the device is using genuine Apple hardware (especially on laptops)

Did this answer your question?