Skip to main content

Apple Application Block Policy

Updated this week

The Apple Application Block Policy allows administrators to block specific applications on macOS devices based on developer identity, application identifiers, file paths, names, or even window titles. This provides fine-grained control to prevent the use of unauthorized or risky software.

This policy supports BYOD macOS devices.


Requirements

  • Platform: macOS

  • Minimum version: macOS 10.7+


What This Policy Does

With the Apple Application Block Policy, you can:

  • Block applications from specific Apple developers

  • Block apps by bundle identifier

  • Block apps located in specific paths

  • Block apps based on name patterns

  • Block apps by detecting window titles (advanced use cases)

When a blocked application is launched, macOS will immediately prevent it from opening.


How to Create the Policy

Navigate to:

Device Management β†’ Policy β†’ Create New Policy β†’ Apple Application Block Policy

Basic Configuration

  • Policy Name
    A friendly name for the policy

  • Policy Description
    Description of what the policy blocks

  • Requirements
    macOS 10.7+


Policy Settings Explained

Team ID List

Blocks applications signed by specific Apple developer Team IDs.

  • Each Team ID represents a unique Apple developer account.

  • Any application signed by the specified developer will be blocked.

Example use case:
Block all software published by a known vendor.

πŸ’‘ You can find a Team ID using:

codesign -dv --verbose=4 /Applications/YourApp.app

Identifier List

Blocks applications using their bundle identifier.

Example:

com.spotify.client com.google.Chrome

This method is precise and recommended for blocking well-known applications.


Application Path List

Blocks applications located at specific file paths.

Example:

/Applications/Zoom.us.app /Applications/Utilities

⚠️ Blocking a directory path will block all applications inside that directory.


Application Name Contains

Blocks applications whose names contain a specific string.

Example:

Zoom Chrome

This is useful when application names vary by version.


Check App Window Titles

Blocks applications by detecting specific window titles.

This is an advanced option, useful when:

  • You need to block a specific feature or workflow

  • The application name or identifier is not sufficient

How to Find a Window Title

If you don’t know the window title:

  1. Run the application in verbose mode

  2. Capture logs when the window opens

Example:

/Applications/SwifAppManagement.app/Contents/MacOS/SwifAppManagement --verbose

In the logs, you will see entries like:

Window: Add Printer

Enter Add Printer into the Check App Window Titles field.
When the window opens, it will be automatically closed.


Best Practices

  • Prefer Identifier List or Team ID List for long-term reliability

  • Use Application Path List carefully to avoid over-blocking

  • Use Window Title blocking only for advanced scenarios

  • Test policies on a small device group before wide deployment


Common Use Cases

  • Block unapproved browsers or file-sharing tools

  • Prevent installation of personal productivity apps on BYOD devices

  • Restrict system utilities like Terminal or System Settings

  • Enforce software compliance policies


Notes

  • This policy only applies to macOS

  • The block is enforced immediately after policy sync

  • Multiple criteria can be combined for stronger enforcement


If you need help identifying application identifiers, Team IDs, or window titles, contact Swif Support or use Live Terminal for inspection.

Did this answer your question?