App lock device policy

The App lock device policy defines a list of apps that are either:

  • Allowed to run on a device.
  • Blocked from running on a device.

The exact way the policy works differs for each supported platform. For example, you cannot block multiple apps on an iOS device.

Likewise, for iOS devices, you can select only one iOS app per policy. This means that users are only able to use their device to run a single app. They cannot do any other activities on the device except for the options you specifically allow when the app lock policy is enforced.

In addition, iOS devices must be supervised to push App Lock policies.

Although the device policy works on most Android L and M devices, app lock does not function on Android N or later devices because Google deprecated the required API.

For managed Windows Desktops and Tablets, you can create an App Lock device policy that defines the list of blacklisted and whitelisted apps. You can allow or block executables, MSI installers, store apps, DLLs, and scripts.

To add or configure this policy, go to Configure > Device Policies. For more information, see Device policies.

iOS settings

Device Policies configuration screen

  • App bundle ID: In the list, click the app to which this policy applies or click Add new to add a new app to the list. If you select Add new, type the app name in the field that appears.
  • Options: For each option, the default is Off except for Disable touch screen, which defaults to On.
    • Disable touch screen
    • Disable device rotation sensing
    • Disable volume buttons
    • Disable ringer switch

      When Disable ringer switch is On, the ringer behavior depends on what position the switch was in when it was first disabled.

    • Disable sleep/wake button
    • Disable auto lock
    • Disable VoiceOver
    • Enable zoom
    • Enable invert colors
    • Enable AssistiveTouch
    • Enable speak selection
    • Enable mono audio
  • User Enabled Options: For each option, the default is Off.
    • Allow VoiceOver adjustment
    • Allow zoom adjustment
    • Allow invert colors adjustment
    • Allow AssitiveTouch adjustment

Android settings


You can’t block the Android Settings app by using the App Lock device policy.

Device Policies configuration screen

  • App Lock parameters
    • Lock message: Type a message that users see when they attempt to open a locked app.
    • Unlock password: Type the password to unlock the app.
    • Prevent uninstall: Select whether users are allowed to uninstall apps. The default is Off.
    • Lock screen: Select the image that appears on the device’s lock screen by clicking Browse and navigating to the file’s location.
    • Enforce: Click either Blacklist to create a list of apps that are not allowed to run on devices or click Whitelist to create a list of apps that are allowed to run on devices.
  • Apps: Click Add and then do the following:
    • App name: In the list, click the name of the app to add to the whitelist or blacklist, or click Add new to add a new app to the list of available apps.
    • If you select Add new, type the app name in the field that appears.
    • Click Save or Cancel.
    • Repeat these steps each app you want to add to the whitelist or blacklist.

Windows Desktop and Tablet settings

Prerequisites for App lock

  • In Windows, configure rules in the Local Security Policy editor on a Windows 10 Desktop running Windows 10 Enterprise or Pro.
  • Export the policy XML file. Citrix recommends that you create Default rules in Windows to avoid locking the default configuration or causing issues on devices.
  • Then, upload the XML file to Endpoint Management by using the App Lock device policy. For more information about creating rules, see this Microsoft article:

To configure and export the policy XML file from Windows


When configuring the policy XML file through the Windows policy editor, use Audit Only mode.

  1. On the Windows computer, start the Local Security Policy editor. Click Start, type local security policy and then click Local Security Policy.
  2. In the console tree, click Computer Configuration > Windows Settings > Security Settings and then expand Application Control Policies.
  3. Click AppLocker and then in the center pane, click Configure rule enforcement.
  4. Select Enforce rules. When you enable a rule, Enforce rules is the default.
  5. You can create Executable Rules, Windows Installer Rules, Script Rules, and Packaged App Rules. To do so, right-click the folder and then click Create New Rule.
  6. Right-click AppLocker, click Export Policy, and then save the XML file.

To import the policy XML file into Endpoint Management

Create an App Lock policy. Across from the App Lock policy file setting, click Browse and navigate to the XML file.

To stop applying an App Lock policy

After you deploy an App Lock policy in Endpoint Management: To stop applying that App Lock policy, create an empty XML file. Then, create another App Lock policy, upload the file, and deploy the policy. Devices that have an App Lock enabled are not affected. Devices receiving the policy for the first time do not have the App Lock policy in place.