Block websites on the Safari browser

The following Payload helps IT Admins to block access to a list of websites while allowing access to all the other websites on the Safari browser. This provides the users the freedom to use Safari like any other browser while restricting access to potentially harmful websites.

  1. Copy the contents directly from below and add it in Custom Settings in the Device Profile or click here to download the file and import it in the Device Profile.
    <?xml version="1.0" encoding="UTF-8"?>
    <plist version="1.0">
    <dict>
    <key>PayloadContent</key>
    <array>
    <dict>
    <key>AutoFilterEnabled</key>
    <true/>
    <key>DenyListURLs</key>
    <array>
    <string>https://www.example.com</string>
    <string>https://www.example.com</string>
    </array>
    <key>FilterBrowsers</key>
    <true/>
    <key>FilterSockets</key>
    <true/>
    <key>FilterType</key>
    <string>BuiltIn</string>
    <key>PayloadDisplayName</key>
    <string>DenyURL</string>
    <key>PayloadIdentifier</key>
    <string>com.example.mywebcontentfilterpayload</string>
    <key>PayloadType</key>
    <string>com.apple.webcontent-filter</string>
    <key>PayloadUUID</key>
    <string>fb5d598f-0a96-4b77-9702-9edfc3417601</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </array>
    <key>PayloadDisplayName</key>
    <string>custom-configuration</string>
    <key>PayloadIdentifier</key>
    <string>PAYLOAD IDENTIFIER</string>
    <key>PayloadType</key>
    <string>Configuration</string>
    <key>PayloadUUID</key>
    <string>45A58F11-B3D4-4E9E-AD90-36C3C25A838B</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </plist>
  2. In this Payload, please change the string placeholders with the URLs that you would like to restrict. For example,
    <array>
    <string>https://www.youtube.com</string>
    <string>https://www.facebook.com</string>
    </array>
  3. Follow our guide on how to add the Custom Payload in the Device Profile & deploy it to devices.
Notes:
1. The Payload and its contents are sourced from various albeit authenticated Apple Developer communities and forums.
2. Please validate them on a test machine before deploying them on all your managed devices.
3. Scalefusion has tested these Payloads, however, Scalefusion will not be responsible for any loss of data or system malfunction that may arise due to the incorrect usage of these payloads.
If you need additional help or guidance, please don't hesitate to reach out to our Support team. You can contact them through our live web chat or by sending an email to support@scalefusion.com


How did we do?


Powered by HelpDocs (opens in a new tab)