Category filter

How to blocklist apps on ChromeOS devices?

This document provides a step-by-step guide for IT administrators to blocklist apps on ChromeOS devices.

In an organization, maintaining control over the applications installed on users’ devices is essential. These applications become part of the software inventory and may have access to various organizational resources. In some cases, malicious applications can pose security risks, cause disruptions, or simply not align with company policies. Blocklisting helps IT teams maintain control over the application inventory by removing such unnecessary or harmful applications.

By using Hexnode’s Blocklist policy, IT administrators can easily manage and enforce app restrictions across all ChromeOS devices in their organization, ensuring compliance and maintaining a secure digital workspace.

Note:


The Blocklist feature is supported only on devices running ChromeOS 50 or later.

Blocklist apps on ChromeOS devices

To blocklist apps on ChromeOS devices,

  1. Log in to your Hexnode UEM portal.
  2. Navigate to Policies > New Policy. Provide the following details,
    1. Policy name– Assign a suitable name for the policy. This is a mandatory field.
    2. Description– Provide a brief description of the policy.
  3. Select ChromeOS > App Management > Blocklist. Click on Configure.
  4. Click on +Add to specify the apps or app groups you want to blocklist.
  5. Once you have selected all the apps, click Done.

Associating the policy to Organizational Units (OUs)

Policies cannot be directly associated with ChromeOS devices; they can only be applied through Organizational Units (OUs). To associate a policy with ChromeOS devices,

  1. Navigate to Policy Targets > Domains/OUs.
  2. Click on +Add Domain/OUs. From the list, select the Google Workspace account integrated with Hexnode, indicated by the (Google) tag.
  3. The parent OU will be listed here and is indicated with a briefcase icon to differentiate it from domains.
  4. Click the dropdown next to the parent OU to view its child OUs. Select the required Organizational Units to which the target devices are assigned and click OK.
  5. Click Save to associate the policy to the devices under the selected Organization Units.
Note:


A policy assigned to a parent OU will automatically apply to all its child OUs.

What happens at the device end?

Once the policy is successfully associated, the blocklisted applications will be removed from the device and hidden from the Play Store preventing users from installing them.

  • Deploying and Managing Apps