Restricted software allows you to prevent users or groups of users from accessing certain applications. For instance, you might want to prevent all users from accessing a peer-to-peer file sharing application or restrict everyone except the IT staff from accessing common administrative utilities.
For each application that you want to restrict, you must create a restricted software record. This allows you to specify the users to which the restriction applies and control what happens when the application is opened by those users. For instance, you can kill the restricted process, delete the application, and even display a message to the user.
If there is an SMTP server set up in the JSS, you can enable email notifications for the restricted software record. This allows email notifications to be sent to JSS users each time a violation occurs. (For information on setting up an SMTP server and enabling email notifications for JSS user accounts, see Integrating with an SMTP Server and Email Notifications.)
Creating a Restricted Software Record
Log in to the JSS with a web browser.
Click Computers at the top of the page.
Click Restricted Software.
Click New .
Configure the restricted software record using the fields and options on the pane.
To enable email notifications, select the Send email notification on violation checkbox.
Click the Scope tab and configure the scope of the restricted software record.
For more information, see Scope.
The restriction is applied to computers in the scope the next time they check in with the JSS.
For related information, see the following section in this guide:
Viewing Restricted Software for a Computer
Find out how to view the restricted software for a computer.
For related information, see the following Knowledge Base article:
Finding the Name of Processes When Configuring Restricted Software
Learn how to find the exact name of the process you want create restricted software for.