
When you're ready to proceed, create an iOS/iPadOS device restrictions configuration profile. For supervised devices, see iOS/iPadOS supervised device security configurations.For personal devices, see iOS/iPadOS personal device security configurations.The available levels and settings in each level vary by device type: The security configuration framework is organized into distinct configuration levels that provide guidance for personally owned and supervised devices, with each level building off the previous level. To better understand how to implement specific security configuration scenarios, see the security configuration framework guidance for iOS device restriction policies. When configuring device restriction policies, the broad range of settings enable you to tailor protection to your specific needs.

For more information on these settings, see Apple's mobile device management settings site (opens Apple's web site). These settings use Apple's restriction settings.
