Home » Login items for Mac computers
 

Deploying Login Items

Items that appear on the dock, are called as login items. This document will explain the steps involved in adding/removing "Login Items" to computers. Administrators can choose  to configure the login items, which need to be mounted/removed when the user logs on. Applying this configuration will set the login items as default. When this configuration is applied, users will not be able to modify the login items.  

Adding Login Items

The following steps will explain you on how to add "Login Items" to computers:

  1. From Configurations tab, navigate to Add Configurations -> Configuration -> Mac.
  2. Select Login Items and choose Computer
  3. Specify the name and description for the configuration
  4. Choose the operation type as "Add".
  5. Specify the path of the login items, which needs to be mounted during the user logon. You can add more than one login item using the same configuration.
  6. Define the target
  7. Specify retry options if required and deploy the configuration

You have successfully created a configuration to add login items for the computers.

Removing Login Items

Removal of login items, will work only if they are deployed using Endpoint Central.

The following steps will explain you on how to add "Login Items" to Computers:

  1. From Configurations tab, navigate to Add Configurations -> Configuration -> Mac.
  2. Select Login Items and choose Computer
  3. Specify the name and description for the configuration
  4. Choose the operation type as "Remove". You can create a configuration to remove one or more login items, or remove all login items which were deployed using Endpoint Central
  5. Define the target
  6. Specify retry options if required and deploy the configuration

You have successfully created a configuration to remove  the login items for the computers.