Home » Features >> Deploying Login Items
srch-icn
 

Deploying Login Items

Items that appear on the dock are called as login items. This document explains on the steps involved in adding/removing Login Items to computers. Administrators can choose  to configure the login items, which need to be mounted/removed when the user logs on. Applying this configuration will set the login items as default. When this configuration is applied, users will not be able to modify the login items.  

computer login items

Adding Login Items

The following steps explain on how to add Login Items to computers:

  1. Click Configurations -> Add Configurations -> Configurations -> Mac
  2. Select Login Items and choose Computer.
  3. Specify the name and description for the configuration and choose the operation type as Add.
  4. Choose the operation type as Add.
  5. Specify the path of the login items which need to be mounted during user logon. You can add more than one login item using the same configuration.
  6. Define the target.
  7. Specify retry options if required and deploy the configuration.

You have successfully created a configuration to add login items for the computers.

Removing Login Items

Removal of login items will work only if they are deployed using Endpoint Central MSP.

The following steps explain on how to add Login Items to Computers:

  1. Click Configurations -> Add Configurations -> Configurations -> Mac
  2. Select Login Items and choose Computer.
  3. Specify the name and description for the configuration.
  4. Choose the operation type as Remove. You can create a configuration to remove one or more login items, or remove all login items which were deployed using Endpoint Central MSP
  5. Define the target.
  6. Specify retry options if required and deploy the configuration.

You have successfully created a configuration to remove  the login items for the computers.