Learn how to prevent users from changing DNS filtering settings on mobile devices. This guide covers Screen Time restrictions on iOS and multiple approaches on Android — from hiding the Settings app and using AppLockers to full MDM kiosk mode.
Screen Time is a powerful built-in feature on iOS that lets you restrict what users can do on the device.
Note: Make sure the Screen Time passcode is different from the device unlock passcode.
With Screen Time enabled, configure Content & Privacy Restrictions to prevent changes to the DNS configuration:
This gives you control over which settings and features can be modified on the device.
If you are using the CleanBrowsing app on iOS, prevent it from being deleted:
This prevents users from uninstalling the CleanBrowsing app or any other app on the device.
Note: Screen Time does not directly restrict access to the General Settings page, so users can still view Wi-Fi DNS settings. However, if you are using the CleanBrowsing app (which uses a VPN profile), preventing app deletion is the most effective approach.
The simplest first step is to hide the Settings app icon from the home screen. This won't fully disable Settings, but it removes easy access and is a good first layer of protection.
On Samsung devices:
On other Android devices: Most manufacturers offer similar functionality. Look for Home Screen Settings or App Visibility options in your device settings or launcher preferences.
Note: Hiding the app icon does not disable Settings entirely — it can still be accessed through the notification shade or other entry points. Combine this with an AppLocker (Step 5) for stronger protection.
An AppLocker lets you password-protect specific apps, including the Settings app itself. This prevents users from opening Settings to change DNS, Wi-Fi, or VPN configurations.
There are several AppLocker tools available on the Google Play Store. One option is AppLocker Pro, which lets you lock specific apps behind a PIN or pattern:
When choosing an AppLocker, look for one that:
Tip: Have another person set the AppLocker passcode so you aren't tempted to bypass it yourself. Most AppLocker tools also let you lock the Google Play Store to prevent installation of VPN or browser apps that could circumvent filtering.
Even with Settings locked, users can bypass DNS filtering by installing VPN apps or alternative browsers. Lock down app installation as well:
If you are using the CleanBrowsing app, also make sure you have set the in-app passcode (see Android setup guide).
Note: Quick-settings tiles in the notification shade (Wi-Fi, Bluetooth, Airplane mode) can still be accessed without opening the full Settings app. An MDM solution (Step 7) is the only way to fully restrict those.
For the strongest Android lockdown, use a Mobile Device Manager (MDM) to put the device into Kiosk Mode. This is the only method that fully controls which apps are visible and prevents access to quick-settings toggles.
With an MDM in Kiosk Mode you can:
Consumer-friendly MDM options:
Note: To recover access after enabling Kiosk Mode, you will need to unassign or remove the MDM profile from the management console. Always make sure you have admin access to the MDM dashboard before locking down a device.
For the strongest overall protection, layer multiple approaches together:
Tip: For the strongest protection, combine device-level restrictions with router-level DNS filtering. This way, even if a user manages to change settings on their device, the network-wide filter will still apply when they are on your home network.
Configure CleanBrowsing DNS on iPhone and iPad.
Configure CleanBrowsing DNS on Android devices.
Fix common DNS filtering issues and verify your setup.