Preventing VPN Configuration for K12 Standard Users
Apple's security architecture for macOS security is letting down K12 technology managers. With the proliferation of all of the "free" VPN services and apps, Apple allows apps downloaded from the web to add VPN configurations to the System Preferences without administrative approval.
From a K12 perspective, there is no documentation or support for blocking this action for Standard (student users). Content filtering is required by CIPA https://www.fcc.gov/consumers/guides/childrens-internet-protection-act and most K12 institutions receive e-Rate funding that also requires us to enforce content filtering.
We can block searches for the VPN filesets to begin with, but there is no recourse once the app bundles are on the student device. Just by launching them, the profile is automatically added to System Preferences.
We've already looked through MDM solutions, and there is no clear solution with our MDM. We've tried to mark "require administrator to change network", and that has no effect on VPNs. MDMs and Chrome browser management profiles successfully prevent VPN extensions on the browser.
What's absolutely bizarre is Apple requires an admin to remove the system-wide VPN profiles. Why can't the reverse be enforced as policy? Why is there no option to prevent the profiles from being added in the first place?
Are there any other K12 institutions running into this problem. What efforts are being made to prevent these workarounds?
MacBook Air (M1, 2020)