How can I block internal library sharing while still allowing outside access with iTunes 8.0?

Posted on 2008-11-18
Last Modified: 2012-05-05
I'm on a corporate Active directory network. We're willing to let some users install itunes, however we want to prevent them from sharing their music over the LAN.
 Allowing itunes internet access is acceptable as far as I'm concerned.
Essentially I just want to force the box to be unchecked under preferences, but no matter what I do it's able to be changed by a user.
 Ive used filemon and regmon to try to find locations that are being changed by this preference with no luck.
Question by:tshsc
    LVL 69

    Expert Comment

    Hi tshsc, I do believe they can share iTunes tracks as they are for personal use only.
    The libraries is the only part that can be shared but only with 5 users.
    Realistically there is no solution here, once you allow access and sharing of certain files it's impossible to monitor the files and who shares them after this fact.
    Probably the best work around is some kind of inhouse streaming radio server that transmits wirelessly to all clients/ I amaze myself actually found a ref to this idea after I wrote it.
    How iTunes lets you share

    These faq show how to share itunes take a look and see if you can use them in reverse.
    Sharing your iTunes library across computers
    iTunes: How to share music between different accounts on a single computer

    Some ideas for the time being maybe we can come up with something else if this is not suitable.
    Regards Merete
    LVL 2

    Accepted Solution

    Actually I was able to find the solution using parental controls. If you disable sharing through parental controls, only a local admin can change it.
     Apple has a guide out that instructs which registry entries need to be changed to turn this on.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Package creation on OS X uses the PackageMaker utility installed as part of the XCode development suite ( on the OSX Client CD).  Packages can be installed as part of the machine build process, or later using Apple Remote Desktop. They are generally…
    Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
    The viewer will learn how to download, install, and customize fonts inside Adobe Illustrator CS6. To install and use a font: Go to and download a premade font : Unzip it, and open it up by double-clicking: Press “Install This Font” in…
    Viewers will learn how to use LFOs to modulate the sound of their Sampler instruments. Click the Modulation tab in Sampler: Choose one (or more) of the three available LFOs, and click the respective button to turn it on: Select a waveform, an LF…

    794 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now