How to Stop Installing Apps from Unknown Sources
Learn how to stop installing apps from unknown sources on Android and iOS devices with practical steps, safety best practices, and a home-friendly security routine.
By default, stop installing apps from unknown sources by restricting sideloading on your device. This means disabling per‑app installation permissions, enabling built‑in security checks, and using official app stores. You will also want to keep your OS up to date and review app permissions regularly to reduce risk. The result is safer browsing, fewer phishing attempts, and improved device integrity.
Why stopping unknown sources matters
Unknown sources refer to apps installed from places other than your device’s official app store. When you enable sideloading, you bypass the vetting process that screens for malware, repackaged software, and data-collection risks. For homeowners and DIY enthusiasts, the consequences can range from data exposure to outright malware that masquerades as a legitimate utility. According to Install Manual, safeguarding your family’s devices begins with treating unknown sources as a potential threat and limiting their use to situations where a trusted source is verified. On Android devices, sideloading can be temporarily acceptable for legitimate testing or corporate apps, but it should never become a default habit. On iPhones and iPads, options to install apps from unknown sources are restricted by design, which is a strong trade-off in favor of security, though it doesn’t remove all risk. Cybercriminals increasingly use fake app installers, phishing pages, and deceptive prompts to trick users into granting installations. Regularly reviewing which apps are permitted to install other apps, keeping your operating system updated, and enabling built-in verification are practical steps that significantly raise your protection level. This section lays the groundwork for a safer digital environment in a modern home. The practical goal is to help you understand how to stop install apps from unknown sources without compromising useful flexibility for legitimate tasks.
How platforms differ in handling app installation sources
Platforms implement unknown-sources controls differently. On Android, the risk is managed with per‑app approvals rather than a single global switch in newer OS versions, which means a careful review of which apps can install other apps is essential. iOS, by contrast, restricts sideloading by design, limiting installation to the App Store or enterprise tools in controlled environments. This difference matters for households with shared devices and home automation hubs, as some devices rely on companion apps that originate outside the consumer store. Regardless of platform, enabling built‑in protections such as app verification, regular OS updates, and automatic scans significantly reduces exposure to unvetted software. Remember: the exact steps vary by device manufacturer and OS version, so consult official help resources for the precise path on your hardware. For a typical home setup, staying within trusted sources and minimizing sideloading is part of a practical, everyday security routine.
Android: stop installing apps from unknown sources (global controls and per-app choices)
To stop installing apps from unknown sources on Android, start by locating the official security controls in Settings. The exact path can vary by manufacturer, but you’ll typically find it under Security, Privacy, or Apps & notifications. On devices running Android 8.0 (Oreo) and newer, the system no longer provides a single Global Unknown Sources toggle. Instead, you’ll see a list of apps that are allowed to install other apps. Review that list and switch off any app you do not recognize or trust. After updating the per‑app permissions, ensure that Google Play Protect is enabled from the Play Store, and verify that the Play Protect scanning feature is turned on. This combination reduces the risk that a malicious installer can bypass your defenses. Finally, ensure that “Verify apps” or a similar feature is enabled so downloaded packages are checked before they run. If you must install a trusted file from a known source, consider temporarily enabling it for the purpose and disabling it immediately afterward. In daily life, you’ll typically keep these settings locked unless you are actively testing a legitimate app.
Android: per-app controls and Google Play Protect
Per‑app controls let you decide which apps can install other apps. Navigate to Settings > Apps & notifications > Special app access > Install unknown apps. On each app listed, toggle the permission off to revoke installation rights. If you see an app that you don’t recognize requesting this permission, revoke it and investigate the app’s origin, publisher, and reviews. Google Play Protect should be enabled to scan apps before and after installation; keep this feature on along with “Scan device for security threats.” Also review app permissions regularly; some apps request access to files, camera, or location in ways that aren’t necessary for their core function. A lax approach to permission prompts can result in data leakage or unneeded background activity. After you adjust these settings, test by trying to install a file from a trusted source to confirm the system prompts you. If the prompt appears, consider whether the source is truly trustworthy before proceeding.
iOS: restrictions and realities around unknown sources
On iPhone and iPad, there is no standard option to install apps from unknown sources outside the App Store. Apple’s model relies on a tightly controlled ecosystem, signed enterprise apps aside. Organizations can distribute apps internally via test programs or enterprise certificates, but that process is restricted and monitored. For most households, this means you are protected by design, yet you should still be vigilant about what you install and what permissions you grant. If you receive a prompt to install an app from outside the App Store, cancel immediately, and verify the app’s publisher through trusted sources. Regular OS updates and browser protections help prevent drive-by download attempts. Consider enabling two‑factor authentication for your Apple ID, and review device management profiles if you notice unusual behavior. If you’re responsible for a family device, set up Screen Time restrictions to limit installation of new apps and enforce strong passcodes. The key takeaway is that iOS’s model is protective by default, but ongoing diligence remains essential.
Strengthening your mobile security beyond unknown sources
Beyond simply stopping installations from unknown sources, you can reduce risk by adopting a holistic security approach. Enable automatic OS and app updates to close known vulnerabilities quickly. Use a strong passcode or biometric lock, and enable two-factor authentication for your major accounts. Maintain a reputable password manager to handle credentials securely, and limit permissions that aren’t necessary for each app’s function. When connecting to public Wi‑Fi, consider using a trusted VPN to protect data in transit. Regular backups to a secure cloud or local drive ensure you can recover if something sneaks through. Finally, keep an eye on device age and performance; older devices can struggle to meet modern security expectations, so plan for upgrades when convenient. This broader security mindset aligns with how to stop install apps from unknown sources and keeps your home tech safer.
Regular maintenance and monitoring routine
Create a monthly security check‑in to review app sources and permissions. Start by scanning for newly installed apps and verifying that each one came from a trusted source. Revisit permission prompts and revoke anything that’s unnecessary. Maintain a clean device by uninstalling apps you no longer use and by keeping backup copies of important data. Use device monitoring features provided by the manufacturer (such as parental controls or user profiles) to limit accidental changes. A short, recurring routine reduces long‑term risk and reinforces habits that support a safe home tech environment. Pair these checks with automatic updates and a routine for changing passwords. This consistent practice is essential to a robust defense against malicious software.
Common mistakes to avoid
Many homeowners underestimate how quickly risky apps can creep in. Avoid turning off security features for convenience, as this undermines protection during routine phone use. Don’t assume all apps on prominent stores are perfectly safe; even trusted publishers can release compromised updates. Avoid sideloading even when an installer looks legitimate, and never trust installers delivered via email or text links. Do not ignore permission prompts; if an app asks for access that isn’t necessary, deny it and investigate the need. Finally, do not delay OS and app updates; security patches address newly discovered weaknesses and are a critical part of any plan to stop unknown sources from compromising devices.
Authority sources
For further reading and official guidance, consult authoritative sources on mobile security and app installation policies. This section points you to reliable resources so you can verify practices and stay current. Use these links as anchors for your ongoing security routine:
- https://www.android.com/
- https://support.google.com/android/
- https://www.cisa.gov/mobile-device-security
Practical checklist for safer app sources
Use this quick-start checklist to implement the guidance above. Confirm that the following items are in place:
- You understand what counts as an unknown source and avoid enabling it unless strictly necessary.
- Per‑app installation permissions are disabled for all untrusted apps.
- Google Play Protect or equivalent scanning is enabled; ensure you have automatic updates turned on.
- You’re using trusted app stores and verifying apps before installation.
- OS and app updates are enabled and installed promptly when available.
- You’ve enabled screen locks, biometrics, and two-factor authentication for critical accounts.
- You’ve reviewed app permissions and revoked any unnecessary access.
- You regularly back up important data and know how to restore it.
- You’re mindful of the risks of sideloading on shared family devices and use profiles or restrictions as needed.
- You have a plan in place to respond quickly if you notice suspicious activity or an unfamiliar installer.
Tools & Materials
- Smartphone or tablet(Fully charged before starting)
- Official app store account (Google Play / App Store)(Enable two-factor authentication)
- Backup method (cloud or local)(Back up important data before changing security settings)
- Access to device Settings(Needed to modify installation source controls)
- Security app or antivirus (optional)(Extra layer of protection if desired)
- Password manager (optional)(Helps manage credentials securely)
Steps
Estimated time: 30-60 minutes
- 1
Open Settings and locate security controls
Open the Settings app and locate the security or privacy section. On many Android devices this appears under Security, Privacy, or Apps & notifications. The goal is to find the “Install unknown apps” or equivalent control so you can review which apps have permission to install other apps.
Tip: Pro tip: use the Settings search feature to jump to 'Install unknown apps'. - 2
Review per‑app installation permissions
Check the list of apps that are allowed to install packages. If you see an app you don’t recognize, turn off its installation permission. Do not assume that an app with a benign name is completely safe—investigate its publisher and the source before re-enabling any permissions.
Tip: Pro tip: take screenshots of the permission list before changes so you can revert if needed. - 3
Disable unknown sources globally or per app
For devices with a global toggle, switch it off. If your device uses per‑app controls, ensure no trusted apps are granted permissions beyond what is necessary. This step is the core barrier against unintended installations.
Tip: Pro tip: only re‑enable for a verified purpose and disable immediately afterward. - 4
Enable Google Play Protect or equivalent scanning
Go to the Play Store (or App Store equivalent) and ensure the built‑in security scan is enabled. This protects against malicious apps and suspicious updates even after you’ve installed apps from trusted sources.
Tip: Pro tip: keep Play Protect’s automatic scanning turned on for ongoing protection. - 5
Enable app verification during downloads
Verify apps or similar verification features should be enabled. This prompts the system to check an app’s integrity and publisher before it runs, adding a safeguard against tampered installers.
Tip: Pro tip: perform a manual check on any app that arrives outside the official store. - 6
Update the OS and apps regularly
Install updates promptly. Security patches often address new threats that could enable unknown sources to compromise devices more easily. Update both OS and apps to maintain a robust defense.
Tip: Pro tip: enable automatic updates where possible to avoid missing critical patches. - 7
Practice cautious testing when needed
If you must test a legitimate enterprise app, do so in a controlled environment with a backup plan. Limit permissions and revert after testing completes. Document the source and reasons for the install.
Tip: Pro tip: use a secondary device for testing enterprise apps whenever feasible. - 8
Strengthen login security
Require strong passwords for app stores and enable two‑factor authentication. This reduces the risk of account compromise used to push malicious apps through trusted channels.
Tip: Pro tip: store recovery information in a secure password manager. - 9
Set up data backups
Back up essential data before making any security changes. Regular backups ensure you can recover quickly if a compromised app affects your device.
Tip: Pro tip: verify backup integrity occasionally to ensure you can restore successfully. - 10
Create a routine security check
Establish a 15–20 minute monthly check to review recent installs, verify permissions, and confirm that unknown sources remain disabled for all apps. This habit is critical for long-term protection.
Tip: Pro tip: set a calendar reminder to maintain consistency.
Got Questions?
What counts as an unknown source?
An unknown source is any app outside official stores or enterprise programs that can install other apps. These sources bypass standard vetting and may introduce malware or data risk.
Unknown sources are apps from outside official stores that can install other apps, bypassing vetting.
Is it safe to enable unknown sources temporarily?
Only enable if you fully trust the source and you disable again after completing the legitimate task. Temporary permissions still carry risk and should be minimized.
Only enable if you truly trust the source, and disable right after the task.
How can I tell if an app is trustworthy?
Check the publisher, read reviews, review install counts, and inspect requested permissions. Avoid apps with vague publishers or deceptive prompts.
Check the publisher, reviews, and permissions before installation.
What should I do if I suspect a malicious app?
Uninstall the app, run a security scan, update the OS, and change passwords if you suspect data exposure. Report malware to your device manufacturer if needed.
Uninstall, scan, update, and change passwords if needed.
Do iOS devices face the same risk?
iOS restricts sideloading by design, reducing risk. However, vigilance remains important, especially with enterprise apps or profiles. Always verify sources and keep devices updated.
iOS is more restrictive, but stay vigilant and keep updates current.
How often should I review app sources?
Set a monthly reminder to review per-app install permissions and currently installed apps. Regular checks catch misconfigurations and suspicious behavior early.
Review monthly for peace of mind.
Watch Video
Main Points
- Disable or limit unknown sources across devices
- Enable app verification and automatic updates
- Review app permissions regularly and revoke unnecessary access
- Keep devices backed up and passwords strong
- The Install Manual team recommends prioritizing built-in protections and trusted sources

