Thank you for being so helpful in my last post.
I deployed about 30 devices using Apple Configurator to set the original image and restrictions, and then Meraki for MDM. Everything seems to be going great except that the automatic Web Content Filter is far more invasive than we realized. We'd like to roll the Web Content Filtering back, and allow access to all websites. Unfortunately Configurator is installed on a desktop in one city, and our users are in multiple different cities. Anyone have ideas of how we can remove the website restriction without messing with people's new settings or causing them undue annoyance? Basically, can we remotely remove the Web Content Filtering?
I Received this Communication from our Apple rep. I am really glad we have not updated to iOS 7 at our school and would need to provide serial numbers and proof of purchase. I have emailed support and I am waiting on directions. It looks like we will be able to push a profile that will prevent find my iPad activation lock settings in the background (speculation). Once the iOS 7 update is available we can remove our block and upgrade to iOS 7.
Recently some users have reported that their supervised iOS devices have reverted to un-supervised after they were upgraded to iOS 7. We are aware of this issue and will have a fix in an iOS software update coming this month.
If you upgraded your devices to iOS 7, we can help you re-supervise devices wirelessly once the software update is available. If your devices are still on iOS 6, we can help you prep your devices in order to maintain supervision when the software update is installed. Please see below for details. AppleCare is ready to help you with implementing whichever solution works for you.
Devices on iOS 7
For devices that were upgraded to iOS 7, we can create a profile to re-supervise your devices. In order to create this profile, we need two things from you — your device serial numbers and valid proof-of-purchase information. When you contact AppleCare, we will provide details on how to send us this information. AppleCare will also let you know when you will receive the profile and provide deployment instructions.
Devices on iOS 6
If you have devices that haven’t been upgraded to iOS 7, we will give you the ability to generate a profile to install before upgrading. Then your devices will be able to upgrade to the upcoming release of iOS as supervised devices.
Please email email@example.com to obtain more information from AppleCare.
I just deployed 24 iPads in my company, and I'm using Apple Profile Manager 2 as MDM solution.
I'm using variable to create a single configuration profile that will load user info automatically, leaving just password entry for the users.
%short_name% is used as variable for user account
%mail% is used as variable for the exchange server email
Everything go smooth, the user enter his password and mail start to receive exchange mails.
It turns out that exchange mail configured in this way are not fully recognized by iOS:
1- if you use mail everything works fine
2- if you use 3rd party app like Smart Office 2 or BBC app, and you want to share via mail something you get a message that first you need to configure an email account
3- if you configure extra email account like iCloud one or gmail one, any of them can be selected as default email account, except for the exchange account that won't be listed at all, like if it don't exist, but it's there and working from mail app.
The above is verified both with iOS 6 and iOS 7, so it's not iOS7 issue
a guy left the company, a new guy get the iPad, he enroll the device login in with his account info, but exchange mail setting still report the previous user mail (configured as explained before)
I tried restoring iPad, soft and hard reset, from the device and connected to the MDM (MacMini), I assume the problem is in MDM software and not in the device itself considering when it's restored it's completely empty
Any idea / suggestion?
Any help will be appreciated
TechHive has an article on several iOS 7 keyboard tips. Here is my favorite:
The old ".com" button is hidden inside Safari's keyboard. Just press and hold the period.
Makes it so much easier to type enterpriseios.com.
A quick tip on a new feature for iOS 7: You can now manage which apps are allowed to use cellular networking and which must be confined to WiFi. Check out Settings > Cellular and scroll to the bottom. Unfortunately this isn't manageable via MDM.
I'm new to Enterprise iOS, thank you for providing this very useful resource!
I was wondering if anyone has a favorite not-too-expensive USB hub for rolling out iPhones using Apple Configurator. I can't seem to find a USB hub for 5-10 devices with enough power to charge and sync, that's not prohibitively expensive.
Any help would be great!
The Interop conference & Expo is this week at New York City's Javits Center. I'm honored to be part of a small panel, on Enterprise Mobility Management – What’s Next?:
Terms like “mobile device management” and “mobile application management” imply that we should manage mobile devices and applications differently than their desktop counterparts. This panel will debate that premise. Is it really better to handle desktop management separately from MDM and MAM? Or is a holistic approach a better fit as the lines between device types blur? And will we even need to worry about managing devices if MAM lives up to its promise?
I hope I'll see you there.
Quick quiz: How many iOS devices have ever been released? Not counting colors here, but boards. (Answer: only 35.)
I know that because today we launched our Database of iOS Devices. This is a pretty simple table of each iPhone, iPad, iPod touch and Apple TV Apple's released since 2007. It has introduction dates, model identifiers (i.e. "iPhone 6,2") and links to the latest firmware updates.
We're leveraging the API from Just a Penguin, which has done the dirty work of compiling the firmware versions (probably by a clever script).
But we're also able to add additional details to our database. What would you like to see?
Is Activation Lock appropriate on a corporate-owned device? Community member Duane Herring found the Apple support document below that shows Apple has been thinking about this too.
Learn how to manage Activation Lock feature of Find My iPhone in iOS 7.
With iOS 7, when you turn on Find My iPhone, you enable Activation Lock. Activation Lock prevents anyone else from reactivating your iOS device if it is lost or stolen. Mobile device administrators can manage this setting by supervising devices.
If you use Apple Configurator to supervise an iOS 7 device, Activation Lock will not be enabled when a user turns on Find My iPhone.
If an iOS 7 device is not supervised, Activation Lock will be enabled as soon as a user logs in to iCloud and turns on Find My iPhone. Mobile device management cannot prevent a user from enabling Activation Lock on an unsupervised device.
In any case, only the iCloud user who enabled Activation Lock can disable it.
If the user has access to the iOS device, they can turn it off in Settings > iCloud > Find My iPhone.
If the user doesn't have access to the iOS device, they can log in to icloud.com or the Find My iPhone app on another iOS device, then erase the device and remove it from the device list.
A mobile device administrator cannot disable Activation Lock after it is enabled.
Find more information about Find My iPhone Activation Lock.
If you use Apple Configurator to prepare a device that has Find My iPhone enabled, you will see the message "Unable to check iOS."
If the device was previously unsupervised, Activation Lock is enabled and the iCloud user who enabled Find My iPhone must disable it before you can prepare the device.
If the device was previously supervised, either the iCloud user who enabled Find My iPhone can disable it, or you can put the device into recovery mode and then prepare it.
This can be a sticky problem. Does Apple's solution work for you? Please continue the comment thread...
There is a lot to like about Apple's new iPhone 5s announced Tuesday. The faster and 64-bit chip, the battery-saving M7 motion processor, the really nice camera. And gold, if that's what rings your bell. But for enterprises, the headline features seems to be "Touch ID", the fingerprint sensor built into the home button of the top-end phones.
It is clearly a leap forward, and journalists are getting very excited. But we need a reality check here, as there are some subtle but critical details that don't seem to be getting attention. Touch ID is not going to replace your passcode, it isn't more secure than your passcode, and it isn't two-factor authentication. If used properly, it can improve security for many of us. And in truth, it is a hell of a lot better than nothing.
Let me 'splain what I'm thinking.
Today, the key info about this feature comes from an article in the Wall Street Journal. An unnamed Apple representative says this:
Apple customers who wish the use Touch ID also have to create a passcode as a backup. Only that passcode (not a finger) can unlock the phone if the phone is rebooted or hasn’t been unlocked for 48 hours.
The way I interpret this statement is this: the passcode is, as today, the primary means of securing the device. The passcode is always available. The fingerprint sensor is an alternate means on unlocking the device, but the passcode will always be there. The fingerprint sensor is, in a sense, a shortcut to the passcode.
No additional security (unless you add it)
An iPhone with no passcode is like leaving the door to your house wide open.
Use a passcode, and you've closed and locked that door.
Not only is the phone locked, but you are now encrypting the data on your phone. So even if someone breaks open the hardware and removes the chips, your encrypted data is safe.
Introduce Touch ID, and here's what you have:
Now you have two ways into your house: Use the same passcode door as before or use the fingerprint door. If one door doesn't let you in maybe the other will. To me, it is clear this is not more secure than one door. If your passcode is "1-1-1-1" then I don't care about your fingers, I'll just enter through the passcode.
The standard 4-digit numeric passcode is pretty easy to crack. There are only 10,000 combinations, after all, and if you enter them through a tethered connection you can try them pretty quickly. But if you don't use a 4-digit numeric passcode, you get a lot more secure.
But there is a way Touch ID can enable stronger security. Since the fingerprint is effectively a shortcut around a passcode, I can now make a really difficult passcode to get into my phone. A passcode with 18 characters and symbols and caps and emoji and stuff. A passcode that was so difficult to enter that it would drive me crazy if I needed to enter it every 5 minutes. But if I need to enter the complex passcode only when rebooting the phone (almost never) or after 48 hours idle (absolutely never) then I can live with that.
Better security, but only indirectly enabled by biometrics.
Not two-factor authentication
Maybe you can see by now that the fingerprint sensor on the iPhone 5s does not provide two-factor authentication. 2FA is like two locks on the same door.
I use Google 2-Step Verification for my Google accounts — you should too — and that makes me happy. When I use that I need to enter BOTH my password and my 1-time code. [Experts will say this isn't true 2FA, but it keeps me feeling warm and fuzzy.]
Way better than nothing
Greater improvements to security are to come in iOS 7. On setup, users are prompted — actually encouraged even — to enter a passcode. And apps used to have to opt-in to use the protected data store; now it is on by default.
In truth, we should remember that not enough iOS users enter any passcode. Instead they leave their door wide open. Maybe having the fingerprint sensor is going to be just cool technology and smart shortcuts to get people to lock their front doors.
Update: You may know that using Mobile Device Management, configuration profiles, and/or ActiveSync, an administrator can require a passcode. I've heard many people asking if there will be a similar key to require a fingerprint. If I'm right in my thinking, we won't see that. If I'm right that the current implementation otherwise diminishes security (slightly), we'll see a key to disable fingerprint sensing instead.
Update 9/22: Yup, right. The new Configuration Profile Reference has a key "allowFingerprintForUnlock" that defaults to true. So you can disable fingerprint unlock, but not enforce it. Oh, and the CCC claims it has just cracked Touch ID using a high-resolution photo.
A handful of our 700 users have started upgrading their iPads to iOS7 (even though we've told them not to, but I'm not surprised).
These users are enrolled onto our MDM, and have various apps and restrictions enforced.
Some of these users have come back to report that "everything has disappeared" post upgrade. Including the enterprise app we've deployed and the MDM agent. Which means to me that the device has become unenrolled.
Some other users have actually updated their devices to iOS7 and their apps/restrictions have remained post update.
So what we're doing is either manually re-enrolling the devices if they're close enough to come into the office, or we're walking the users through it over the phone (which isn't easy).
We're doing some testing now to try and figure out what has happened to the first user, but what I'm wondering is how do others with large deployments of managed iOS devices handle such a significant OS upgrade?
In your experience, do you see this as a smooth transition, or are there common problems which occur?
In iOS 7 VPP is all brand new. I haven't yet seen a demo of MDM that works with the new VPP system (I may on Monday). But here is how I understand it is all supposed to work.
The process still begins by visiting http://vpp.itunes.apple.com, searching for and purchasing apps. Before iOS 7 you would need to download a spreadsheet of redemption codes. Now there is nothing to download. Instead, the iTunes VPP store keeps a record of your purchases. Then...
- You use your MDM system to send VPP program invitations to your devices.
- You use MDM to register users with VPP
- MDM import your app catalog. This tells MDM which apps you have purchased and which, if any, licenses have been used.
- You use MDM to assign any unused licenses with users, and tell Apple about these associations
- You may now push out these apps to devices
The key here is step 4. When you associate the app "PCalc" with user "George Washington," Apple adds "PCalc" to George's App Store purchase history. George can now use PCalc on all his devices. What's more, George doesn't need to enter his Apple ID and password to download. After all, he's not purchasing it, he's just downloading it. There is, however, a confirmation on the device that George needs to accept. (On supervised devices there is no confirmation and the app installs silently.)
What's more, you can now use MDM to revoke an app from a user. This allows the institution to reassign PCalc to someone else, while allowing George a grace period. Pretty nifty.
If the entire process is much smoother, there are still some quirks. Not only does the institution not need the user's Apple ID to assign an app, Apple has seemingly bent over backwards to avoid revealing the Apple ID to the institution. Apple IDs are, apparently, private to Apple's relationship with the user.
Since this is merely a set of APIs I'm curious how MDM vendors implement it in different ways. Who will have the smoothest implementation?
Hey you guys! All 30,000/month of you. I have something to say, and I want the world to know.
I ❤️ Apple Configurator!
Don't you too? No? I understand. Configurator could very well be Apple's most misunderstood software. Most people who try Configurator will be under the impression that Configuration's forte is "accidentally erasing my iPhone." But when used properly Configurator does stuff with iPhones and iPads that no other software will do.
For starters, Configurator is the only way to supervise iOS devices. I'm going to write more about supervision in an upcoming article, because it is a really important concept in iOS 7. Briefly, supervision is Apple's way of saying that an iOS device is institutionally owned. Supervision unlocks additional management features that would be inappropriate on an individually-owned device (in Apple's opinion).
(A note of caution: in order to underline the gulf between institutional and personal devices, Configurator will always erase your device when either supervising and unsupervising. In fact it erases EVERY DEVICE that is plugged into your Mac when you hit "Prepare." Did you hear that? So unplug your newly-updated iPhone and iPad now, and plug in a spare iPod or something like that. Because when you are testing Configurator I promise you will be erasing lots of devices.)
If your devices are institutionally-owned and supervised, Configurator 1.4 packs a lot of new goodness:
- Disallow AirDrop
- Disallow iMessage
- Disallow manually installing configuration profiles
- Disallow modifying mail & calendar settings
- Disallow modifying Find My Friends
- Configure Web Filtering to whitelist or blacklist any sites -- pretty powerful stuff.
- Allow or disallow pairing with other computers
Did you catch that last one? Previous versions of Configurator would always allow pairing only by the Mac it was originally supervised with. All other computers would be prevented from connecting to the device. That was good for many smaller implementations. But it was a big obstacle in some larger deployments. Now you have the option of allowing supervised devices to connect with any host.
Even if your devices aren't supervised, Configurator 1.4 is a very powerful tool. It has always been helpful with large deployments. Now it can automatically enroll devices it prepares into MDM without user interaction, and it even waits until WiFi is up to do that. It can manage new iOS 7 features such as managed open in, configure AirPlay and AirPrint, and install fonts.
So try it, and maybe you'll ❤️ Configurator too.
With Find My iPhone turned on in iOS 7, your Apple ID password will always be required before anyone can Erase the iphone or reactivate and use the device.
So if we fire someone and they fail to give us their Apple ID password, they have effectively locked out of the phone preventing it from being re-used.
How are enterprises going to deal with this? Is there an MDM solution out there that can circumvent this or load a profile that prevents this scenario from happening?
About This Site
- Comparison of MDM Providers (623,915)
- Complete List of iOS User-Agent Strings (258,179)
- How to get remote viewing/control of the IPAD screen via internet or preferably 3G? (171,017)
- Apple Configurator vs. MDM (122,288)
- Mobile Device Management (81,573)
- Apple Profile Manager (70,892)
- AirWatch (66,077)
- Gartner Magic Quadrant for MDM (2014, 2012, 2011) (65,826)
- Batch Apple ID Creator (65,294)
- iOS Devices (62,835)
Comparison of MDM Providers
Forum topic comment by swkim 9 hours ago
Forum topic comment by enbtechnology 15 hours ago
Forum topic comment by Aaron Freimark 15 hours ago
Forum topic added by HCCSC John H 1 day ago
Forum topic added by enbtechnology 3 days ago
Forum topic comment by duffjay 6 days ago
Forum topic comment by kepgnar 6 days ago
Forum topic comment by kepgnar 6 days ago
Forum topic added by 960Design 6 days ago
Forum topic comment by benneta 6 days ago
Forum topic comment by Greg G 1 week ago
Forum topic comment by zerocool 1 week ago
Forum topic added by Rosquillas 1 week ago
Forum topic comment by jbourdon 1 week ago
Mobile Management Provider changed by unwired360 1 week ago
Mobile Management Provider changed by Frank Klotz 2 weeks ago
Forum topic comment by iCydiaOS 2 weeks ago
Forum topic comment by jabbajawz 2 weeks ago
Forum topic comment by BryceR 2 weeks ago
Forum topic added by firstname.lastname@example.org 2 weeks ago