You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Set the MDM Authority](../fundamentals/mdm-authority-set.md)
49
-
-[Create groups](../fundamentals/groups-add.md)
50
-
-[Configure the Company Portal](../apps/company-portal-app.md)
49
+
-[Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
51
50
- Assign user licenses in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854)
52
-
-[Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
51
+
-[Create groups](../fundamentals/groups-add.md)
52
+
-[Configure the Company Portal app](../apps/company-portal-app.md)
53
53
54
-
## User-owned macOS devices (BYOD)
55
54
56
-
You can let users enroll their own personal devices into Intune management. This is known as "bring your own device" or BYOD. After you've completed the prerequisites and assigned user licenses, your users can enroll their devices by:
57
-
- Going to the [Company Portal website](https://portal.manage.microsoft.com) or
58
-
- Downloading the Mac Company Portal app at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac).
55
+
## User-owned macOS devices (BYOD)
59
56
60
-
You can also send your users a link to online enrollment steps: [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md).
57
+
People can BYOD, or *bring-your-own-device*, and enroll personal devices in Intune themselves. To set up enrollment for BYOD scenarios, complete the prerequisites in this article. Then tell yourdevice users to use one of these options to enroll devices:
61
58
62
-
For information about other end-user tasks, see these articles:
59
+
- Sign in to [Company Portal website](https://portal.manage.microsoft.com) and follow on-screen instructions to add device.
60
+
- Install Company Portal app for Mac at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac) and follow-on screen instructions to add device.
63
61
64
-
-[Resources about the end-user experience with Microsoft Intune](../fundamentals/end-user-educate.md)
65
-
-[Using your macOS device with Intune](../user-help/enroll-your-device-in-intune-macos-cp.md)
66
62
67
63
## Company-owned macOS devices
68
-
For organizations that purchase devices for their users, Intune supports the following macOS company-owned device enrollment methods:
69
-
-[Apple's Automated Device Enrollment (ADE)](device-enrollment-program-enroll-macos.md): Organizations can purchase macOS devices through ADE. ADE lets you deploy an enrollment profile "over the air" to bring devices into management.
70
-
-[Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): You can use a DEM account to enroll up to 1,000 devices.
71
-
-[Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment does not wipe the device.
64
+
Intune supports the following enrollment methods for company-owned macOS devices:
65
+
66
+
-[Apple Automated Device Enrollment](device-enrollment-program-enroll-macos.md): Use this method to automate the enrollment experience on devices purchased through Apple Business Manager or Apple School Manager. Automated device enrollment deploys the enrollment profile over-the-air,so you don't need to have physical access to devices.
67
+
-[Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): Use this method for large-scale deployments and when there are multiple people in your organization who can help with enrollment setup. Someone with device enrollment manager (DEM) permissions can enroll up to 1,000 devices with a single Azure Active Directory account. This method uses the Company Portal app or Microsoft Intune app to enroll devices. You can't use a DEM account to enroll devices via Automated Device Enrollment.
68
+
-[Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment enrolls devices with no user affinity, so this method is best for devices that aren't associated with a single user. Because there is no user associated, you can't use the Company Portal or Microsoft Intune apps to enroll devices. Instead, you download the profile and transfer it to the macOS device. This method requires you to have physical access to the Macs you're enrolling.
69
+
70
+
## Bootstrap tokens
71
+
72
+
> [!NOTE]
73
+
> This feature is in public preview. It isn't available in GCC High and government cloud tenants.
74
+
75
+
Intune supports the use of bootstrap tokens on enrolled Macs running macOS 10.15 or later. Bootstrap tokens grant volume ownership status to local user accounts, so that non-admin users can approve important operations that an admin would otherwise need to do. Operations such as:
76
+
77
+
* User-initiated software updates
78
+
* Silent FileVault encryption
79
+
* Kernel extension installation on Apple silicon
80
+
81
+
You can utilize bootstrap tokens on supervised Macs, and Macs enrolled via automated device enrollment.
82
+
83
+
### Get bootstrap token
84
+
85
+
The bootstrap token is automatically generated when:
86
+
87
+
* A newly-enrolled Mac checks in with Intune and
88
+
* A secure token-enabled user (typically an Intune administrator) signs in to the Mac with their clear text password
89
+
90
+
The token is then automatically escrowed to Microsoft Intune. You can use a command line tool to manually view, generate, and escrow a bootstrap token, if needed. For more information, see [Use secure token, bootstrap token, and volume ownership in deployments](https://support.apple.com/guide/deployment/use-secure-and-bootstrap-tokens-dep24dbdcf9e/1/web/1.0) on Apple Support.
72
91
73
-
## Block macOS enrollment
92
+
### Manage kernel extensions
93
+
A bootstrap token can be used to approve the installation of both kernel extensions and software updates on a Mac with Apple silicon. Kernel extenstion management is automatically available on Macs running macOS 11 or later and enrolled via automated device enrollment.
94
+
95
+
To enable it on a device that wasn't enrolled via automated device enrollment, you must restart the device in recoveryOS and downgrade its security settings. Shut down the device and then complete these steps as the device reboots:
96
+
97
+
1. Press and hold the power button until you see **Loading startup options**.
98
+
99
+
2. Select **Options** > **Continue**.
100
+
101
+
3. If requested, enter the administrator account's password.
102
+
103
+
4. The Mac enters recovery mode and opens macOS Recovery. Select **Utilities** > **Startup Security Utility**.
104
+
105
+
5. Select the startup disk you want to use for the security policy. If the disk is encrypted with FileVault:
106
+
a. Select Unlock.
107
+
b. Enter the password.
108
+
c. Select Unlock.
109
+
110
+
6. Select **Security Policy**.
111
+
112
+
7. From the security options, select **Reduced Security**.
113
+
8. Enter the administrator's username and password.
114
+
9. Select from the available settings. Your options:
115
+
-**Allow user management of kernel extensions from identified developers**: Select the checkbox to allow local users to approve the installation of software that uses legacy kernel extensions.
116
+
-**Allow remote management of kernel extensions and automatic software updates**: Select the checkbox to authorize remote management of legacy kernel extensions and software updates in Intune.
117
+
118
+
9. Select **OK**.
119
+
120
+
10. Restart your Mac for the changes to take effect.
121
+
122
+
> [!TIP]
123
+
> If you have problems starting up your Mac with Apple silicon, and think the problem is caused by third-party software installed on the device, try starting your Mac in safe mode.
124
+
125
+
## Block macOS enrollment
74
126
By default, Intune lets macOS devices enroll. To block macOS devices from enrollment, see [Set device type restrictions](enrollment-restrictions-set.md).
75
127
76
128
## Enroll virtual macOS machines for testing
@@ -84,7 +136,7 @@ For Parallels Desktop, you need to set the hardware type and the serial number f
84
136
85
137
For VMware Fusion, you need to [edit the .vmx file](https://kb.vmware.com/s/article/1014782) to set the virtual machine's hardware model and serial number. We recommend that you match the hardware type of the device running the virtual machines to the hardware type of the virtual machines that you're creating. You can find this hardware type in **Apple menu** > **About this Mac** > **System Report** > **Model Identifier**.
86
138
87
-
## User Approved enrollment
139
+
## User approved enrollment
88
140
89
141
User Approved MDM enrollment is a type of macOS enrollment that you can use to manage certain security-sensitive settings. For more information, see [Apple's support documentation](https://support.apple.com/HT208019).
90
142
@@ -100,4 +152,8 @@ BYOD macOS MDM enrollments prior to June 2020 may not be user approved if the en
100
152
101
153
## Next steps
102
154
103
-
After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
155
+
* For user-help documentation, which provides step-by-step enrollment instructions for device users, see [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md). You can also create your own instructions if you prefer to capture your organization's branded or customized enrollment experience.
156
+
157
+
* After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
0 commit comments