You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Set the MDM Authority](../fundamentals/mdm-authority-set.md)
49
-
-[Create groups](../fundamentals/groups-add.md)
50
-
-[Configure the Company Portal](../apps/company-portal-app.md)
49
+
-[Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
51
50
- Assign user licenses in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854)
52
-
-[Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
51
+
-[Create groups](../fundamentals/groups-add.md)
52
+
-[Configure the Company Portal app](../apps/company-portal-app.md)
53
53
54
-
## User-owned macOS devices (BYOD)
55
54
56
-
You can let users enroll their own personal devices into Intune management. This is known as "bring your own device" or BYOD. After you've completed the prerequisites and assigned user licenses, your users can enroll their devices by:
57
-
- Going to the [Company Portal website](https://portal.manage.microsoft.com) or
58
-
- Downloading the Mac Company Portal app at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac).
55
+
## User-owned macOS devices (BYOD)
59
56
60
-
You can also send your users a link to online enrollment steps: [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md).
57
+
Intune supports *bring-your-own-device*, or *BYOD*, which lets people enroll their personal devices themselves. To set up enrollment for BYOD scenarios, complete the prerequisites in this article. Then tell yourdevice users to use one of these options to enroll devices:
61
58
62
-
For information about other end-user tasks, see these articles:
59
+
- Sign in to [Company Portal website](https://portal.manage.microsoft.com) and follow on-screen instructions to add device.
60
+
- Install Company Portal app for Mac at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac) and follow-on screen instructions to add device.
63
61
64
-
-[Resources about the end-user experience with Microsoft Intune](../fundamentals/end-user-educate.md)
65
-
-[Using your macOS device with Intune](../user-help/enroll-your-device-in-intune-macos-cp.md)
66
62
67
63
## Company-owned macOS devices
68
-
For organizations that purchase devices for their users, Intune supports the following macOS company-owned device enrollment methods:
69
-
-[Apple's Automated Device Enrollment (ADE)](device-enrollment-program-enroll-macos.md): Organizations can purchase macOS devices through ADE. ADE lets you deploy an enrollment profile "over the air" to bring devices into management.
70
-
-[Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): You can use a DEM account to enroll up to 1,000 devices.
71
-
-[Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment does not wipe the device.
64
+
Intune supports the following enrollment methods for company-owned macOS devices:
65
+
66
+
-[Apple Automated Device Enrollment](device-enrollment-program-enroll-macos.md): Use this method to automate the enrollment experience on devices purchased through Apple Business Manager or Apple School Manager. Automated device enrollment deploys the enrollment profile over-the-air,so you don't need to have physical access to devices.
67
+
-[Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): Use this method for large-scale deployments and when there are multiple people in your organization who can help with enrollment setup. Someone with device enrollment manager (DEM) permissions can enroll up to 1,000 devices with a single Azure Active Directory account. This method uses the Company Portal app or Microsoft Intune app to enroll devices. You can't use a DEM account to enroll devices via Automated Device Enrollment.
68
+
-[Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment enrolls devices with no user affinity, so this method is best for devices that aren't associated with a single user. This method requires you to have physical access to the Macs you're enrolling.
69
+
70
+
## Bootstrap tokens (preview)
71
+
72
+
> [!IMPORTANT]
73
+
> This feature is in [public preview](../fundamentals/public-preview.md). It is not available in GCC High and government cloud tenants.
74
+
75
+
Intune supports the use of bootstrap tokens on enrolled Macs running macOS 10.15 or later. Bootstrap tokens grant volume ownership status to local user accounts, so that non-admin users can approve important operations that an admin would otherwise need to do. Operations such as:
76
+
77
+
* User-initiated software updates
78
+
* Silent FileVault encryption
79
+
* Kernel extension installation on Apple silicon
72
80
73
-
## Block macOS enrollment
74
-
By default, Intune lets macOS devices enroll. To block macOS devices from enrollment, see [Set device type restrictions](enrollment-restrictions-set.md).
81
+
You can utilize bootstrap tokens on supervised Macs, and Macs enrolled via automated device enrollment.
82
+
83
+
### Get bootstrap token
84
+
85
+
The bootstrap token is automatically generated when:
86
+
87
+
* A newly-enrolled Mac checks in with Intune and
88
+
* A secure token-enabled user (typically an Intune administrator) signs in to the Mac with their clear text password
89
+
90
+
The token is then automatically escrowed to Microsoft Intune. You can use a command line tool to manually view, generate, and escrow a bootstrap token, if needed. For more information, see [Use secure token, bootstrap token, and volume ownership in deployments](https://support.apple.com/guide/deployment/use-secure-and-bootstrap-tokens-dep24dbdcf9e/1/web/1.0) on Apple Support.
91
+
92
+
### Manage kernel extensions
93
+
A bootstrap token can be used to approve the installation of both kernel extensions and software updates on a Mac with Apple silicon. Kernel extension management is automatically available on Macs running macOS 11 or later and enrolled via automated device enrollment.
94
+
95
+
To authorize the remote management of kernel extensions on a device that isn't enrolled via automated device enrollment, you must restart the Mac in recovery mode and downgrade its security settings. For more information, see [Change security settings on the startup disk of a Mac with Apple silicon](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac) on Apple Support.
96
+
97
+
## Block macOS enrollment
98
+
By default, Intune lets macOS devices enroll. To block macOS devices from enrollment, see [Set device type restrictions](enrollment-restrictions-set.md).
75
99
76
100
## Enroll virtual macOS machines for testing
77
101
@@ -84,7 +108,7 @@ For Parallels Desktop, you need to set the hardware type and the serial number f
84
108
85
109
For VMware Fusion, you need to [edit the .vmx file](https://kb.vmware.com/s/article/1014782) to set the virtual machine's hardware model and serial number. We recommend that you match the hardware type of the device running the virtual machines to the hardware type of the virtual machines that you're creating. You can find this hardware type in **Apple menu** > **About this Mac** > **System Report** > **Model Identifier**.
86
110
87
-
## User Approved enrollment
111
+
## User approved enrollment
88
112
89
113
User Approved MDM enrollment is a type of macOS enrollment that you can use to manage certain security-sensitive settings. For more information, see [Apple's support documentation](https://support.apple.com/HT208019).
90
114
@@ -100,4 +124,8 @@ BYOD macOS MDM enrollments prior to June 2020 may not be user approved if the en
100
124
101
125
## Next steps
102
126
103
-
After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
127
+
* For user-help documentation, which provides step-by-step enrollment instructions for device users, see [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md). You can also create your own instructions if you prefer to capture your organization's branded or customized enrollment experience.
128
+
129
+
* After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
0 commit comments