22 KiB
Mobile device management (MDM)
MDM features are not ready for production and are currently in development. These features are disabled by default.
MDM features allow you to manage macOS updates and macOS settings on your hosts.
To use MDM features you have to connect Fleet to Apple Push Certificates Portal. See how here.
macOS updates
End user macOS update reminders via Nudge
Available in Fleet Premium
End users can be reminded and encouraged to update macOS (via Nudge).
When a minimum version and deadline is saved in Fleet, the end user sees the below Nudge window until their macOS version is at or above the minimum version.
To set the macOS updates settings in the UI, visit the Controls section and then select the macOS updates tab. To set the macOS updates settings programmatically, use the configurations listed here.
As the deadline gets closer, Fleet provides stronger encouragement.
If the end user has more than 1 day until the deadline, the Nudge window is shown everyday. The end user can defer the update and close the window.
If there is less than 1 day, the window is shown every 2 hours. The end user can defer and close the window.
If the end user is past the deadline, Fleet shows the window and end user can't close the window until they update.
End user experience
Apple has a two-step process for macOS updates. First, the host downloads the macOS update in the background without interrupting the end user. Then, the host installs the update, which prevents the end user from using the host.
Downloading the macOS update can be triggered programmatically, while installing the update always requires end user action.
Fleet downloads macOS updates programmatically on Intel Macs. This way, end users don't have to wait for the update to download before they can install it.
On Macs with Apple silicon (e.g. M1), downloading the macOS update may require end user action. Apple doesn't support downloading the update programmatically on Macs with Apple silicon.
Known issue
Sometimes the end user's Mac will say that macOS is up to date when it isn't. This known issue creates a frustrating experience for the end user. Ask the end user to follow the steps below to troubleshoot:
-
From the Apple menu in the top left corner of your screen, select System Settings or System Preferences.
-
In the search bar, type "Software Update." Select Software Update.
-
Type "Command (⌘)-R" to check for updates. If you see an available update, select Restart Now to update.
-
If you still don't see an available update, from the Apple menu in the top left corner of your screen, select Restart... to restart your Mac.
-
After your Mac restarts, from the Apple menu in the top left corner of your screen, select System Settings or System Preferences.
-
In the search bar, type "Software Update." Select Software Update and select Restart Now to update.
End user macOS update via built-in macOS notifications
Built-in macOS update reminders are available for all Fleet instances. To trigger these reminders, run the "Schedule an OS update" MDM command.
macOS settings
In Fleet you can enforce settings on your macOS hosts remotely.
If you enforce disk encryption with Fleet, the disk encryption key (recovery key) will be stored in Fleet automatically. Learn how here.
You can also enforce custom macOS settings. Learn how here.
Disk encryption
Available in Fleet Premium
In Fleet, you can enforce disk encryption on your macOS hosts. Apple calls this FileVault. If turned on, hosts’ disk encryption keys will be stored in Fleet.
To enforce disk encryption, choose the "Fleet UI" or "fleetctl" method and follow the steps below.
Fleet UI:
-
In the Fleet UI, head to the Controls > macOS settings > Disk encryption page. Users with the maintainer and admin roles can access the settings pages.
-
Check the box next to Turn on and select Save.
fleetctl CLI:
- Create a
configYAML document if you don't have one already. Learn how here. This document is used to change settings in Fleet.
If you want to enforce disk encryption on all macOS hosts in a specific team in Fleet, use the
teamYAML document. Learn how to create one here.
-
Set the
mdm.macos_settings.enable_disk_encryptionconfiguration option totrue. -
Run the
fleetctl apply -f <your-YAML-file-here>command.
Viewing a disk encryption key
The disk encryption key allows you to reset a macOS host's password if you don't know it. This way, if you plan to prepare a host for a new employee, you can login to it and erase all its content and settings.
The key can be accessed by Fleet admin, maintainers, and observers. An event is tracked in the activity feed when a user views the key in Fleet.
How to view the disk encryption key:
-
Select a host on the Hosts page.
-
On the Host details page, select Actions > Show disk encryption key.
Reset a macOS host's password using the disk encryption key
How to reset a macOS host's password using the disk encryption key:
-
Restart the host. If you just unlocked a host that was locked remotely, the host will automatically restart.
-
On the Mac's login screen, enter the incorrect password three times. After the third failed login attempt, the Mac will display a prompt below the password field with the following message: "If you forgot your password, you can reset it using your Recovery Key." Select the right facing arrow at the end of this prompt.
-
Enter the disk encryption key. Note that Apple calls this "Recovery key." Learn how to find a host's disk encryption key here in the docs.
-
The Mac will display a prompt to reset the password. Reset the password and save this password somewhere safe. If you plan to prepare this Mac for a new employee, you'll need this password to erase all content and settings on the Mac.
Custom settings
In Fleet you can enforce custom settings on your macOS hosts using configuration profiles.
To enforce custom settings, first create configuration profiles with iMazing Profile editor and then add the profiles to Fleet.
Create a configuration profiles with iMazing Profile Creator
How to create a configuration profile with iMazing Profile Creator:
-
Download and install iMazing Profile Creator.
-
Open iMazing Profile Creator and select macOS in the top bar. Fleet only supports enforcing settings on macOS hosts.
-
Find and choose the settings you'd like to enforce on your macOS hosts. Fleet recommends limiting the scope of the settings a single profile: only include settings from one tab in iMazing Profile Creator (ex. Restrictions tab). To enforce more settings, you can create and add additional profiles.
-
In iMazing Profile Creator, select the General tab. Enter a descriptive name in the Name field. When you add this profile to Fleet, Fleet will display this name in the Fleet UI.
-
In your top menu bar select File > Save As... and save your configuration profile. Make sure the file is saved as .mobileconfig.
Add configuration profiles to Fleet
In Fleet, you can add configuration profiles using the Fleet UI or fleetctl command-line tool.
The Fleet UI method is a good start if you're just getting familiar with Fleet.
The fleetctl CLI method enables managing configuration profiles in a git repository. This way you can enforce code review and benefit from git's change history.
Fleet UI:
-
In the Fleet UI, head to the Controls > macOS settings > Custom settings page.
-
Select Upload and choose your configuration profile. After your configuration profile is uploaded to Fleet, Fleet will apply the profile on your macOS hosts. The profile will be applied to new macOS hosts that enroll to Fleet.
fleetctl CLI:
- Create a
configYAML document if you don't have one already. Learn how here. This document is used to change settings in Fleet.
If you want to add configuration profiles to all macOS hosts on a specific team in Fleet, use the
teamYAML document. Learn how to create one here.
- Add an
mdm.macos_settings.custom_settingskey to your YAML document. This key will hold an array of paths to your configuration profiles. See the below exampleconfigYAML document:
apiVersion: v1
kind: config
spec:
mdm:
macos_settings:
custom_settings:
- /path/to/configuration_profile_A.mobileconfig
- /path/to/configuration_profile_B.mobileconfig
...
- Run the
fleetctl apply -f <your-config-here>.ymlcommand to add the configuration profiles to Fleet. Note that this will override any configuration profiles added using the Fleet UI method.
Set up
To use MDM features, like enforcing settings and operating system version, you have to connect Fleet to Apple using Apple Push Notification service (APNs).
To use automatically enroll new Macs to Fleet, you have to connect Fleet to Apple Business Manager (ABM).
Apple Push Notification service (APNs)
To connect Fleet to Apple, get these four files using the Fleet UI or the fleetctl command-line interface: An APNs certificate, APNs private key, Simple Certificate Enrollment Protocol (SCEP) certificate, and SCEP private key.
To do this, choose the "Fleet UI" or "fleetctl" method and follow the steps below.
Fleet UI:
-
Head to the Settings > Integrations > Mobile device management (MDM) page. Users with the admin role can access the settings pages.
-
Follow the instructions under Apple Push Certificates Portal.
fleetctl CLI:
-
Run
fleetctl generate mdm-apple --email <email> --org <org>. -
Follow the on-screen instructions.
Take note of the Apple ID you use to sign into Apple Push Certificates Portal. You'll need to use the same Apple ID when renewing your APNs certificate. Apple requires that APNs certificates are renewed once every year. To renew, see the APNs Renewal section .
APNs Renewal
Apple requires that APNs certificates are renewed once every year. You can see the certificate's renewal date and other important APNs information using the Fleet UI or the fleetctl command-line interface:
Fleet UI:
-
Head to the Settings > Integrations > Mobile device management (MDM) page. Users with the admin role can access the settings pages.
-
Look at the Apple Push Certificates Portal section.
fleetctl CLI:
-
Run
fleetctl get mdm-apple. -
Look at the on-screen information.
How to renew the certificate if it's expired or about to expire:
-
Run the
fleetctl generate mdm-apple --email <email> --org <org>command. Make sure you use the same Apple ID email address that you used when generating the original certificate. -
Sign in to Apple Push Certificates Portal using the same Apple ID you used to get your original certificate. If you don't use the same Apple ID, you will have to turn MDM off and back on for all macOS hosts.
-
In the Settings > Integrations > Mobile device management (MDM) page, under Apple Push Certificates portal, find the serial number of your current certificate. In Apple Push Certificates Portal, click Renew next to the certificate that has the matching serial number. If you don't renew and get a new certificate, you will have to turn MDM off and back on for all macOS hosts.
Apple Business Manager (ABM)
Available in Fleet Premium
Connect Fleet to your ABM account to automatically enroll macOS hosts to Fleet when they’re first unboxed.
If a new macOS host that appears in ABM hasn't been unboxed, it will appear in Fleet with MDM status set to "Pending." These hosts will automatically enroll to the default team in Fleet. Learn how to update the default team here.
To connect Fleet to ABM, first create a new MDM server in ABM and then get these two files using the Fleet UI or the fleetctl command-line interface: An ABM certificate and private key.
How to create a new MDM server in ABM:
-
Login to ABM and click your name at the bottom of the sidebar, click Preferences, then click MDM Server Assignment.
-
Click the Add button, then enter a unique name for the server. A good name to start is "Fleet MDM."
To get the two files, choose the "Fleet UI" or "fleetctl" method and follow the steps below.
Fleet UI:
-
In the Fleet UI, head to the Settings > Integrations > Mobile device management (MDM) page. Users with the admin role can access the settings pages.
-
Follow the instructions under Apple Business Manager.
fleetctl CLI:
-
Run
fleetctl generate mdm-apple-bm. -
Follow the on-screen instructions.
Default team
MacOS hosts purchases through Apple or authorized resellers will automatically enroll to the default team in Fleet when they're first unboxed. This means that Fleet will enforce the default team's settings on these hosts.
After a host enrolls it can be transferred to a different team. Learn how here. Transferring a host automatically enforces the new team's settings and removes the old team's settings.
To change the default team, choose the "Fleet UI" or "fleetctl" method and follow the steps below.
Fleet UI:
-
In the Fleet UI, head to the Settings > Integrations > Mobile device management (MDM) page. Users with the admin role can access the settings pages.
-
In the Apple Business Manager section, select the Edit team button next to Default team.
-
Choose a team and select Save.
fleetctl CLI:
-
Create a
configYAML document if you don't have one already. Learn how here. This document is used to change settings in Fleet. -
Set the
mdm.apple_bm_default_teamconfiguration option to the desired team's name. -
Run the
fleetctl apply -f <your-YAML-file-here>command.
ABM Renewal
The Apple Business Manager server token expires after a year or whenever the account that downloaded the token has their password changed. To renew the token, follow the instructions documented in this FAQ.
Migration
Only one MDM solution can be used for MDM features, like enforcing settings, on each of your macOS hosts. This section provides instructions for migrating away from your old MDM solution so that you can use Fleet for MDM features.
To migrate hosts from your old MDM solution to Fleet you’ll first have to deploy Fleet, add your hosts, and connect Fleet to Apple.
Manually enrolled hosts
If you have macOS hosts that were manually enrolled to your old MDM solution, you can migrate them to Fleet.
Make sure your end users have an admin account on their Mac. End users won't be able to migrate on their own if they have a standard account.
How to migrate manually enrolled hosts:
-
In your old MDM solution, unenroll these hosts. MacOS does not allow multiple MDMs to be installed at once. This step is required to present end users with instructions to turn on MDM in Fleet.
-
The My Device page in Fleet Desktop will present end users with instructions to turn on MDM. Share these guided instructions with your end users.
Automatically enrolled (DEP) hosts
Available in Fleet Premium
If you have macOS hosts that were automatically enrolled to your old MDM solution, you can migrate them to Fleet.
Make sure your end users have an admin account on their Mac. End users won't be able to migrate on their own if they have a standard account.
To check if you have hosts that were automatically enrolled, login to Apple Business Manager and select Devices.
How to migrate these hosts:
-
Connect Fleet to Apple Business Manager (ABM). Learn how here.
-
In ABM, unassign these hosts' MDM server from the old MDM solution: In ABM, select Devices and then select All Devices. Then, select Edit next to Edit MDM Server, select Unassign from the current MDM, and select Continue.
-
In ABM, assign these hosts' MDM server to Fleet: In ABM, select Devices and then select All Devices. Then, select Edit next to Edit MDM Server, select Assign to the following MDM:, select your Fleet server in the dropdown, and select Continue.
-
In your old MDM solution, unenroll these hosts. MacOS does not allow multiple MDMs to be installed at once. This step is required to present end users with instructions to turn on MDM in Fleet.
-
The My Device page in Fleet Desktop will present end users with instructions to turn on MDM. Share these guided instructions with your end users.
FileVault recovery keys
Available in Fleet Premium
In Fleet, you can enforce FileVault (disk encryption) to be on. If turned on, hosts’ disk encryption keys will be stored in Fleet. Learn how here.
During migration from your old MDM solution, disk encryption will be turned off for your macOS hosts until they are enrolled to Fleet and MDM is turned on for these hosts.
If your old MDM solution enforced disk encryption, your end users will need to reset their disk encryption key for Fleet to be able to store the key. The My device page in Fleet Desktop will present users with instructions to reset their key. Share these guided instructions with your end users.
Activation Lock Bypass codes
In Fleet, the Activation Lock feature is disabled by default for automatically enrolled (DEP) hosts.
If a Mac has Activation Lock enabled, we recommend asking the end user to follow these instructions to disable Activation Lock before migrating this host to Fleet: https://support.apple.com/en-us/HT208987.
This is because if the Activation Lock is enabled, you will need the Activation Lock bypass code to successfully wipe and reuse the Mac.
Activation Lock bypass codes can only be retrieved from the Mac up to 30 days after the device is enrolled. This means that when migrating from your old MDM solution, it’s likely that you’ll be unable to retrieve the Activation Lock bypass code.
Migrate settings
To enforce the same settings on your macOS hosts in Fleet as you did using your old MDM solution, you have to migrate these settings to Fleet.
If your old MDM solution enforced FileVault, follow these instructions to enforce FileVault (disk encryption) using Fleet.
For all other settings you enforced, you have to first export these settings as configuration profiles from your old MDM solution. Then, you have to add the configuration profiles to Fleet.
How to export settings as configuration profiles:
-
Check if your MDM solution has a feature that allows you to export settings as configuration profiles. If it does, make sure these configuration profiles are exported as .mobileconfig files. If it doesn't, follow the instructions to create configuration profiles using iMazing Profile Creator here. Use iMazing Profile Creator to replicate the settings you enforced.
-
Follow the instructions to add configuration profiles to Fleet here.
Instructions for end users
Your organization uses Fleet to check if all devices meet its security policies.
Fleet includes device management features (called “MDM”) that allow your IT team to change settings remotely on your Mac. This lets your organization keep your Mac up to date so you don’t have to.
Want to know what your organization can see? Read about transparency.
How to turn on MDM:
- Select the Fleet icon in your menu bar and select My device.
- On your My device page, select Turn on MDM the button and follow the instructions. If you don’t see the Turn on MDM button, select the purple Refetch button at the top of the page. If you still don't see the Turn on MDM button after a couple minutes, please contact your IT administrator. If the My device page presents you with an error, please contact your IT administrator.
How to turn on disk encryption
- Select the Fleet icon in your menu bar and select My device.
- On your My device page, follow the disk encryption instructions in the yellow banner. If you don’t see the Turn on MDM button, select the purple Refetch button at the top of the page. If you still don't see the Turn on MDM button after a couple minutes, please contact your IT administrator. If the My device page presents you with an error, please contact your IT administrator.
Support
In Fleet, MDM features are supported for Macs running macOS 12 (Monterey) and higher.



