Methods to create configuration profiles for Apple gadgets

Utilizing Apple Configurator 2 permits Mac customers to create easy configuration payloads that modify settings for macOS and iOS gadgets with ease.

People group having addicted fun together using smartphones - Detail of hands sharing content on social network with mobile smart phones - Technology concept with millennials online with cellphones

Picture: Getty Photographs/iStockphoto

http://www.techrepublic.com/

When working with macOS and iOS gadgets, Apple has gone to nice strides to make sure that customers can handle their gadgets as they want. Usually the idea that Apple gadgets “simply work” is one thing the corporate takes to coronary heart because it kinds one of many cornerstones of the person expertise for the customers of their merchandise.

Conversely, IT professionals have a way more troublesome time when managing Apple gadgets because of the deal with the buyer pushed administration technique that sees finish customers as the first and default technique of being the administrator of their very own gadgets. This doesn’t bode properly because it limits IT’s means to correctly handle these gadgets on their community. Moreover, complicating issues is the rising shift towards BYOD, wi-fi networking, and telecommuting— all of that are components that additional hamper system administration at an enterprise scale.

SEE: VPN utilization coverage (Tech Professional Analysis)

Whereas Cell Gadget Administration (MDM) servers usually fill this void, if gadgets are personally owned or if the MDM is out of the funds, IT can depend on Apple Configurator 2 to create profiles that may be served from an online server, file share, or despatched as electronic mail attachments, the place the tip person manages their gadgets whereas IT can nonetheless be certain that company insurance policies are adhered to.

Earlier than getting began creating your first configuration profile, there are a couple of necessities to ensure cell administration takes off and not using a hitch.

READ  Cloud stays a small share of IT spending, however its gravitation pull is large

Mac laptop with Apple Configurator 2 installedMethod to ship configuration profiles (electronic mail, net server, community file share, or exterior USB drive)
Web entry (Non-obligatory; however advisable)

Creating your first configuration profile

Log in to the Mac laptop and launch Apple Configurator 2Click File | New Profile to open a clean template.The primary display you  see is an administrative web page that permits you to present a reputation for the profile, together with setting safety permissions for it to permit or deny removing of the profile from a shopper system (Determine A).2019-21-figure-a.jpg2019-21-figure-a.jpghttp://www.techrepublic.com/

Be aware: Profiles might embody a number of settings collectively (monolithic) or could also be configured individually as separate information (skinny). No matter your deployment desire, please consider that if deploying these to end-user’s private machines, it could be a good suggestion to permit the person’s themselves to take away the profiles. Firm-owned gadgets; nevertheless, must be locked down the place doable (Determine B).

2019-21-figure-b.jpg2019-21-figure-b.jpghttp://www.techrepublic.com/

For this text, we’ll configure a Wi-Fi profile, which accommodates the community and safety settings required to connect with a wi-fi community. Start by clicking the Wi-fi community tab, and click on the configure button (Determine C).

2019-21-figure-c.jpg2019-21-figure-c.jpghttp://www.techrepublic.com/

Enter the related particulars, comparable to SSID, safety kind, and passphrase to connect with the wi-fi community. As soon as accomplished, it’s possible you’ll click on File | Save to call your profile and reserve it to a listing of your selecting (Determine D).

2019-21-figure-d.jpg2019-21-figure-d.jpghttp://www.techrepublic.com/

Whereas configuration profiles could also be created to handle numerous settings on each iOS/macOS gadgets, with some being shared, and others being distinctive to the system kind, most setting varieties are self-explanatory when selecting which varieties to successfully lockdown.

READ  Bloomberg alleges Huawei routers and community gear are backdoored

Deployment, as talked about above, is so simple as executing the profile from the system’s interface and permitting it to be put in. The profiles could also be emailed, shared as a hyperlink to cloud storage, provisioned by way of MDM, server share, or net server, comparable to self-service portal.

http://www.techrepublic.com/

Cell Enterprise Publication

BYOD, wearables, IoT, cell safety, distant assist, and the newest telephones, tablets, and apps IT professionals have to learn about are among the subjects we’ll tackle.
Delivered Tuesdays and Fridays

Enroll as we speak

Enroll as we speak

Additionally see