Skip to main content
apple mobile device management

Apple devices make up a growing share of enterprise fleets. iPhones for field teams, iPads for retail, Macs for engineering. Managing them at scale requires a purpose-built approach: Apple Mobile Device Management (MDM).

This guide covers how Apple MDM works, what enrollment options you have, which security policies matter, and how to connect everything through Apple Business Manager.

What Is Apple Mobile Device Management?

Apple MDM is a protocol built into iOS, iPadOS, macOS, and tvOS that lets administrators configure, monitor, and secure devices remotely. Unlike third-party agent-based systems, Apple's MDM framework is native to the operating system. This means no sideloaded software, no battery drain from background agents, and no workarounds for sandboxing restrictions.

The protocol works through a push notification model. When an admin sends a command (install a profile, lock a device, push an app), Apple Push Notification service (APNs) notifies the device. The device then checks in with the MDM server to receive and execute the command.

For an MDM solution to work with Apple devices, it must support the Apple MDM protocol. Appaloosa, for example, is a certified Apple MDM provider that connects directly to Apple Business Manager for device enrollment and app distribution.

Apple MDM Enrollment Methods

How devices get enrolled determines what level of control you have over them. Apple provides three main paths, each suited to different ownership models.

Automated Device Enrollment (ADE)

Previously called DEP (Device Enrollment Program), ADE is the gold standard for corporate-owned devices. When you purchase devices through Apple or an authorized reseller, they are registered in Apple Business Manager. On first boot (or after a factory reset), the device automatically enrolls in your MDM server. No manual steps, no user intervention.

ADE-enrolled devices are supervised by default. Supervision unlocks additional management capabilities: silent app installation, restricting AirDrop, preventing iCloud backup, hiding built-in apps, and enforcing always-on VPN. If you manage corporate iPhones or iPads, ADE should be your default enrollment method.

Device Enrollment via Profile

For devices you already own but did not purchase through official channels (or older devices not registered in ABM), you can enroll them by installing an MDM profile. The user opens a URL, downloads the profile, and approves the installation in Settings.

Profile-enrolled devices are not supervised unless you manually supervise them with Apple Configurator. This limits what commands you can execute remotely. Still, you retain core capabilities: pushing Wi-Fi and email configurations, enforcing passcode policies, and distributing apps.

User Enrollment (BYOD)

Apple introduced User Enrollment specifically for bring-your-own-device scenarios. It creates a separate managed partition on the device. Corporate apps and data live in that partition; personal data stays private. The admin cannot see personal apps, browsing history, or location.

This is the right choice when employees use their personal iPhones for work. You get enough control to protect corporate data (managed apps, per-app VPN, remote wipe of the work partition) without overstepping into personal territory.

Security Policies for iOS Device Management

Security is the primary reason most organizations adopt Apple MDM. Here are the policies that matter most for iOS and iPadOS fleets.

Passcode and Authentication

Enforce minimum passcode length, complexity, and auto-lock timers. For high-security environments, require alphanumeric passcodes and set a maximum number of failed attempts before the device wipes itself. Pair this with Face ID or Touch ID enforcement for a balance of security and usability.

Encryption and Data Protection

All modern Apple devices encrypt data at rest by default (AES-256). MDM ensures this stays enabled and prevents users from disabling it. You can also enforce restrictions on data sharing between managed and unmanaged apps, preventing corporate documents from being opened in personal apps or shared via personal iCloud.

Network Security

Push Wi-Fi configurations with WPA3 Enterprise certificates so devices connect to your corporate network without users seeing or sharing credentials. Configure per-app VPN to route only corporate app traffic through your VPN, reducing bandwidth and keeping personal browsing private. For sensitive environments, restrict cellular data usage or disable personal hotspot.

Lost and Stolen Device Response

Remote lock sends the device into Lost Mode immediately, displaying a custom message and phone number. Remote wipe erases all data. For ADE-enrolled devices, you can also use Activation Lock management: if a device is stolen, it cannot be reactivated without your organization's credentials, even after a full restore.

App Distribution and Management

Managing apps on Apple devices goes beyond installing them. You need to handle licensing, updates, and removal.

Volume Purchase Program (VPP)

Through Apple Business Manager, you purchase app licenses in bulk. These licenses are assigned to devices (not Apple IDs), which means you can install apps silently on supervised devices without requiring user interaction. When a device is decommissioned, the license reverts to your pool for reassignment. This approach works for both App Store apps and custom in-house apps.

Managed App Configuration

Many enterprise apps support managed app configuration (AppConfig). This lets you pre-configure app settings (server URLs, authentication tokens, feature flags) before the app even launches. For IT teams deploying apps like Salesforce, Microsoft Outlook, or custom field apps, this eliminates the manual setup step for every user.

Private App Store

For organizations distributing internal apps, an enterprise app store gives employees a curated catalog. Appaloosa provides a private app store where you can publish iOS, Android, and web apps in one place. Users see only the apps approved for their role or department.

Apple Business Manager: The Control Center

Apple Business Manager (ABM) is the hub that connects your Apple device fleet to your MDM solution. It handles three things:

Device registration. Every device purchased through Apple or authorized resellers appears in ABM. You assign it to your MDM server so it enrolls automatically on activation.

App licensing. You buy and assign app licenses here. Licenses are portable across devices, so when someone gets a new iPhone, their apps follow.

Managed Apple IDs. For organizations using Apple School Manager or Apple Business Essentials, ABM creates managed Apple IDs that are separate from personal ones. This keeps corporate data partitioned from personal iCloud accounts.

If you are migrating from the legacy Apple Developer Enterprise Program, the move to ABM is straightforward. Your MDM provider handles the technical connection, and devices re-enroll on their next check-in.

Managing Macs with MDM

macOS supports the same MDM protocol as iOS, but with additional capabilities specific to desktop environments.

Bootstrap tokens. MDM can escrow bootstrap tokens so that users with Secure Token can enable FileVault or install kernel extensions without IT physically touching the Mac.

System extensions. On Apple Silicon Macs, kernel extensions are deprecated. MDM can pre-approve system extensions (for security tools, VPN clients, etc.) so they activate without requiring user approval at the Security preference pane.

Software updates. MDM can enforce macOS update deadlines. You set a date, and the Mac nudges the user to update. After the deadline, it installs automatically. This closes the gap where users defer critical security patches for weeks.

Mac management through MDM works best when combined with ADE. A Mac enrolled via ADE can be provisioned fully over the air: the user opens the box, connects to Wi-Fi, and the Mac configures itself with all apps, settings, and certificates.

Choosing an Apple MDM Solution

When evaluating MDM providers for Apple devices, focus on a few practical criteria:

Apple protocol support. The vendor should support the latest Apple MDM protocol features within weeks of each iOS and macOS release. Delayed support means delayed access to new security controls.

Enrollment flexibility. You need ADE, profile enrollment, and User Enrollment. Not every vendor supports all three well.

Cross-platform support. Most organizations manage Apple and Android devices together. A solution like Appaloosa's MDM handles both from a single console, which avoids running parallel systems.

App distribution. If you deploy custom or in-house apps, you need a vendor that integrates with VPP and provides a private app catalog.

Zero-touch deployment. The ability to ship devices directly to employees and have them self-configure on first boot. This is especially valuable for distributed teams or remote workers.

Getting Started with Apple MDM

If you are deploying Apple MDM for the first time, here is a practical sequence:

1. Set up Apple Business Manager. Register your organization, verify your domain, and connect your MDM server.

2. Define your enrollment strategy. ADE for new corporate devices, User Enrollment for BYOD, profile enrollment for legacy devices you already own.

3. Build your configuration profiles. Start with passcode policy, Wi-Fi, email, and VPN. Add restrictions based on your security requirements.

4. Configure app distribution. Buy licenses in ABM, assign them to device groups, and test silent installation on a pilot group.

5. Enroll a pilot group. Start with 10-20 devices across different roles. Validate that profiles apply correctly, apps install, and restrictions work as expected.

6. Roll out to production. Once validated, expand enrollment to the full fleet. Monitor compliance rates and adjust policies based on support tickets.

Apple devices are built for management. The MDM protocol, combined with Apple Business Manager and a capable MDM provider, gives IT teams the control they need without compromising the user experience that makes Apple devices popular in the first place.

Julien Ott
September 18, 2024

Ready to deploy MDM?

Get started today with unrestricted access to our platform and help from our product experts.

Get Started

Alternatively, contact sales.

Free 14-day trial
Cancel anytime, no questions asked.
Expert Support
Get customized and expert onboarding to get started.