macOS Management

Bring macOS Into the Enterprise Along With iOS


Apple and VMware: Deploying Mac in the Enterprise

Get the Report

Use the same management framework for managing iOS devices on macOS devices by leveraging unified endpoint management (UEM) technology to provide consistent management across Apple devices.

Device and OS Lifecycle

Eliminate high touch for IT and get full visibility into your deployment.

Support corporate-owned and BYO Macs, as well as line of business kiosk or shared device use cases in a single management solution
Streamline setup with Apple Business Manager and Apple School Manager (DEP + VPP)
Leverage a Bootstrap Enrollment Process to deliver necessary tools for onboarding
Set up Macs over the air with WiFi, VPN, email, apps and more, while also configuring local and admin accounts to deliver security policies, compliance rules and restrictions
Defer or delay macOS updates when needed or force updates to comply with security requirements
Gain full visibility into your Mac deployment, including AppleCare integration

[+] Read More

App Management

Manage the complete app lifecycle, including procurement, security, deployment, management and reporting.

Deploy any application to a unified app catalog with single sign on (SSO) for users
Enable virtual Windows apps or apps requiring Internet Explorer to run on Mac devices
Support managed license assignments for apps purchased through the Volume Purchase Program (VPP)
Create products containing profiles, apps, files and actions that follow rules, schedules and dependencies with streamlined product provisioning
Deliver software and security updates on a defined schedule through relay servers

[+] Read More


Define the settings, policies and rules to keep users, devices and data compliant and secure.

Define settings for FileVault to ensure devices are encrypted and Gatekeeper to protect devices from apps downloaded from unknown sources
Maintain control of the admin account on devices and utilize firmware passwords to prevent users from changing critical security settings and policies
Discourage users from sharing sensitive data by highlighting unmanaged domain email addresses and setting automated escalation policies to notify users when devices are out of compliance
Use conditional access controls so only authorized users and compliant devices have access to enterprise resources
Expose a limited set of data center resources to your apps via app- and network-level micro-segmentation and per-app VPN

[+] Read More

  1. Device and OS Lifecycle
  2. App Management
  3. Security