Apple DEP - 2024 Flashcards
Need More Study
Relays
An array of dictionaries that describes one or more relay servers that can be chained together.
RelayUUID
A globally-unique identifier for this relay configuration. This UUID is used to route Managed Apps through the servers contained in Relays.
Match domains
A list of domain strings used to determine which connection should be routed through the servers contained in Relays. Any connection that matches the domain exactly or that is a subdomain of the listed domain will use the relay servers, unless they match an excluded domain. If no domains are listed, traffic to all domains, except those matching an excluded domain, is routed to the relay servers.
Excluded domains
A list of domain strings that shouldn’t be routed through the servers contained in Relays. Any connection that matches the domain exactly or that is a subdomain of the listed domain will not use the relay server.
APNS
TCP port 5223, 443, 2197 and IP range - 17.0.0.0/8
Declarative Device Management
It uses declarations to asynchronously update the device settings, restrictions, assets, and more. With status channels, devices proactively report the status of objects like passcode compliance and MDM-installed apps — without constant polling from the MDM server.
With declarative device management, the device asynchronously applies settings and reports the status back to the MDM solution without constant polling.
macOS Recovery on a Mac with Apple silicon Available Apps
Time Machine System Restore
Install macOS
Safari
Disk Utility
Startup Security Utility
Terminal
Share Disk
Startup Disk
Organization ID - Apple Business manager
Your Organization ID can be used to associate reseller-purchased devices or custom apps from third-party developers with Apple Business Manager
Federated Authentication - Apple Business manager
Federated authentication allows your users to sign in to their Managed Apple ID by signing into their Identity Provider
Google Workspace
Microsoft Entra ID
using their own Identity Provider
MDM Server Assignment -Apple Business manager
MDM server token download to upload to MDM
declarative device management
a device can apply management logic to itself without cues from the server and report important state changes to the server as they happen. The server doesn’t need to cue or poll the device.
Automated Device Enrollment
provides a zero-touch process with the most automated and scalable approach to procure, distribute, enroll, and manage organization-owned devices with MDM. Devices must be in your Apple Business Manager or Apple School Manager portal, and devices your organization purchases directly from Apple or a participating Apple Authorized Reseller or carrier are automatically added. You can add other organization-owned devices to the portal manually. Never add user-owned devices to your Apple Business Manager or Apple School Manager portal.
Device Enrollment
covers organization-owned devices that aren’t eligible for Automated Device Enrollment. Organizations use Device Enrollment to manually enroll devices in their MDM solutions. Examples include donated devices, devices set up by the user that are already in use, and devices bought outside official Apple procurement channels. Anyone with access to your MDM solution’s enrollment portal can enroll or reenroll devices already deployed. Unlike Automated Device Enrollment, a user can remove management from the device after enrollment.
User Enrollment
is for user-owned devices and requires an organization-provided Managed Apple ID. To enroll their devices in MDM, users either use their Managed Apple ID or manually install a user enrollment profile. If a user removes the enrollment profile, the MDM configuration profiles, settings, and managed apps are removed with it.
Apple Configurator on a Mac
to add iPhone, iPad, and Apple TV devices to your Apple Business Manager or Apple School Manager account
Apple Configurator app for iPhone
to add a Mac, iPhone, or iPad
user-owned device
You can’t manage Find My, Activation Lock, or Managed Lost Mode
Account-Based User Enrollment
users sign in to their work or school account on their device using their Managed Apple ID. If the account is federated, the user is redirected to the federated identity provider. Service discovery identifies the MDM solution’s enrollment URL. The MDM solution sends an enrollment profile to the device.
Profile-Based User Enrollment
the organization provides users with a URL or a self-service app and users then take the following steps:
Open the self-service app or open the URL in a browser. The device downloads the enrollment profile and any configuration profiles.
Agree to install the downloaded configuration profiles and enroll in MDM. This process on the Mac differs from the process on iPhone and iPad.
Sign in with their Managed Apple ID. If the account is federated, users are redirected to the federated identity provider.
When enrollment completes, users have an additional account in Settings on their iPhone, iPad, or Mac.
apple silicon how to block users from recovery mode
You can set Recovery Lock for computers with Apple silicon
DNS
An MDM solution must use a fully qualified domain name that can be resolved from both inside and outside the organization’s network.
IP address
Most MDM solutions require a static IP address.
Apple devices use a wide range of 802.1X wireless authentication protocols
Apple devices into many Remote Authentication Dial-In User Service (RADIUS) authentication environments.
authenticate wireless devices to your network using one of these strategies:
Open networks/Public
Captive networks
Wi-Fi Protected Access 2 (WPA2) Personal
Wi-Fi Protected Access 3 (WPA3) Personal
WPA2 Enterprise
WPA3 Enterprise
Configuration method (iOS 16.4, iPadOS 16.4, and macOS Ventura 13.3 or later): Private networks configured using a mobile device management (MDM) profile are preferred over manually joined networks.
Highest supported Wi-Fi standard: For example, Wi-Fi 6 networks are preferred over Wi-Fi 5 networks.
Frequency band: 6 GHz, then 5 GHz, then 5 GHz (DFS), then 2.4 GHz.
Security: WPA Enterprise, then WPA Personal, then WEP.
Signal strength: Learn more about RSSI and wireless roaming for enterprise.
standard VPN protocols
IKEv2, Cisco IPsec, and L2TP over IPsec