![]() When working with supervised devices, supervision identities are required.Enter the desired details and click the Next button. If you wish to enter information about the organization, you may do so on the following page.Otherwise, supervised devices will be disallowed from pairing with computers. Additionally, if you wish to allow supervised devices to pair with their computers, check the box to allow that functionality. On the Supervise Devices page, you will be prompted to check the box next to Supervise devices, which enables supervision on that device.Again, we will not be enrolling this device in an MDM, so we will select Do not enroll in MDM from the drop-down menu and click the Next button to proceed. On the next page, you’ll be prompted to select the server to manage the device with post-AC2.For the purposes of this article and since we are not configuring the device for MDM management, select Manual from the drop-down menu, then click the Next button. Since AC2 can be used to prepare devices for MDM use, we are prompted with the Configuration type on the first page of the wizard.In AC2, select the iOS device you wish to configure, then click on Actions | Prepare… to launch the wizard.Connect the device(s) to be configured to the Mac using the USB cable.Login to the Mac computer and launch the Apple Configurator 2 (AC2) app.SEE: BYOD policy (Tech Pro Research) Configuring a device for supervision When supervising a device, ensure that existing data on the devices are backed-up since the supervision process erases all the data on the device and reinstalls (or upgrade) iOS, setting the foundation for the management platform. However, admins may wish to consult iOS release notes to verify that individual devices have the correct version of iOS installed so that support of required functions/features is adhered to. SEE: iPad Pro 2018: Cheat sheet (TechRepublic) Are there any requirements for a device to be supervised?Īny iOS device running iOS 5 (at least) is eligible for supervision. Additional restrictions include setting profiles for corporate network and email access, company branding, and key escrow services that store a recovery key that may be used to bypass Activation Lock on iCloud-linked devices, for example. Among the more popular settings that admins can control include requiring passcodes for unlocking devices, setting minimum passcode lengths and complexity requirements, as well as timeouts and incorrect passcode lockouts, all of which protect data stored on devices from unauthorized access and data exfiltration in the event of loss or theft. This list of functions that are manageable are long–and continue to grow with the introduction of each new version of iOS. ![]() What features can be secured when a device is supervised? While additional support for greater features continues to be included, the crux of supervise remains the same: To allow systems administrator’s greater control over iOS devices by securing and allowing the configuration of features and functions, allowing these devices (typically enterprise-owned) to be locked down to prevent unauthorized changes that could otherwise lead to device compromise, and by extension, compromise the data and/or business network. Supervision was introduced in iOS 5 and has experienced many framework updates over the years as newer versions of iOS are introduced. SEE: Mobile device computing policy (Tech Pro Research) What is supervise mode? iPad or iPhone device with iOS 12 (or later) installed.Internet access (Optional, but highly recommended to download applications). ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |