© Charles Edge and Rich Trouton 2020
C. Edge, R. TroutonApple Device Managementhttps://doi.org/10.1007/978-1-4842-5388-5_8

8. Securing Your Fleet

Charles Edge1  and Rich Trouton2
(1)
Minneapolis, MN, USA
(2)
Middletown, MD, USA
 

What’s really a threat on an Apple device? That’s often according to who you ask. But in order for Apple devices to be allowed on corporate networks, there’s a few criteria that must be met and rarely have I seen an auditor who is willing to budge on these requirements. If you disagree that something is necessary then you should absolutely speak up; however, a second or third effort is really just likely to make them dig into their position. And sometimes, they’re right.

2018 was one of the roughest years for Mac security. You ...

Get Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.