{"id":7116,"date":"2021-01-05T12:00:43","date_gmt":"2021-01-05T06:30:43","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=7116"},"modified":"2022-06-24T12:11:54","modified_gmt":"2022-06-24T06:41:54","slug":"apple-device-management-and-endpoint-security-for-fully-remote-teams","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/","title":{"rendered":"Apple@work: Apple device management for fully remote teams"},"content":{"rendered":"<p><span data-contrast=\"auto\">Workplaces are constantly evolving.\u00a0<\/span><span data-contrast=\"auto\">Even before the<\/span><span data-contrast=\"auto\"> advent of<\/span><span data-contrast=\"auto\"> the Covid-19 pandemic, t<\/span><span data-contrast=\"auto\">he trend of <a href=\"https:\/\/www.hexnode.com\/blogs\/remote-device-management\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">working remotely<\/a> wa<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0gradually<\/span><span data-contrast=\"auto\">\u00a0gaining traction<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Now, when more and more<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">employees are working from home or from remote places, the\u00a0<\/span><span data-contrast=\"auto\">responsibilities of the IT admin\u00a0<\/span><span data-contrast=\"auto\">remain<\/span><span data-contrast=\"auto\"> the same: to manage, secure, and\u00a0<\/span><span data-contrast=\"auto\">protect the devices, users, and corporate resources. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At HexCon20, we had the opportunity to listen to an illuminating<\/span><span data-contrast=\"auto\">\u00a0breakout<\/span><span data-contrast=\"auto\">\u00a0session\u00a0<\/span><span data-contrast=\"auto\">by\u00a0<\/span><span data-contrast=\"auto\">Bradley Chamber<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">, an author at 9to5Mac with\u00a0<\/span><span data-contrast=\"auto\">more than 11 years of experience at Apple device management.<\/span><span data-contrast=\"auto\">\u00a0The scene of <a href=\"https:\/\/www.hexnode.com\/blogs\/8-things-you-should-know-about-apple-device-management\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Apple Enterprise Management<\/a> is very different now than that of 10-11 years ago.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<blockquote><p><span data-contrast=\"auto\">One of the things that is unique with technology is that you are never done with technology.<\/span><\/p>\n<p>-Bradley Chambers<\/p><\/blockquote>\n<p><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Bradley spoke about the different responsibilities of an IT admin and methods to secure, troubleshoot, and manage the remote Apple <\/span><span data-contrast=\"auto\">endpoints.<\/span><span data-contrast=\"auto\">\u00a0In this blog, we have attempted to cover the key points discussed<\/span><span data-contrast=\"auto\">\u00a0in the session<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Supporting End Users in a\u00a0<\/span><\/b><b><span data-contrast=\"none\">Remote Work World<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Working remotely is no longer an option to be mulled over. It is a legitimate way to work followed globally. Throughout the session, Bradley discussed the<\/span><span data-contrast=\"none\"> different steps that need to be taken to support the end-users working remotely.<\/span><span data-contrast=\"none\">\u00a0From device deployments to device\u00a0<\/span><span data-contrast=\"none\">repairs and off-boarding, we get an idea of <a href=\"https:\/\/www.hexnode.com\/blogs\/remote-device-management\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">managing the endpoints remotely<\/a> throughout the device lifecycle.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Shadow IT vs Remote IT<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/Bradley-Chambers.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/Bradley-Chambers.png\" alt=\"Apple remote management with Bradley Chambers\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Bradley Chambers highlights the differences between Shadow IT and Remote IT<\/em><\/center><span data-contrast=\"auto\">What is Shadow IT?\u00a0<\/span><span data-contrast=\"auto\">Consider a situation when the existing tools of your organization don\u2019t meet the <\/span><span data-contrast=\"auto\">employee needs. When faced with such a situation, it is possible that the employee seeks out an external solution outside the purview of the I<\/span><span data-contrast=\"auto\">T department.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Employing such external IT solutions\u00a0<\/span><span data-contrast=\"auto\">without the knowledge of the central IT department is Shadow IT.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The question may arise, does Shadow IT pose any problems?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">The answer is a<\/span><span data-contrast=\"auto\">\u00a0definite<\/span><span data-contrast=\"auto\">\u00a0yes.\u00a0<\/span><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">he requirements are satisfied temporarily, but the central IT department has no means to control or audit the external solution.<\/span><span data-contrast=\"auto\"> The IT department is responsible for the company\u2019s data and <a href=\"https:\/\/www.hexnode.com\/blogs\/ios-security-should-i-be-concerned\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">security<\/a>.\u00a0<\/span><span data-contrast=\"auto\">If the<\/span><span data-contrast=\"auto\">\u00a0other departments use solutions with<\/span><span data-contrast=\"auto\">out the IT department\u2019s involvement,\u00a0<\/span><span data-contrast=\"auto\">chances are that these solutions may not comply with the compliance and security goals of the organization.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How to get rid of Shadow IT?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">It is simple.\u00a0<\/span><span data-contrast=\"auto\">The IT department should make sure that while choos<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">an<\/span><span data-contrast=\"auto\">\u00a0IT solution, they take into consideration the needs of the organization and its employees as a\u00a0<\/span><span data-contrast=\"auto\">whole.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Is Remote IT any different from Shadow IT?\u00a0<\/span><span data-contrast=\"auto\">Of course,<\/span><span data-contrast=\"auto\">\u00a0it is. Unlike Shadow IT, there is no unauthorized third-party applications or solutions deployed. In Remote IT, the IT admin\u00a0<\/span><span data-contrast=\"auto\">enables the users to\u00a0<\/span><span data-contrast=\"auto\">leverage tools\u00a0<\/span><span data-contrast=\"auto\">and resources even though the admin has no direct access to the device.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">A \u201cNew Network\u201d in the \u201cNew Normal\u201d<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Traditionally, the security of the network was built around the \u201cperimeters\u201d that isolated the internal servers f<\/span><span data-contrast=\"auto\">rom the external networks.<\/span><span data-contrast=\"auto\">\u00a0As long as the perimeter was secured, the network would also\u00a0<\/span><span data-contrast=\"auto\">be considered<\/span><span data-contrast=\"auto\">\u00a0to be secured.<\/span><span data-contrast=\"auto\">\u00a0The concept works fine un<\/span><span data-contrast=\"auto\">til the attack comes from within. How to secure the networks completely?<\/span><span data-contrast=\"auto\">\u00a0Hence, the revolutionary <a href=\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust security concept<\/a> of <a href=\"https:\/\/www.hexnode.com\/blogs\/zero-trust-and-cybersecurity-with-hexnode-mdm\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cNever trust, always verify\u201d<\/a> arose.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As Bradleys states, \u201cIn Zero Trust networking environment, everything is assumed to be insecure by default. Only after passing a checklist, the\u00a0<\/span><span data-contrast=\"auto\">devices and users are deemed to be secure.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Deploying devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/03\/Apple-device-deployment-scaled.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/03\/Apple-device-deployment-scaled.jpg\" alt=\"Deploying apple devices\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Apple device deployment<\/em><\/center>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">There are two main aspects in device deployment. The first one is a no-brainer \u2013 Configuration management<\/span><span data-contrast=\"auto\">, i.e., setting up the devices\u00a0<\/span><span data-contrast=\"auto\">correct<\/span><span data-contrast=\"auto\">ly with all the proper configurations. The second aspect is logistics<\/span><span data-contrast=\"auto\"> \u2013 how do you actually order the devices and ensure that it reaches the end-users?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2019\/02\/hybrid-mdm-with-configuration-manager.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2019\/02\/hybrid-mdm-with-configuration-manager.png\" alt=\"Apple Business\/School Manager\" width=\"426\" height=\"284\" \/><\/a>\u00a0<\/center><span data-contrast=\"auto\">For enterprises focus<\/span><span data-contrast=\"auto\">ed<\/span><span data-contrast=\"auto\">\u00a0on Apple<\/span><span data-contrast=\"auto\">, tools like <a href=\"https:\/\/www.hexnode.com\/blogs\/apple-business-manager-reconceptualizing-business-excellence\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Apple Business<\/a> \/School Manager and Apple\u2019s online business portal help in easing the process of device deployment.\u00a0<\/span><span data-contrast=\"auto\">The online business portal allows you to view and purchase business devices. While you can ship<\/span><span data-contrast=\"auto\">\u00a0it after purchasing, Bradley suggests a simpler way \u2013\u00a0<\/span><span data-contrast=\"auto\">dropshipping<\/span><span data-contrast=\"auto\"> the device to the end-users<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">An important step in device deployment is to select a suitable <a href=\"https:\/\/www.hexnode.com\/blogs\/top-10-mdm-solutions-2020\/?utm_source=hexnode_blog_apple_remote_management&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">MDM solution<\/a> and integra<\/span><span data-contrast=\"auto\">te it with your Apple Business Manager account. Using Apple\u2019s Device\u00a0<\/span><span data-contrast=\"auto\">Enrollment<\/span><span data-contrast=\"auto\">\u00a0Program, the admin can<\/span><span data-contrast=\"auto\">\u00a0use the device serial numbers to<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">deploy devices in bulk\u00a0<\/span><span data-contrast=\"auto\">by automatically apply<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0the configurations and settings when the user turns on the device<\/span><span data-contrast=\"auto\">\u00a0for the first time.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">How to enable users to support themselves?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">There is no guarantee that the remote workers would have regular uninterrupted IT support that they would otherwise enjoy in a typical workspace.<\/span><span data-contrast=\"auto\">\u00a0The remote workforce should be independent enough to troubleshoot and resolve minor issues on their own to reduce the dependenc<\/span><span data-contrast=\"auto\">y on IT.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The first step in increasing autonomy is<\/span><span data-contrast=\"auto\"> having\u00a0<\/span><span data-contrast=\"auto\">well-developed<\/span><span data-contrast=\"auto\">\u00a0documentation that the users can easily follow.\u00a0<\/span><span data-contrast=\"auto\">W<\/span><span data-contrast=\"auto\">hat goes wrong in general and how to fix it?<\/span><span data-contrast=\"auto\">\u00a0If the issue is not fixed even after the basic troubleshooting, the IT can swoop in to help with tools like remote access.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Remote app installation and Remote Access tools<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/03\/Remote-app-deployment.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/03\/Remote-app-deployment.jpg\" alt=\"Remote app deployment\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Remote app deployment<\/em><\/center>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Installing applications remotely can be done either at the initial device deployment or at a later time when new applications need to be installed. There are two types of applications: apps from the App Store and apps that are not.\u00a0<\/span><span data-contrast=\"auto\">Installing apps from the App Store remotely is a piece of cake for Apple devices. Go to your Apple Business Manager account, purchase<\/span><span data-contrast=\"auto\">\u00a0licenses of<\/span><span data-contrast=\"auto\">\u00a0the<\/span><span data-contrast=\"auto\">\u00a0needed<\/span><span data-contrast=\"auto\">\u00a0apps from the Apps and Books and deploy these\u00a0<\/span><span data-contrast=\"auto\">using your MDM solution.\u00a0<\/span><span data-contrast=\"auto\">For apps that are not in the App Store, the enterprise apps can<\/span><span data-contrast=\"auto\">\u00a0be uploaded and deployed by your MDM solution<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">If you are new<\/span><span data-contrast=\"auto\">\u00a0to Apple Device Management<\/span><span data-contrast=\"auto\">, I wou<\/span><span data-contrast=\"auto\">ld strongly suggest you to t<\/span><span data-contrast=\"auto\">ry the 14-day free trial of <\/span><span data-contrast=\"auto\">Hexnode<\/span><span data-contrast=\"auto\">\u00a0MDM to get an idea<\/span><span data-contrast=\"auto\">\u00a0about the whole process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><div class=\"signup_box\"><div class=\"signup_wrap_img\"><div class=\"signup-bg\" style=\"background-image:url(https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/04\/Special-purpose-laptop-used-by-employees-1.jpg?format=webp)\"><\/div><\/div><div class=\"signup_wrap\"><h5>Sign up now<\/h5><p>Try Hexnode for 14 days absolutely FREE of cost!<\/p><a href=\"https:\/\/www.hexnode.com\/mobile-device-management\/cloud\/signup\/?utm_source=hexnode_blog_apple_remote_management&utm_medium=referral&utm_campaign=trial_sign_up_box\" class=\"hn-cta__blogs--signup-stripe\" target=\"_blank\"> TRY 14 DAYS FREE<\/a><\/div><\/div><\/b><\/p>\n<p><span data-contrast=\"auto\">Remote Access tools are\u00a0<\/span><span data-contrast=\"auto\">unavoidable\u00a0<\/span><span data-contrast=\"auto\">when it comes to managing remote workers.\u00a0<\/span><span data-contrast=\"auto\">As Bradley says,\u00a0<\/span><span data-contrast=\"auto\">\u201cThe reason you need these tools is, sometimes you just need to see what the end-user sees because you can\u2019t physically touch the machine.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">It would be preferable if the remote access is granted only at user discretion. It increases trust and protects the privacy of the end-user. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">OS updates<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">When it comes to OS updates,\u00a0<\/span><span data-contrast=\"auto\">there are two paths you can take. One is to delay the updates as long as possible to avoid any possible confusion and issues. The other is to install the updates right away for the relevant security<\/span><span data-contrast=\"auto\">\u00a0fixes. Which one is the correct decision? Bradley states, \u201c<\/span><span data-contrast=\"auto\">When you are doing an OS update, you are going from the most stable version of one Operating System to the least stable version of the next one.\u201d\u00a0<\/span><span data-contrast=\"auto\">Some users may be fine with that, while others may not. Most of the users do not care about the updates. They are just concerned that their workflow isn\u2019t interrupted.\u00a0<\/span><span data-contrast=\"auto\">Apple OS updates can be delayed\u00a0<\/span><span data-contrast=\"auto\">up to<\/span><span data-contrast=\"auto\">\u00a090 days<\/span><span data-contrast=\"auto\">\u00a0using your MDM solution<\/span><span data-contrast=\"auto\">. Bradley suggests that we should delay the updates by a minimum of 30 days so that you do not have to deal with <\/span><span data-contrast=\"auto\">any initial big bugs.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Before forcing updates on the remote devices, it is advisable to inform the users so that they can safely backup important data and files. <\/span><span data-contrast=\"auto\">Whichever strategy you decide to adopt for OS updates, make sure to inform the end-user about it.<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Device Repairs<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/enhancing-employee-experiance.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/enhancing-employee-experiance.jpg\" alt=\"Device repairs\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Handling device repairs<\/em><\/center>&nbsp;<\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">There are many things that could go wrong with the device, either accidentally or some technical issue. For remote work, it would spell disaster if the device cannot be used. How can you handle the repairs remotely? One method is to maintain a business relationship with Apple and setup repairs at the local Apple store. The users can directly take their damaged device to the nearest Apple store and get their devices repaired. What happens when there is no Apple store in the vicinity of the user? It is recommended to find the nearest Apple authorized reseller and get the repairs done there. If there aren&#8217;t any authorized resellers nearby, the admin would have to take additional measures such as dropshipping a new device to the user and repairing the older one in the meantime. It is recommended to keep some spare devices handy for such scenarios. The priority here is to prevent any loss of the employee&#8217;s time.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Employee On-Boarding and Off-boarding<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>When a new employee is hired by the company, the employee has to be given access to different services such as the corporate email address, file sharing, HR software and so on. Similarly, when the employee leaves the company, access to these services has to be revoked. The admin has to ensure that the on-boarding and off-boarding process scales to remote work environments.<\/p>\n<h3><b><span data-contrast=\"none\">Concluding Remarks<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>Soon, the majority of the workforce is going to be remote. The IT admins need to reconsider the existing device management and security practices. Bradley discussed with us the basics of remote management of Apple devices. Follow <a class=\"twitter-handle\" href=\"https:\/\/twitter.com\/bradleychambers\" target=\"_blank\" rel=\"noopener noreferrer\">@bradleychambers<\/a> on Twitter or contact him at <a href=\"mailto:Bradley@9to5mac.com\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Bradley@9to5mac.com<\/span><\/a> to discuss more on the topic. You can always contact <a href=\"mailto:support@hexnode.com\" target=\"_blank\" rel=\"noopener noreferrer\">support@hexnode.com<\/a> or ping Hexnode chat support for any queries or help.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workplaces are constantly evolving.\u00a0Even before the advent of the Covid-19 pandemic, the trend of working&#8230;<\/p>\n","protected":false},"author":24,"featured_media":7168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4783],"tags":[5029,5025],"class_list":["post-7116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-work-from-home","tag-apple-device-management","tab_group-inside-hexnode"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple@work: Apple device management for fully remote teams<\/title>\n<meta name=\"description\" content=\"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple@work: Apple device management for fully remote teams\" \/>\n<meta property=\"og:description\" content=\"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-05T06:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-24T06:41:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/23144705\/apple%40work-for-Remote-teams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1340\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/\",\"name\":\"Apple@work: Apple device management for fully remote teams\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp\",\"datePublished\":\"2021-01-05T06:30:43+00:00\",\"dateModified\":\"2022-06-24T06:41:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\"},\"description\":\"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp\",\"width\":1340,\"height\":720,\"caption\":\"apple@work for Remote teams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple@work: Apple device management for fully remote teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\",\"name\":\"Emily Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"caption\":\"Emily Brown\"},\"description\":\"Reading is therapy and writing is healing...sincerely, a cool nerd.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple@work: Apple device management for fully remote teams","description":"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/","og_locale":"en_US","og_type":"article","og_title":"Apple@work: Apple device management for fully remote teams","og_description":"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.","og_url":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/","og_site_name":"Hexnode Blogs","article_published_time":"2021-01-05T06:30:43+00:00","article_modified_time":"2022-06-24T06:41:54+00:00","og_image":[{"width":1340,"height":720,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/23144705\/apple%40work-for-Remote-teams.jpg","type":"image\/jpeg"}],"author":"Emily Brown","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emily Brown","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/","url":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/","name":"Apple@work: Apple device management for fully remote teams","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp","datePublished":"2021-01-05T06:30:43+00:00","dateModified":"2022-06-24T06:41:54+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d"},"description":"Learn everything about Apple device management and endpoint security for fully remote teams with Bradley Chambers and Hexnode.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/01\/apple%40work-for-Remote-teams.jpg?format=webp","width":1340,"height":720,"caption":"apple@work for Remote teams"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/apple-device-management-and-endpoint-security-for-fully-remote-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Apple@work: Apple device management for fully remote teams"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d","name":"Emily Brown","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","caption":"Emily Brown"},"description":"Reading is therapy and writing is healing...sincerely, a cool nerd.","url":"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/7116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=7116"}],"version-history":[{"count":18,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/7116\/revisions"}],"predecessor-version":[{"id":19106,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/7116\/revisions\/19106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/7168"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=7116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=7116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=7116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}