Category filter

iOS Supervision Logic: Why “Supervised Mode” is mandatory for global filters

1. Executive Summary

To maintain a high security posture and ensure compliance with corporate web usage policies, company-owned iOS devices must be deployed in Supervised Mode. This elevated management state is a strict technical requirement from Apple for institutionally owned devices. It grants the organization the foundational authority to enforce advanced network controls—such as a Global HTTP Proxy or Web Content Filter—across all network interfaces (Wi-Fi and Cellular) without the user being able to bypass or remove them.

2. The Logic: Personal (Unsupervised) vs. Supervised

Apple’s ecosystem is built around the idea that devices are ‘Personal by Default.’ To honor that privacy, devices in an Unsupervised state (like those in BYOD or standard Device Enrollment programs) intentionally restrict how much control an MDM profile can exert. In this state, a user could easily delete a security filter or bypass company network policies.

Supervision fundamentally changes device ownership at the OS level, unlocking deeper administrative controls.

Feature / Capability Unsupervised (Personal / BYOD) Supervised (Corporate-Owned)
Network Filter Scope Limited strictly to specific Wi-Fi networks. Global (Enforced across all Wi-Fi, 5G, and LTE connections).
Filter Removability The user can navigate to Settings and easily delete the filter or VPN profile. The filter is locked at the OS level and cannot be modified by the user.
Traffic / App Coverage Can only route traffic for specific “Managed” corporate apps. Routes all device traffic, including native Safari, Chrome, and unmanaged social apps.
iCloud Private Relay The user can enable Private Relay to encrypt and hide DNS/web traffic from IT. IT can permanently disable Private Relay via restriction payloads to ensure traffic visibility.
MDM Profile Lock The management profile is always removable by the end-user. The MDM profile can be made Non-Removable (Requirement: Device must be Supervised and enrolled via Apple Business Manager/ADE).
Advanced Restrictions Limited (e.g., basic passcode enforcement and corporate email wipe). Extensive (e.g., Autonomous Single App Mode/Kiosk, blocking App Store, disabling account modifications).

3. Why Global Filtering Requires Supervision

Apple explicitly restricts advanced network routing—specifically Global HTTP Proxy and Web Content Filtering—to Supervised devices (iOS 7.0+). These features tell the iOS kernel how to handle every packet of data leaving the device.

Apple mandates Supervision for these powerful capabilities for two primary reasons: Privacy Protection and Un-bypassable Persistence.

The Privacy Protection Mandate

In a BYOD (Unsupervised) scenario, allowing an MDM to globally route traffic would mean IT could intercept personal banking, healthcare, and private browsing data across all networks. Apple prevents this by ensuring that a standard MDM profile can only route traffic for specific managed corporate apps. By forcing a device into Supervised Mode (which requires a factory wipe or ADE out-of-the-box setup), Apple guarantees the user is explicitly aware that the device is corporate-owned and that all HTTP/HTTPS traffic is being buffered or monitored by the organization.

Un-bypassable Persistence & Feature Deep-Dive

Supervision allows the MDM to deeply “tether” these security filters to the hardware. Even if the device is rebooted, moved to a different Wi-Fi network, or the SIM card is swapped, the policies remain active.

Hexnode leverages this Supervised state to enforce two distinct, mandatory network controls:

  • Web Content Filtering: IT can deploy a strict Blocklist (denying specific URLs), an Allowlist (creating a locked-down kiosk-style browsing experience where only approved URLs load), or enable Apple’s built-in automatic filter to block adult and inappropriate content system-wide.
  • Global HTTP Proxy (Manual or Automatic): Routes the entire device’s HTTP network traffic through a corporate proxy server. IT can configure this Manually (via Server IP and Port) or Automatically (using a PAC file script).
    • The “Fail-Closed” Advantage: With Supervision, IT can configure a strict fail-safe. If the automatic proxy (PAC file) becomes unreachable, the admin can set the policy to disallow direct connection. This effectively cuts off all internet access until the secure proxy is reachable again, guaranteeing that no unfiltered data ever leaves the endpoint.

4. How to Achieve Supervision

Supervision cannot be enabled on a device that is already set up and in use without wiping it. It is a foundational state that must be triggered during the initial “Hello” out-of-the-box setup.

To prevent shadow IT and ensure compliance, Apple provides two strict pathways to supervise an iOS device:

Best for: Bulk corporate purchases and zero-touch deployments. Devices purchased directly through Apple or authorized resellers are automatically added to your Apple Business Manager (ABM) or Apple School Manager (ASM) portal.

  • Prerequisite: The Hexnode ADE server token must be linked and synced with your ABM account.
  • Step: In the ABM portal, assign the device’s serial number to your designated Hexnode MDM server.
  • Result: Upon unboxing and connecting to Wi-Fi, the device automatically contacts Apple’s servers and pulls the “Supervised” profile over-the-air. Crucially, this is the only method that can make the MDM profile completely non-removable by the end-user.

Method B: Apple Configurator – Manual

Best for: Donated hardware, legacy devices, or off-the-shelf retail purchases not natively linked to your ABM account. This method uses a wired connection to prepare the iOS device.

  • Critical Prerequisites:
    1. A Mac Computer: While you are supervising an iOS device, the Apple Configurator application itself only runs on macOS.
    2. Disable Activation Lock: Find My iPhone/iPad must be turned off on the target device before beginning. If it is left on, the supervision process will fail.
  • Step: Physically tether the iOS device to the Mac via USB. In Apple Configurator, create a “Blueprint” that includes a corporate Wi-Fi profile and the specific Hexnode MDM Server URL. Apply the Blueprint by selecting Prepare > Manual Configuration > Supervise Devices.
  • Result & Warning: The Mac will deploy the configuration to the iOS device.

    Warning: This process initiates a complete factory reset, permanently wiping all existing personal data on the iPhone or iPad before rebooting it into a Supervised state.

5. Implementation Guide (Policy Setup)

Once the iOS device is confirmed to be in Supervised Mode, follow these steps in your Hexnode UEM console to deploy the network filters and lock them down.

Step 1: Configure the Global HTTP Proxy

  • Path: Policies > New Policy > Create a fully custom policy > iOS > Security > Global HTTP Proxy.
  • Action: Select your Proxy Type:
    • Manual: Enter your Server IP/Hostname and Port (e.g., 8080). If it is a private proxy, input the required authentication credentials.
    • Automatic (PAC URL): Provide the URL to your configuration script. To enforce a strict “Fail-Closed” security posture, ensure that Allow direct connection if PAC is unreachable is left disallowed/unchecked. This cuts off internet access if the proxy goes down, preventing unfiltered traffic leaks.

Step 2: Configure Web Content Filtering

  • Path: Policies > New Policy > Create a fully custom policy > iOS > Security > Web Content Filtering.
  • Action: Choose your Filter Type:
    • Blocklist: Enter specific URLs to deny access. You can also enable “Restrict inappropriate Content” to leverage Apple’s built-in automatic filter for adult content.
    • Allowlist: Creates a locked-down browsing experience. Enter specific URLs and Safari Bookmarks; the device will block all other internet traffic.
  • Note: When a Web Content Filter is applied, iOS automatically disables Safari’s “Private Browsing” mode and prevents the user from clearing their browsing history.

Step 3: Enforce Device Restrictions

To prevent users from bypassing the web filters via shadow accounts, you must restrict account modification.

  • Path: Policies > New Policy > Create a fully custom policy> iOS > Advanced Restrictions.
  • Action: Locate Modify an account and uncheck/disable it. When disabled, users are not permitted to create/delete an account or change the password of an account. Account modification also includes modification of app accounts accessible from the device settings app, such as Mail, Calendar, Contacts, and more. Allowed by default, so it must be explicitly turned off.

Step 4: Lock the MDM Profile (ADE Prerequisite)

The ability to make an MDM profile non-removable is an enrollment setting configured before the device even boots, not a standard policy restriction.

  • Path: Enroll > All Enrollments > No-Touch > Apple Business/School Manager > Enrollment Profiles .
  • Action: Edit your default ADE profile and locate the Allow MDM Profile Removal setting. Ensure this is unchecked/disabled. If checked, it makes the profile removable after device enrollment. If disabled, users will be permanently blocked from manually removing the MDM profile from the device.

6. Frequently Asked Questions (FAQ)

Q1: Is it possible to place an existing, active device into Supervised Mode without wiping its data?

No. Apple’s privacy and security architecture strictly prohibits this. To prevent “shadow IT” or unauthorized surveillance of personal data, an iOS device must undergo a complete factory reset to transition from a personal (unsupervised) state into a Supervised state. This is why utilizing Automated Device Enrollment (ADE) during the initial out-of-the-box setup is the recommended enterprise workflow.

Q2: Will the Global HTTP Proxy or Web Content Filter remain active if the user connects to their home Wi-Fi or a public hotspot?

Yes. Unlike standard Wi-Fi proxy settings that are tied to a specific network SSID, a Global HTTP Proxy and Web Content Filter are enforced at the iOS kernel level. The security routing rules follow the device persistently across all network interfaces—whether the user is on corporate Wi-Fi, home networks, public hotspots, or international 5G/LTE roaming.

Q3: What happens to the device’s internet connection if the proxy server goes offline or becomes unreachable?

This depends entirely on your IT configuration. You can configure the payload to either “Fail-Open” or “Fail-Closed.” In Hexnode, if you disable the Allow direct connection if PAC is unreachable setting, you create a strict “Fail-Closed” environment. In this state, the iOS device will intentionally lose all internet access until the secure proxy can be reached, guaranteeing that no unfiltered or unmonitored data ever leaves the endpoint.

Solution Framework