A department bought iPads outside of our registered Apple Education purchase account and now they can't be enrolled in DEP.
If I can't manage the iTunes account for this shared-use lab, what's my best course of action.
On another note, Apple Configurator 1.6 is dead slow updating new iPads to 8.0.2 even though the ipsw file is downloaded. It's taking over an hour. Any thoughts?
There are a number of apps out there, and new ones popping up all the time, that students are downloading for one reason or another. Mostly VPN apps to try and bypass our web filters. GBA4iOS is a little more innocuous, but does make the user change the time on their iPads to a date in the past.
We are blocking the install of Configuration Profiles which helps with VPNs. I also lock and disable features on the iPad if it is seen in inventory. It installs a Web Clip they click on that brings them to a page and explains why their iPad is disabled and how to get rid of it.
A new app I found yesterday is vShare. This is an app that allows you to pirate other apps, wants you to change the time on your iPad to a time in the past and installs a Provisioning Profile called "Anyone".
I would like to create this and start a list of apps that students use to bypass rules. A wiki of things that are Forbidden or otherwise screw up your configs. If this has already been done in another post please let me know, but I did not find anything. Here is my list so far:
Anyone - Provisioning profile
We are getting ready to deploy ipads in a shared environment. We are using Maas360 as our MDM. The only issue left is that there seems to be no way to prevent users from enabling a passcode on the device. A student could potentially configure a passcode and prevent the next person from picking up the ipad and using it.
Any way to lock them out of this? How are others dealing with this?
iOS 8.0.2 was released last night, just eight days after 8.0, and just a day or so after 8.0.1 was released but quickly pulled. Our database of iOS Devices has all the links for direct downloads. Here are the release notes.
This release contains improvements and bug fixes, including:
- Fixes an issue in iOS 8.0.1 that impacted cellular network connectivity and Touch ID on iPhone 6 and iPhone 6 Plus
- Fixes a bug so HealthKit apps can now be made available on the App Store
- Addresses an issue where 3rd party keyboards could become deselected when a user enters their passcode
- Fixes an issue that prevented some apps from accessing photos from the Photo Library
- Improves the reliability of the Reachability feature on iPhone 6 and iPhone 6 Plus
- Fixes an issue that could cause unexpected cellular data usage when receiving SMS/MMS messages
- Better support of Ask To Buy for Family Sharing for In-App Purchases
- Fixes an issue where ringtones were sometimes not restored from iCloud backups
- Fixes a bug that prevented uploading photos and videos from Safari
For information on the security content of this update, please visit this website:
Just a heads up that it looks like Apple may be using a different service now to load the App Store. I ran into the issue today where the App Store was blocked for all of our students' iPads. I ran a trace on the HTTPS traffic coming from the device when it said it couldn't connect and I found it trying to hit this IP: 22.214.171.124
That IP also resolves to the domain name of:
I hope this helps anyone that may be having issues connecting to the App Store or maybe some can provide us with info on why the App Store seems to want to connect to that IP now.
I just thought i would insert a quick note, as this isn't really documented anywhere on the internet yet that i can see...
The issue with Third party apps is that you can grant them full system access, which is great for those who want third party keyboards.
However, with that setting comes big consequences, as a result of this a keyboard can now interact with applications on a much deeper level, it can also now report home to the internet. This gives genuine applications visibility of what is being typed, most give privacy agreements around credit card and password fields which is fine.
But for those of us in the enterprise who are using these "secure containers" this is a serious breach of security, you could be unaware of the fact you are leaking sensitive information out to a third party.
Its important to know in order to prevent this all you need to do is make sure you have your corporate applications set as "Managed". Luckily our applications are already managed, so providing we never chose to manage third party keyboards.
There is an important extract in the latest Apple Security document detailing this;
For devices enrolled in mobile device management, document and keyboard extensions obey Managed Open In rules. For example, the MDM server can prevent a user from exporting a document from a managed app to an unmanaged Document Provider, or using an unmanaged keyboard with a managed app. Additionally, app developers can prevent the use of third-party keyboard extensions within their app.
Ensure that in your policy "Allow opening managed app documents in unmanaged apps" is unchecked to prevent third party keyboards. Resulting in the restriction named "Opening documents from managed to unmanaged apps not allowed" being set on the device under General > Profiles > Restrictions.
The setting of "Allow opening unmanaged app documents in managed apps" has no impact on third party keyboard, so this can stay set to suit your current corporate policy.
Hope this helps someone.
What is Supervision?
Supervision was introduced by Apple in iOS 5 to differentiate institutionally-owned iPhones and iPads from personally-owned devices. Supervision is enabled using Apple Configurator, Device Enrollment Program — if purchased directly from Apple — or by GroundControl.
Supervision offers tremendous benefits to enterprises and institutions. It unlocks more than 20 additional management features, including single app mode, silent app push, and always-on VPN. Supervision also allows IT departments to restrict many features not appropriate for corporate-owned or shared devices, such as AirDrop, Messages, Handoff, and even Erase.
Despite the benefits, the supervision process had been too cumbersome for most organizations. According to a major MDM provider, fewer than 10% of all institutionally-managed devices are supervised.
Supervision features by iOS release:
I created an AppleScript to automate clicking the verification link and signing in. The script is messy...I just wrote it and used it today and haven't cleaned it up or commented at all.
The workflow I'm using it with is like this:
Use the Apple ID creator script, using the same password for all of the accounts.
Setup an Outlook rule to move verification emails to a folder named "AppleVerify".
Create another folder named "AppleVerifyDone".
Then I run this script.
The script will scan through AppleVerify to grab the verification link and the apple id, opens safari to that link, input the Apple ID, and inputs the password. Then it closes the safari window and moves the email to AppleVerifyDone.
Again, it's really messy and it will probably break for you since I wrote it specifically for my workflow. But I figure it might help someone out.
Rename .txt to .scpt
Edit the idpassword and emaildomain variables
Apple has updated its free tool for supervising and configuring iOS devices. Apple Configurator is available now on the Mac App Store.
Note bullet #1: it may have a big impact on some established workflows.
Apple Configurator 1.6 contains improvements and bug fixes including:
- Devices are erased before restoring a backup
- Support for new configuration profile payloads and settings introduced in iOS 8
- Content Filter: Plug-in filter type
- Email & Exchange: Per-message S/MIME encryption switch
- Restrictions: Allow Handoff, Allow iCloud sync for managed apps, Allow backup of enterprise books, Allow notes and highlight sync for enterprise books
- Restrictions (supervised only): Allow Erase all Content and Settings, Allow configuring restrictions, Allow Internet results in Spotlight
- VPN: IKEv2 connection type and Aways-on VPN
(As an alternative, check out the new GroundControl )
There you go, folks. iOS 8 is released and available. Good luck!
Update: Build# 12A365, which is the same as the GM released last week.
Now who wants to port the Apple ID creator?
[UPDATE: MAKE SURE THERE IS ENOUGH DISK SPACE ON THE DEVICE!! Configurator doesn't handle low disk space gracefully...the device will be forced into recovery and you will need to erase the device.]
Apple is releasing iOS 8 tomorrow, and you know what that means. Gigabytes of data streaming through your WAN connection, making real work next to impossible to get done.
But it doesn't need to be that way. You can use Apple Configurator to download once, and upgrade many devices quickly, safely and efficiently. Be the superhero of the day by getting your colleagues iPhones and iPads updated in the least amount of time possible.
Note: FOLLOW THESE INSTRUCTIONS CAREFULLY. You don't want to be the guy who asks, "Why didn't you have a backup?"
Step 1: Find a Mac. Any Mac will do. Connect it to the biggest USB hub as you can find.
Step 2: Download Apple Configurator from the Mac App Store.
Step 3: Launch Configurator.
Step 4: Make sure the "Prepare" tab is selected.
Step 5: Set up the options EXACTLY as they are here. Pay special attention to make sure "Supervision" is off and "Erase before installing" is UNCHECKED.
Step 6: Make sure you aren't installing any apps and aren't setting anything in setup, in their respective tabs.
Step 7: Double-check the settings. Make sure you have no iOS devices connected via USB.
Step 8: Click the "Prepare" button at the bottom of the screen.
Step 9: Connect the first iOS device. Configurator will download iOS 8 and install it.
Step 10: Connect the second iOS device. It is safe to do this while the first is downloading. It won't download the same file twice, but it will download the unique version for that model when needed.
Step 11: After download and install, disconnect the device.
Step 12: When you have upgraded all the devices you want, click the "Stop" button.
Good luck tomorrow, and let us know how it goes. Who among you will upgrade the most devices?
(Pro Tip: The cached firmware takes up a HUGE amount of space. To clear them out, look in the path /Users/USERNAME/Library/Containers/com.apple.configurator/Data/Library/Caches/com.apple.configurator/Firmware.)
That may seem like a vendor complaint but truly seeking answers to who else on other MDM platforms is experiencing this.
For the first month of school our MDM is truely struggling with pushing out paid VPP apps to devices and continually has major VPP licensing issues. As in it thinks that we do not have any licenses to distribute VPP apps normally and we need to go thru a long time consuming procedure per unit to get paid apps on devices involving 'retiring' the current VPP user in MDM, recreating that units VPP 'user' in our MDM and then doing a manual association of paid apps to that device, plus many other 'workarrounds'. So far our MDM provider has indicated issues with VPP syncing with their product and has issued 2 Server SW patches to address issues in the last month, both of which we have limited success with. Other K-12 Districts have similar VPP issues with this particular MDM product. Up to this point we have been extremely happy with our MDM providers support, but this month of basically silence while we suffer with this issue with very little communication has left a very bad taste in out mouth for their product and honestly looking other directions for a MDM solution.
Anyway, all of that to ask with your MDM have you had any issues where the VPP licenses under normal conditions about 60-70% of the time will not associate correctly with a iOS device and an Apple ID 'user' unless you do a long drawn out procedure per device to address? With over 3500 devices at this pace it will be past Christmas break before we get the paid apps issues addressed on units.
At a press event today, Apple announced that iOS 8 will be publicly available on Wednesday September 17. The update is free and compatible with:
- iPhone 5S
- iPhone 5C
- iPhone 5
- iPhone 4S
- iPad Air
- iPad with Retina Display
- iPad 2
- iPad mini with Retina Display
- iPad mini
- iPod touch 5th Generation
So test out those caching servers (and if inclined those DNS blocks).
[Editor's note: Folks, for the last nine months or so I've been working on a pretty big project, and today I'm happy to help reveal it to you. Much of what I've learned has come from this community. Thank you! And if you are in Atlanta at AirWatch Connect, please stop by the expo and say hi.]
GroundControl is a new system for streamlining iOS deployment, launching today. Plug in a USB cable, and GroundControl supervises, restores a base image, and installs configuration profiles, on out-of-the-box iPhones and iPads and without a screen touch. The multiple "Launchpad" base stations are managed by the cloud, helping ensure a consistent experience no matter how large your deployment is. If you like, think of it as "Configurator in the cloud".
Perhaps the best way to get a feel for the product is to take a look at the demo video below:
Visit the site http://www.groundctl.com for an FAQ and a signup for a trial. If you have questions please ask.
The press release follows.
About This Site
- Comparison of MDM Providers (581,810)
- Complete List of iOS User-Agent Strings (231,713)
- How to get remote viewing/control of the IPAD screen via internet or preferably 3G? (151,772)
- Apple Configurator vs. MDM (113,375)
- Mobile Device Management (76,323)
- Apple Profile Manager (63,850)
- AirWatch (61,731)
- Gartner Magic Quadrant for MDM (2014, 2012, 2011) (58,885)
- Batch Apple ID Creator (56,397)
- Absolute Manage (54,967)
Comparison of MDM Providers
Forum topic comment by HCCSC John H 22 min ago
Forum topic comment by HCCSC John H 48 min ago
Forum topic comment by johnyn 20 hours ago
Forum topic comment by klegacy 22 hours ago
Forum topic comment by klegacy 22 hours ago
Forum topic comment by madonn 1 day ago
Forum topic added by EvanGS 3 days ago
Mobile Management Provider changed by kellery 4 days ago
Forum topic comment by Gilbert Gomez 1 week ago
Forum topic comment by Joshua Elvey 1 week ago
Forum topic comment by Uroshnor 1 week ago
Forum topic comment by Uroshnor 1 week ago
Forum topic added by 4316pwa 1 week ago
Forum topic added by Nicken 1 week ago
Forum topic comment by Aaron Freimark 1 week ago
Forum topic comment by mike 1 week ago
Forum topic comment by Johan Gunverth 1 week ago
Forum topic comment by Johan Gunverth 1 week ago
Forum topic added by AlexKS 1 week ago
Forum topic comment by Mr.Bear 1 week ago