Home / Mac / Enterprise Mac Management after Big Sur

Enterprise Mac Management after Big Sur



With the release of macOS® 11, Big Sur®, Apple® announced that the MDM (mobile device management) protocol will be the only method to set configuration profiles on Mac® from Big Sur and beyond.

The story of Mac Management

In the early days of corporate IT, user computers generally ran Microsoft® Windows® and was located, managed by a combination of Active Directory® (AD) and System Center Configuration Manager (SCCM), now ConfigMgr. Few Macs were present in the IT environments of the day, so managing them was often low on an IT administrator’s to-do list. Many chose to manage them on a need, rather than create enterprise-wide Mac management policies, and forgo the need for additional solutions.

Over time, more Macs entered organizations of all types and sizes, becoming the second most popular operating system while reducing Windows̵

7; dominant market share. ConfigMgr developed macOS support in response, but in practice did not give Macs the same first-class treatment that they gave Windows devices. To make matters worse, the ConfigMgr does not use the MDM protocol to manage Macs, making it ineffective for Mac administration in a post-Big Sur time..

So how can IT administrators prepare for MacOS Big Sur? The short answer is that you need an Apple MDM in the IT administration stack.

Uses a Unified Cloud Platform for MDM

Any organization with Macs in its environment must adopt an Apple MDM tool to manage their Big Sur Macs. Unfortunately, many MDM offerings on the market are point solutions, and provide little else to organizations outside of device administration. As these point solutions accumulate in a technological stack, they increase costs dramatically compared to solutions that provide unified identity, device, and access management, as a cloud directory platform.

A cloud directory platform centralizes the needs of enterprise IT administrators – including Big Sur-powered Macs – into an all-in-one solution. Not only can such an approach save money by cutting down on the tools required in an IT stack, but it also allows organizations to centralize identity across all resources (Read more …)


Source link