Solutions
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Extend Fleet
Integrate your favorite tools with Fleet.
Customers
Stripe + Fleet
Stripe moved 10,000 Macs to Fleet, saving hundreds of thousands annually
Foursquare + Fleet
Foursquare quickly migrates to Fleet for device management.
Faire + Fleet
Faire secures Macs with CIS benchmarks and Fleet
What people are saying
Stories from the Fleet community.
More
Brock Walters
Brock Walters
The Apple Mobile Device Management (MDM) protocol provides remote management capabilities organizations need to configure and secure Apple devices like Macs, iPhones, iPads, Apple TV and even Apple Watch. Combined with Apple Business Manager or Apple School Manager (ABM / ASM) organizations can achieve scalable zero-touch enrollment, automated provisioning and comprehensive security enforcement resulting in fast, simplified device deployment across distributed workforces.
The MDM protocol is built into Apple's operating systems. It allows organizations deploying institutionally-owned Apple devices to unlock management that is unavailable on personally-owned devices, allows for enrollment and management of employee-owned devices, often referred to as "Bring Your Own Device" (BYOD), and shared devices.
3rd party management services make use of the Apple MDM protocol, leveraging the Apple Push Notification Service (APNS) to deliver MDM commands and configuration profiles from an MDM server to managed devices. Using this approach means devices can theoretically be reached anywhere they are connected on the internet to receive management actions without needing to connect to virtual private networks (VPN) or restricted local networks.
ABM or ASM can be set up at no cost. After proof of your organization's identity is satisfied, an ABM / ASM web portal unique to your organization can be integrated with one or many management services (MDM servers) to automate device enrollment and provision apps and books.
ABM / ASM complements MDM by ensuring:
Once devices are enrolled, a management service (i.e., the MDM server) can do things like:
For educational institutions, Apple School Manager (ASM) provides the same core features with additional capabilities for K-12 classroom and student management.
Small device fleets can be managed manually, but, hands-on approaches break down quickly when an organization manages hundreds or thousands of devices. The shift to remote and hybrid work has made it nearly impossible for IT teams to physically access devices for configuration or troubleshooting. It has also become difficult for organizations to control access and security for users at a network perimeter.
Beyond operational challenges, compliance requirements make manual management increasingly risky. Frameworks like SOC 2, HIPAA, and PCI-DSS explicitly require documented device management controls with technical enforcement, not just business policy documents or statements of intent, while security threats targeting Apple devices continue to increase as Apple adoption grows.
Without MDM, organizations may resort to manually configuring each device before distribution, creating onboarding bottlenecks that delay new hires. Security policies rely on user assurance of compliance rather than state management or automated remediation. Device inventory tracking falls back to outdated spreadsheets that quickly become inaccurate. Lost or stolen devices can't be remotely wiped, creating significant data breach risks.
An MDM platform for Apple devices addresses these organizational challenges through six key benefits.
Zero-touch deployment through ADE transforms device onboarding from a manual bottleneck into an easy, self-guided process. Devices purchased from Apple or through an authorized Apple reseller are linked to an organization's MDM server in ABM. When employees power on new devices, they are walked through an automatic enrollment workflow controlled from your MDM server and receive configuration profiles and provisioned software without IT tickets or admin interaction.
Manual device setup typically requires significant IT labor per device, while automated deployment reduces this to minutes of configuration time. Employee experience improves immediately since new hires receive devices on their first day rather than waiting for IT configuration appointments. Remote employees across different time zones also get consistent setup without coordinating schedules with IT support teams.
The initial ABM setup requires coordination with your reseller and integration with your MDM platform, but once that is done, every future deployment uses the same streamlined process.
MDM provides technical enforcement of security controls that business policy documents alone cannot guarantee. E.g., Organizations can enforce full disk encryption on all managed devices using FileVault for Mac, while iPhone and iPad use hardware encryption that's always enabled when a passcode is set. Strong passcode requirements with automatic lockout protect against unauthorized access, certificate deployment enables secure network access, and firewall rules block unnecessary traffic.
When devices go missing, response time is crucial: IT can immediately lock a lost or stolen device remotely and display contact information for return. If an institutionally-owned device proves unrecoverable, a remote wipe can permanently erase all data the next time it connects to the internet.
BYOD programs require a different security approach. User Enrollment provides cryptographic isolation between work and personal data, letting IT deploy work applications, enforce policies on those applications, and wipe work data without touching personal photos or apps. This separation enables secure BYOD programs while respecting employee privacy.
MDM shifts security practice from reaction to dynamic prevention. App installation restrictions help prevent malware from untrusted websites, USB accessory controls stop unauthorized data exfiltration, and automatic VPN enforcement ensures that network traffic stays encrypted when accessing company resources.
MDM can automate the application lifecycle from deployment through removal. Applications get pushed to devices without user interaction, updates happen on controlled schedules and apps adjust automatically when employees change roles.
Key MDM automation capabilities include:
Software update enforcement solves a persistent problem. Operating system updates often contain critical security patches. End users often delay updates because updates may require restarts. MDM lets you set update deadlines with reasonable windows, notify users when update deadlines are reached, and enforce updates during the next restart or scheduled maintenance window.
This enforcement also becomes critical when compliance frameworks make specific demands about timelines that cannot be met through voluntary user action alone. PCI DSS 4.0 requires organizations to patch critical vulnerabilities within 30 days, and FedRAMP requires the same 30-day maximum for high-severity issues. MDM provides the technical enforcement mechanism and generates audit trails proving organizations are up-to-date.
Compliance frameworks require documented device management controls with technical enforcement. You can write a security or business policy explaining that all devices must use encryption, but auditors want hard proof that devices are encrypted. The gap between intent and reality is where compliance failures occur.
MDM helps you meet specific regulatory requirements:
Organizations can face substantial penalties when compliance is found to be inadequate during audits. MDM provides the technical enforcement mechanism these frameworks require. When auditors ask for proof that encryption is enforced, organizations can show them configuration profiles that prevent devices from operating without encryption enabled. The MDM server maintains logs showing exactly when encryption was enabled and on which specific devices.
Remote work has mostly eliminated the ability to physically access devices for troubleshooting, meaning IT teams that previously walked to employee desks now support devices they never see in person. This creates gaps where problems only surface after impacting productivity, like discovering an end user has been running an outdated OS version for months only when a security vulnerability makes the news.
MDM platforms provide near real-time visibility into device state and critical device information:
Monitoring device state does not require manual auditing. Device information is collected continuously for as long as a device is enrolled. Problems can be spotted before they escalate into security incidents or productivity blockers and be proactively or dynamically resolved with automated remediation. Admins can troubleshoot reported data instead of coordinating screen sharing sessions or asking users to run terminal commands they do not understand by executing MDM commands to gather diagnostics or push configuration changes remotely or allowing users to execute pre-configured remediation workflows from Self Service.
MDM creates friction when poorly configured. Users resent locked-down devices and blocked applications. Done correctly, MDM becomes invisible: New hires power on devices on their first day to find everything already configured and ready, with required applications installed, single sign-on working immediately, and network access ready to go.
Beyond onboarding, self-service capabilities eliminate wait time for common requests. Employees install approved applications from catalogs without submitting tickets or run scripts with a single button click with no IT interaction.
Role-based app assignment can take this further by ensuring employees have the tools they need without requesting them. E.g., sales teams can automatically receive CRM applications, engineering teams get development tools, and finance teams get accounting software.
Employees think about their work rather than fighting with the device that been issued to them while IT works on strategy, configuration and systemic improvement instead of manual 1-off tasks.
Fleet provides enterprise-grade MDM with API-first architecture, real-time device reporting, and cross-platform support for Mac, Windows, and Linux. It also integrates with Apple Business Manager for zero-touch deployment while maintaining complete data transparency. Schedule a demo to see how open device management works without vendor lock-in.