Skip to content
How to Add Devices to Apple Business Manager Using Apple Configurator
Iru Team

8 min read

How to Add Devices to Apple Business Manager Using Apple Configurator

Before mobile device management solutions for Apple devices—such as Kandji—were common, there was Apple Configurator.

Educational
Deploying Adobe Creative Cloud: Choosing the Right Path
Iru Team

5 min read

Deploying Adobe Creative Cloud: Choosing the Right Path

For Apple IT teams with MDM tools, deploying applications to users is a familiar and relatively straightforward process. Depending on the app and the MDM solution, it could mean deploying titles from the macOS App Store, building and deploying your own app packages, and/or making apps available via self-service.

Educational
Managing iCloud Access: What You Can (and Can't) Do
Iru Team

4 min read

Managing iCloud Access: What You Can (and Can't) Do

Apple IDs have long been integral to the Mac, iPhone, and iPad experience. People are accustomed to using them to sign in to services on their Apple devices—whether those devices are personal or professional.

Recent News
Configuring Mac Settings: MDM, Configuration Profiles, or Scripting?
Iru Team

8 min read

Configuring Mac Settings: MDM, Configuration Profiles, or Scripting?

When it comes to managing Mac computers, there are several ways IT teams can configure their settings remotely.

Recent News
Guide for Apple IT: Introduction to Mac Shell Scripts
Iru Team

16 min read

Guide for Apple IT: Introduction to Mac Shell Scripts

With computers, there are usually multiple ways to perform a given task. On Mac, the most obvious and most common way is through the graphical user interface (GUI) using a keyboard, mouse, or trackpad. But smart Mac admins know that anything you can do in the GUI you can usually also do from the command-line interface (CLI).

Recent News
Mac Evaluation Utility: What It's Good For, How to Use It
Iru Team

5 min read

Mac Evaluation Utility: What It's Good For, How to Use It

The Mac Evaluation Utility (MEU) started out as an informal collection of scripts that Apple engineers and consultants would use to evaluate client environments, to see if they were ready for the deployment of Apple devices. Those scripts would check things like local device settings, network configurations, and the accessibility of Apple services, looking for anything that might pose problems for that deployment.

Recent News
Key to Successful MDM Migration: Enlisting Users
Iru Team

5 min read

Key to Successful MDM Migration: Enlisting Users

Migrating from one MDM solution to another can be a huge win not only for an Apple IT team but for its organization as a whole. That move can unlock efficiencies, reduce costs, and improve security and compliance for everyone. But in pitching, planning, and executing such a migration, it’s good to keep one particular constituency front of mind: your end users. Ultimately, they’re the real reason you’re switching—and you can’t make the move without them.

Educational
Apple IT Essentials: PKGs and Software Deployment
Iru Team

6 min read

Apple IT Essentials: PKGs and Software Deployment

Packages are structured files, denoted by a .pkg or .mpkg file extension, used to carry installable software. They can contain app and software components, scripts, receipts, and other metadata necessary to install, update, or remove an application. But there are several different types of packages that you might run across.

Recent News
Managing Mac Printing: What Admins Need to Know
Iru Team

7 min read

Managing Mac Printing: What Admins Need to Know

Despite the rise of paperless and remote offices, managing printers is still a thing, something Mac admins must deal with every day.

Educational
Kandji Introduces Enhanced Controls for External Storage Volumes
Iru Team

3 min read

Kandji Introduces Enhanced Controls for External Storage Volumes

When your organization audits security, does it include removable storage in that assessment? If not, it should: According to one survey, while 87 percent of companies still use USB drives, less than half of them impose port control on employee devices, and less than half require the use of encryption on those drives.

Product News
Four Signs It's Time to Switch MDM Solutions
Iru Team

5 min read

Four Signs It's Time to Switch MDM Solutions

It isn’t that difficult to know when you need to change your current MDM solution. The most prominent sign? You dread making any changes—small or large—to the macOS, iOS, iPadOS, or tvOS devices you’re managing.

Thought Leadership
The Evolution of Managed Apple IDs
Iru Team

7 min read

The Evolution of Managed Apple IDs

Anyone who manages Apple devices has had at least some contact with Managed Apple IDs. Like personal Apple IDs, the managed kind can be used to access Apple devices and services. But unlike personal IDs, Managed Apple IDs are owned and controlled by the organization, rather than the end user.

Educational
AI and Cybersecurity: What You Need to Know
Iru Team

5 min read

AI and Cybersecurity: What You Need to Know

While artificial intelligence (AI) could be a world-changing technology, we’ve also seen some dire warnings about the dangers it might pose. Regardless of what you think about those warnings, as an Apple admin you do need to be mindful of the particular—and real—threats that AI poses to IT and information security here and now. Here’s what you need to know about AI and cybersecurity and what you can do to mitigate the risks.

Educational
How to Offboard Apple Devices: From Recycling to Resale
Iru Team

9 min read

How to Offboard Apple Devices: From Recycling to Resale

There’s a lot of information available to Apple admins about the best ways to onboard devices and deploy them to users. We’ve got Automated Device Enrollment, zero-touch deployment, and other workflows that help at the beginning of a device’s lifetime. But what about the other end of the device lifecycle, when you’re ready to move devices out of your organization? Offboarding workflows don't get as much attention.

Educational
How Integrating EDR with MDM Boosts Mac Endpoint Security
Iru Team

5 min read

How Integrating EDR with MDM Boosts Mac Endpoint Security

We’ve talked before about why endpoint detection and response matters and about how important it is for you, as an Apple admin, to have a security solution in place for the devices you manage. You know that the threat landscape—especially for Mac—has changed and that the old complacency about Apple security is no longer viable.

Educational

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.