Skip to content
Managing iCloud Access: What You Can (and Can't) Do
Iru Team

4 min read

Managing iCloud Access: What You Can (and Can't) Do

Apple IDs have long been integral to the Mac, iPhone, and iPad experience. People are accustomed to using them to sign in to services on their Apple devices—whether those devices are personal or professional.

Educational
Configuring Mac Settings: MDM, Configuration Profiles, or Scripting?
Iru Team

8 min read

Configuring Mac Settings: MDM, Configuration Profiles, or Scripting?

When it comes to managing Mac computers, there are several ways IT teams can configure their settings remotely.

Educational
Guide for Apple IT: Introduction to Mac Shell Scripts
Iru Team

16 min read

Guide for Apple IT: Introduction to Mac Shell Scripts

With computers, there are usually multiple ways to perform a given task. On Mac, the most obvious and most common way is through the graphical user interface (GUI) using a keyboard, mouse, or trackpad. But smart Mac admins know that anything you can do in the GUI you can usually also do from the command-line interface (CLI).

Educational
Mac Evaluation Utility: What It's Good For, How to Use It
Iru Team

5 min read

Mac Evaluation Utility: What It's Good For, How to Use It

The Mac Evaluation Utility (MEU) started out as an informal collection of scripts that Apple engineers and consultants would use to evaluate client environments, to see if they were ready for the deployment of Apple devices. Those scripts would check things like local device settings, network configurations, and the accessibility of Apple services, looking for anything that might pose problems for that deployment.

Educational
Key to Successful MDM Migration: Enlisting Users
Iru Team

5 min read

Key to Successful MDM Migration: Enlisting Users

Migrating from one MDM solution to another can be a huge win not only for an Apple IT team but for its organization as a whole. That move can unlock efficiencies, reduce costs, and improve security and compliance for everyone. But in pitching, planning, and executing such a migration, it’s good to keep one particular constituency front of mind: your end users. Ultimately, they’re the real reason you’re switching—and you can’t make the move without them.

Educational
Apple IT Training and Certification: What You Need to Know
Arek Dreyer

10 min read

Apple IT Training and Certification: What You Need to Know

Back in May 2022, Apple announced a new series of online IT training and certification programs. These programs follow three tracks: Apple Device Support, Apple Deployment and Management, and Apple Business Essentials.

Educational
Apple IT Essentials: PKGs and Software Deployment
Iru Team

6 min read

Apple IT Essentials: PKGs and Software Deployment

Packages are structured files, denoted by a .pkg or .mpkg file extension, used to carry installable software. They can contain app and software components, scripts, receipts, and other metadata necessary to install, update, or remove an application. But there are several different types of packages that you might run across.

Educational
Managing Mac Printing: What Admins Need to Know
Iru Team

7 min read

Managing Mac Printing: What Admins Need to Know

Despite the rise of paperless and remote offices, managing printers is still a thing, something Mac admins must deal with every day.

Educational
The Evolution of Managed Apple IDs
Iru Team

7 min read

The Evolution of Managed Apple IDs

Anyone who manages Apple devices has had at least some contact with Managed Apple IDs. Like personal Apple IDs, the managed kind can be used to access Apple devices and services. But unlike personal IDs, Managed Apple IDs are owned and controlled by the organization, rather than the end user.

Educational
AI and Cybersecurity: What You Need to Know
Iru Team

5 min read

AI and Cybersecurity: What You Need to Know

While artificial intelligence (AI) could be a world-changing technology, we’ve also seen some dire warnings about the dangers it might pose. Regardless of what you think about those warnings, as an Apple admin you do need to be mindful of the particular—and real—threats that AI poses to IT and information security here and now. Here’s what you need to know about AI and cybersecurity and what you can do to mitigate the risks.

Educational
How to Offboard Apple Devices: From Recycling to Resale
Iru Team

10 min read

How to Offboard Apple Devices: From Recycling to Resale

There’s a lot of information available to Apple admins about the best ways to onboard devices and deploy them to users. We’ve got Automated Device Enrollment, zero-touch deployment, and other workflows that help at the beginning of a device’s lifetime. But what about the other end of the device lifecycle, when you’re ready to move devices out of your organization? Offboarding workflows don't get as much attention.

Educational
How Integrating EDR with MDM Boosts Mac Endpoint Security
Iru Team

5 min read

How Integrating EDR with MDM Boosts Mac Endpoint Security

We’ve talked before about why endpoint detection and response matters and about how important it is for you, as an Apple admin, to have a security solution in place for the devices you manage. You know that the threat landscape—especially for Mac—has changed and that the old complacency about Apple security is no longer viable.

Educational
Secure Token, Bootstrap Token, and Mac Security: How They Fit Together
Mike Boylan

5 min read

Secure Token, Bootstrap Token, and Mac Security: How They Fit Together

It’s been more than five years since Apple introduced the concept of secure token in macOS. But for many Mac admins, that technology can still be a source of some confusion. It doesn’t help that, in the intervening years, Apple has evolved the technology significantly. Things have definitely come a long way since that initial launch of secure token.

Educational
Guide for Apple IT: Zero-Touch Deployment for Mac
Iru Team

6 min read

Guide for Apple IT: Zero-Touch Deployment for Mac

As an Apple admin, setting up new devices for end users became trickier in the last couple of years. With so many employees suddenly working outside the office, the workflows for equipping them with Apple devices needed to adapt. Personally handing a Mac to each new team member on their first day was no longer always feasible. That's why zero-touch deployments have become more important than ever.

Educational
Mac Endpoint Security: What Apple Admins Need to Know
Sid Roper

13 min read

Mac Endpoint Security: What Apple Admins Need to Know

Mac administration is always evolving. One example of that evolution: Many Mac admins these days are being asked to at least help manage the security of their Mac fleets. That, in turn, means they need to understand the four basic components of Mac security:

Educational

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.