Profiles are the primary means to manage devices. Configure profiles so your iOS devices remain secure and configured to your preferred settings.

Overview

You can think of profiles as the settings and rules that, when combined with compliance policies, help you enforce corporate rules and procedures. They contain the settings, configurations, and restrictions that you want to enforce on devices.

A profile consists of the general profile settings and a specific payload. Profiles work best when they contain only a single payload. For more information on general profile settings, see Add General Profile Settings.

iOS profiles apply to a device at either the user level or the device level. When creating iOS profiles, you select the level the profile applies to. Some profiles can only be applied to the user level or device level.

Supervised Mode Requirement for Profiles

You can deploy some or all your iOS devices in Supervised mode. Supervised mode is a device-level setting that provides administrators with advanced management capabilities and restrictions.

Certain profile settings are available only to supervised devices. A supervised setting is tagged using an icon displayed to the right, which indicates the minimum iOS requirement needed for enforcement.

iOS_Restrictions_OSReq

For example, prevent end users from using AirDrop to share files with other macOS computers and iOS devices, by deselecting the check box next to Allow AirDrop. The iOS 7 + Supervised icon means only devices that are running iOS 7 and set up in Supervised mode using Apple Configurator are affected by this restriction. To see a complete list of the iOS system requirements and supervision options, see Appendix – iOS Functionality: Supervised vs. Unsupervised.

Device Access

Some device profiles configure the settings for accessing an iOS device. Use these profiles to ensure that access to a device is limited only to authorized users.

Some examples of device access profiles include:

Device Security

Ensure that your iOS devices remain secure through device profiles. These profiles configure the native iOS security features or configure corporate security settings on a device through AirWatch.

Some examples of device security profiles include:

Device Configuration

Configure the various settings of your iOS devices with the configuration profiles. These profiles configure the device settings to meet your business needs.

Some examples of device configuration profiles include: