Profiles are the primary means to manage devices. Configure profiles so your iOS devices remain secure and configured to your preferred settings. You can think of profiles as the settings and rules that, when combined with compliance policies, help you enforce corporate rules and procedures. They contain the settings, configurations, and restrictions that you want to enforce on devices.

A profile consists of the general profile settings and a specific payload. Profiles work best when they contain only a single payload.

iOS profiles apply to a device at either the user level or the device level. When creating iOS profiles, you select the level the profile applies to. Some profiles can only be applied to the user level or device level.

Supervised Mode Requirement for Profiles

You can deploy some or all your iOS devices in Supervised mode. Supervised mode is a device-level setting that provides administrators with advanced management capabilities and restrictions.

Certain profile settings are available only to supervised devices. A supervised setting is tagged using an icon displayed to the right, which indicates the minimum iOS requirement needed for enforcement.

For example, prevent end users from using AirDrop to share files with other macOS computers and iOS devices, by deselecting the check box next to Allow AirDrop. The iOS 7 + Supervised icon means only devices that are running iOS 7 and set up in Supervised mode using Apple Configurator are affected by this restriction. For more information, please see Integration with Apple Configurator or the Apple Business Manager. To see a complete list of the iOS system requirements and supervision options, see Appendix – iOS Functionality: Supervised vs. Unsupervised.

Skip Setup Assistant

When creating iOS profiles, you can use the Skip Setup Assistant payload profile to skip all the screens or skip only some screens in iOS 14 and later devices. For more information, see Configure a Setup Assistant Profile

Device Access

Some device profiles configure the settings for accessing an iOS device. Use these profiles to ensure that access to a device is limited only to authorized users.

Some examples of device access profiles include:

Device Security

Ensure that your iOS devices remain secure through device profiles. These profiles configure the native iOS security features or configure corporate security settings on a device through Workspace ONE UEM.

Some examples of device security profiles include:

Device Configuration

Configure the various settings of your iOS devices with the configuration profiles. These profiles configure the device settings to meet your business needs.

Some examples of device configuration profiles include: