Key Takeaways
MDM is not a one-time setup – it's an ongoing operational responsibility. Policies drift, devices fall out of compliance, and the console nobody checks creates the gaps auditors find first.
Four controls cover the majority of what compliance frameworks require. FileVault encryption, remote wipe, password policies, and 2FA enforcement are the non-negotiables.
Most DIY MDM projects fail not at setup but at maintenance. Owning it long-term requires a dedicated person, or a managed IT partner.
The choice between self-managed and managed IT is the most important decision in this guide. It determines your ongoing workload more than any tool or policy choice.
deeploi handles MDM configuration, enrollment, policy monitoring, and security alert monitoring as part of a flat monthly fee, with no manual involvement for the founder to manage.
You google "Mac MDM setup." Three guides contradict each other. You spend a day going in circles between Apple Business Manager, enrollment tokens, and supervised mode. You either give up, misconfigure something without realizing it, or pay someone to sort it out. Sound familiar?
Here's the thing most guides won't tell you: MDM is not a one-time configuration. It's an ongoing operational responsibility. Policies drift. Devices fall out of compliance. Enrollment breaks on edge cases. Offboarding needs to be connected to device management, or it creates access gaps that auditors find immediately. Despite the availability of advanced tools, 14% of businesses still rely on spreadsheets to manage IT compliance (Indusface Blog). If that's your startup, MDM is already overdue.
By the end of this guide, you'll know the four essentials, what you can safely skip, and what centralized device management actually requires, so you can decide whether to own it internally or hand it to someone whose job it is.
What you need before you start
Three things must be in place before touching any MDM tool:
- An Apple Business Manager (ABM) account. It's free, but setup requires a D-U-N-S number and Apple verification, which can take several days.
- Admin access to your entire Mac fleet, including devices already in use by employees.
- A decision on whether you'll manage MDM internally or via a managed IT partner. This shapes every step that follows.
Apple Business Manager is the foundation everything else sits on. If it's not set up correctly (wrong organizational details, unverified account, devices purchased outside the authorized channel), your MDM enrollment will fail or be severely limited. Get this right first.
For example, when you're procuring devices through deeploi, they ship from authorized Apple resellers, meaning every device is ADE-eligible from day one and enrolls into MDM automatically on first boot.
The four things your startup actually needs
At the device policy level, four controls cover the majority of what ISO 27001, SOC 2, and most enterprise customer security questionnaires require.
FileVault disk encryption protects data at rest if a device is lost or stolen. Without it, anyone with physical access to a Mac can extract data from the drive without a password. Required for virtually every compliance framework.
Remote wipe lets you erase a device remotely if it's lost, stolen, or an employee leaves on bad terms. Non-negotiable for any team handling customer data.
Password policy enforcement sets minimum length, complexity, and screen lock timeout, all enforced via MDM so it isn't a matter of trust or reminders.
2FA enforcement ensures every account login requires a second factor. This closes the most common account takeover vector. 60% of all breaches involve the human element, including stolen credentials and social engineering (Verizon 2024 Data Breach Investigations Report). A strong second factor makes stolen passwords far less useful.
Here's where it breaks in practice: pushing FileVault to existing devices that were set up without it requires user action. Employees have to restart their machines and enter their password to enable encryption. If they don't, the policy sits unenforced in your MDM console and shows as non-compliant. You need a process for chasing this. Most startups don't have one.
What you can skip before you hit 20 people
MDM platforms are built for IT departments managing hundreds of devices. Most of their feature set creates admin overhead without proportional security benefit at small scale. Feature creep increases configuration complexity and support burden without making you meaningfully more secure.
What to skip at the early stage:
- Kiosk mode: locks devices to a single app. Relevant for retail or customer-facing hardware. Irrelevant for a knowledge-work startup.
- Geofencing: triggers policy changes based on physical location. Adds configuration complexity with minimal security value for remote teams.
- App catalogs and whitelisting: defining exactly which apps employees can install. Valid at scale. At 10 people, it creates friction and support tickets without meaningful improvement.
- Complex certificate management: enterprise-grade authentication infrastructure. Overkill until you have a dedicated IT person to maintain it.
- Custom configuration profiles: deep device customization beyond the four baseline policies. Unnecessary unless a specific compliance requirement demands it.
The principle: start with the four essentials. Add complexity only when a specific compliance requirement or audit demands it, not because the feature exists in your MDM platform.
Step 1: Decide between self-managed MDM and a managed IT service
What self-managed MDM involves
You set up Apple Business Manager, choose an MDM platform, configure policies yourself, enroll devices, and own ongoing maintenance indefinitely. That means monitoring for policy drift, handling OS update enforcement, troubleshooting enrollment failures, managing edge cases when someone joins or leaves, and staying current as Apple changes its MDM APIs (which it does regularly).
The main self-managed tools:
- Jamf: powerful, steep learning curve, enterprise-oriented.
- Kandji: modern, Mac-first, cleaner UX but still requires technical ownership.
- Mosyle: simpler, education-focused roots.
- JumpCloud: cross-platform, broader scope including identity management.
The hidden cost is not the software subscription. It's the time and attention of whoever owns it internally. At a 10-person startup, misconfigured MDM is often worse than no MDM: it creates a false sense of compliance coverage while leaving real gaps.
What managed IT looks like
An IT partner configures and maintains your MDM on your behalf. Policies are pre-configured to your compliance requirements. Devices are enrolled through zero-touch provisioning – shipped pre-configured directly to the employee, ready to use on first boot. When something breaks, you don't touch it.
deeploi manages MDM as part of its all-in-one IT platform. Here's what the founder actually does: when a new employee joins, you confirm their name, role, and start date in your HRIS, and that's it. deeploi handles the rest. The device ships pre-configured with the baseline policies already active: FileVault enforced, password policy set, and remote wipe enabled. 2FA enforcement is configured during onboarding setup, linked to your identity provider.
The deeploi team also monitors every device for policy drift. If FileVault gets disabled, an OS update is overdue, or an MDM profile is removed, a ticket is created and the team acts, without the founder being involved. When someone leaves, you confirm the leaving date and approve the offboarding steps in the platform, deeploi then revokes SaaS accounts, activates email forwarding, and remotely locks the device for return.
deeploi is itself ISO 27001 certified, which simplifies supplier security assessments when you begin your own certification process. With an average support response time of 12 minutes and a 97% reduction in IT workload reported by customers, the operational difference from self-managed MDM is significant.
Decision criteria
- Do you have someone technical who can own MDM configuration and ongoing maintenance?
- Is that person's time better spent on this or on the thing they were hired to do?
- Are you pursuing ISO 27001 or SOC 2? If yes, managed MDM significantly reduces the ongoing compliance maintenance burden.
Step 2: Enroll your Macs through Apple Business Manager
You need to understand what enrollment involves and where it breaks. There are two paths:
- Automated Device Enrollment (ADE): for new devices purchased through Apple or an authorized reseller. The device arrives pre-configured with zero-touch setup on first boot. This is the right choice for any device bought going forward.
- Manual enrollment: for existing devices already in use. Requires the employee to download and install an enrollment profile. More friction, more room for error.
Expected outcome: devices appear in your MDM console, assigned to employees, ready for policy deployment.
Where it breaks: manual enrollment depends on employee cooperation and correct execution. Employees skip steps, enroll the wrong profile, or remove the MDM profile later because they don't want it. Supervised mode (which prevents profile removal) requires devices to have gone through ADE, meaning it can't be applied retroactively without a full wipe and re-enroll. This is the moment most DIY MDM projects stall.
Step 3: Configure your four core policies and keep them that way
Policy configuration and ongoing maintenance are not separate activities. Here's what each of the four essentials involves in practice:
FileVault enforcement: pushed via MDM, but existing unencrypted devices require user action to complete. Recovery keys must be escrowed in the MDM console. If they're not, you can't recover a locked device. Ever.
Password policy: minimum length, complexity rules, screen lock timeout. Straightforward to configure, but policy conflicts between MDM and macOS system settings are common and not always obvious. Test before rolling out to everyone.
Remote wipe: must be tested before you need it. An untested remote wipe capability is not a remote wipe capability. Run a test wipe on a spare device at minimum.
2FA enforcement: MDM interacts with your identity provider settings (Google Workspace, Microsoft Entra). MDM alone doesn't enforce 2FA; the two systems have to be configured together. This is one of the most common gaps in DIY setups.
Ongoing maintenance matters just as much as the initial setup. Set up alerts for policy drift: devices where FileVault has been disabled, OS updates falling behind, or the MDM profile removed. These are not rare edge cases. Apple releases major OS updates annually and security patches regularly; MDM enforcement needs to be updated alongside them.
The most common MDM failure mode isn't a technical misconfiguration at setup. It's the console nobody checks after month one. Alerts fire, devices fall out of compliance, and no one acts because no one owns it. Self-managed MDM requires an owner, not just a setup.
If using a managed IT platform like deeploi, every policy in this step is pre-configured before the first device is enrolled. You don't test FileVault rollouts or configure identity provider connections, deeploi does that as part of setup. When Apple releases a major OS update, deeploi updates enforcement accordingly. You don't track it.
Three signs your MDM setup needs attention
Devices showing as non-compliant with no one acting on it. The MDM is installed but nobody reviews the dashboard. The software is running; the management isn't. This is the most common failure mode at startups.
A former employee's device is still enrolled and active. Offboarding wasn't connected to MDM. The device exists in your console, possibly with an active account and access to company data. This is the access control gap an auditor will find first.
Your MDM hasn't been updated since the initial setup. Policies haven't been reviewed. OS versions are multiple releases behind. Apple has updated its MDM framework and your configuration doesn't reflect the changes. Set-and-forget MDM is not compliant MDM.
If you recognize these signs, you need more than MDM software. You need someone actively managing it. That's the distinction between a tool and a managed service.
Mac MDM startup checklist
- Apple Business Manager account created and verified
- MDM provider selected or managed IT partner onboarded
- All Macs enrolled and appearing in MDM console
- FileVault encryption enforced and recovery keys escrowed
- Password policy configured and active across all devices
- Remote wipe enabled and tested
- 2FA enforcement active and confirmed with identity provider
- Policy drift alerts configured and assigned to an owner
- Offboarding process connected to MDM deprovisioning
- MDM configuration reviewed and updated after every major macOS release
Start with the essentials, then grow
The four essentials are the right starting point. Everything else can wait. But getting those four right, and keeping them right, is not a one-afternoon project. It's an ongoing responsibility that requires an owner.
Two moments justify adding complexity beyond the basics: hitting 20 or more devices where manual oversight breaks down, and beginning a formal compliance audit where additional controls need enforcement.
Until then, keep it simple. Get the foundations right. And if you'd rather focus on building your product instead of managing MDM consoles, consider a partner who does this full-time.
FAQ
Do I really need MDM if my startup only has five Macs?
Yes, if you handle customer data, are pursuing ISO 27001 or SOC 2, or expect enterprise customers to ask about your security posture. Five devices is not a reason to skip it. It's actually the right time to get it right, before bad habits become baked in and before retrofitting MDM onto an established fleet becomes a project in itself.
Should I manage MDM myself or use a managed IT service?
It depends on whether you have someone technical who is willing to own it long-term, not just set it up once. Self-managed tools like Jamf or Kandji work if you have a technical person who can maintain them ongoing. If no one wants to own the configuration, monitoring, and troubleshooting, a managed IT platform handles the technical layer for you. deeploi's platform includes MDM setup, policy configuration, device enrollment, ongoing policy monitoring, OS update management, and security alert monitoring – all as part of a flat monthly fee per employee. There's no MDM console to manage, no policies to configure, and no consultant to hire separately.
Can my employer see personal data through MDM?
No. MDM manages device configuration: policies, encryption, software deployment. It cannot access personal files, messages, browsing history, or app content. What an admin can see: device name, serial number, OS version, installed apps, and policy compliance status. Nothing personal.
What's the difference between MDM and endpoint security?
MDM manages device configuration and enforces policies; it controls how a device is set up. Endpoint security monitors for malicious activity and responds to threats in real time. Most startups need both: MDM for the baseline configuration layer, endpoint security for threat detection. They complement each other, not replace each other.










