Safe USB-C: MDM Admins can reduce security on iPhone and Mac

0
8
Safe USB-C: MDM Admins can reduce security on iPhone and Mac


Using mobile device management (MDM), administrators can largely set and control apple devices. It also includes many tasks that actually work for safety, as Apple’s MDM documentary can be seen. Nevertheless, IT departments and other MDM managers should carefully consider whether they make appropriate settings. A particularly important so -called USB is restricted fashion. Because it can also be closed by the administrator through MDM settings.

Advertisement


Actually, both Mac and an iPhone or an iPad ask when the USB-C device is inserted. This is important because there are different attacks methods that work wired. It begins with hacking like “toys” rubber Or ends with flipper zero and professional opening equipment that use police officers and secret services. It is accordingly important that you prevent a device connection through which attacks can be carried out. The signal is bothering many users, but they serve for safety.

As can be seen in Apple’s documentation, admins on MACS can now set the so -called “allowsbrestrictedmode” flag. This prevents demand from arrival. The issue is that according to Apple, “some environment” are necessary to allow it. In theory, the users themselves can do so, but they must go into the depth of the system settings, which must be very low.

More intelligent Siri: Does Apple need longer than expected?More intelligent Siri: Does Apple need longer than expected?

With iphones and ipads, admins can control the so -called host pairing. Here too, you should be very careful. The restriction setting “allows pairing with a non-apple configuration host” makes it possible to connect the device with potentially problematic machines. Apple recommends a ban on this to ensure that a company device does not combine with other problematic devices.

Since iOS 14.5 and iPados 14.5, Apple continues to protect the computer device without a pair in recovery mode. Admins also have to select when choosing possible secondary products. This, for example, includes permission to connect the Ethernet adapter to the iPhone and iPad, through which the connection can also be included in the network in the lock position.


(BSC)

Apple Maps soon with advertisingApple Maps soon with advertising

LEAVE A REPLY

Please enter your comment!
Please enter your name here