Your Apple Fleet, Automated from Unboxing
Zero-touch deployment, automated compliance, and proper MDM architecture for schools, studios, and businesses running on Apple hardware. We recommend what fits your environment (Jamf Pro, Mosyle, JumpCloud, or Intune), not what pays us commission.
Stop Managing Apple Devices One at a Time
The Manual Management Problem
Manual Apple device management stops working somewhere around 20 devices. Beyond that, you're stuck with admins configuring each Mac by hand, users creating weak local passwords, no FileVault recovery keys, mismatched app versions, and zero fleet visibility. Add iPads for field staff and you'll spend half your time chasing devices for updates or troubleshooting preventable issues.
How Modern MDM Changes This
Apple Business Manager (or Apple School Manager) combined with professional MDM platforms like Jamf Pro changes this completely. Devices ship directly from Apple or your reseller and auto-enroll the moment they're unboxed. Configuration profiles deploy Wi-Fi credentials, security settings, and app catalogs before the user even logs in. FileVault keys escrow automatically. Inventory updates in real-time. Software patches deploy on schedule. And when someone leaves, you can remotely lock or wipe their device without ever touching it. This is how Apple-first organisations—from 50-device studios to 5,000-device schools—operate.
Our Approach
We've been deploying Apple MDM since the Profile Manager days on macOS Server (if you know, you know). We're Jamf-certified and JumpCloud-certified because both platforms excel for different use cases. Jamf Pro is the gold standard for Apple-first environments—especially education and creative studios. JumpCloud excels at unified device and identity management across Mac, Windows, and Linux. We've also deployed Mosyle, SimpleMDM, and Microsoft Intune where they fit better. Every project starts with understanding your environment, then we architect the MDM platform, configure Apple Business Manager, migrate existing devices, train your team, and deliver a system that works. You end up with automated deployment, enforced compliance, and real-time inventory—not a trial instance and vague documentation.
Complete MDM Lifecycle Management
From zero-touch enrollment through secure retirement—every phase of your Apple fleet lifecycle automated and auditable.
Zero-Touch Deployment & Enrollment
Ship devices directly to users anywhere. They unbox, power on, and everything auto-configures. No IT setup required, no site visits, no manual imaging. True zero-touch from warehouse to working device.
What's included
- Apple Business Manager (ABM) and Apple School Manager (ASM) configuration and device assignment
- Automated Device Enrollment (ADE) with pre-configured MDM enrollment profiles
- Configuration profiles for Wi-Fi, VPN, certificates, and security settings deployed at enrollment
- User-driven or IT-driven enrollment workflows (BYOD, corporate-owned, shared devices)
- Prestage imaging templates with organization branding and mandatory apps
- Zero-touch deployment for remote users (ship to home, auto-configure on first boot)
Configuration Management & Compliance
Enforce encryption, password policies, firewall rules, and software standards across every device in your fleet. Set it once, applies everywhere. Compliance becomes automatic, not a quarterly audit panic.
What's included
- Configuration profiles for FileVault encryption, firewall, password policies, screen lock
- Gatekeeper and System Integrity Protection enforcement
- Mandatory software installation and version compliance (block outdated apps)
- Device restriction policies (USB blocking, AirDrop controls, camera/microphone restrictions)
- Scheduled compliance checks with auto-remediation or device lockout
- Custom configuration profiles for network settings, email, certificates, and VPN
App Deployment & Patch Management
Users get the apps they need through a self-service catalog. Updates deploy on schedule. Licenses reassign automatically when staff leave. Your team installs approved software themselves—no tickets, no waiting.
What's included
- Self-service app catalog for users to install approved software on demand
- Automated app deployment via Apple App Store VPP (Volume Purchase Program)
- Custom package deployment for internal tools, scripts, and configurations
- Scheduled patch management for macOS system updates and third-party apps
- App version compliance (auto-update or block access if out of date)
- License reclamation and reassignment for VPP apps (no wasted licenses)
Inventory & Asset Management
Know exactly what's deployed, where it is, who's using it, and whether it's compliant, updated continuously. Find devices, check warranty status, and track license usage without manual spreadsheets.
What's included
- Automated hardware inventory (model, serial, storage, RAM, OS version, enrollment date)
- Software inventory tracking (installed apps, versions, license usage)
- Integration with Apple GSX for warranty status and AppleCare+ tracking
- Custom inventory attributes for asset tags, purchase orders, and department assignments
- Geolocation tracking for lost/stolen device recovery (with user consent)
- Reporting dashboards for compliance, device health, and utilization metrics
Security & Recovery Key Escrow
Mandatory encryption on every device with recovery keys stored securely in MDM. When users forget passwords or devices fail, you can recover data. When devices go missing, you can remotely lock or wipe them.
What's included
- Mandatory FileVault encryption deployment at first boot
- FileVault recovery key escrow to MDM platform (admin-accessible, user-hidden)
- Personal recovery key rotation and secure key retrieval workflows
- Firmware password management (prevent unauthorized boot or recovery mode)
- Activation Lock bypass for corporate-owned devices (prevent lockout after user departure)
- Remote lock and wipe for lost, stolen, or decommissioned devices
Lifecycle Management & Retirement
Manage devices from purchase through disposal. New hires get auto-configured devices. Departing staff get remotely wiped. Reassignments happen without manual rebuilds. Complete audit trail for compliance.
What's included
- New device provisioning workflows with automated enrollment and user assignment
- Device reassignment between users with automated profile refresh and app redeployment
- Retirement workflows: remote wipe, MDM unenrollment, Apple Business Manager release
- Secure data destruction compliance documentation (NIST 800-88 standards)
- Decommissioned device tracking and resale/disposal audit logging
- Integration with procurement systems for lifecycle cost tracking
Why magnumit for Apple MDM
We've Been Doing This Since Before It Was Easy
We deployed our first Apple MDM in 2012—back when it was Profile Manager on macOS Server, manual SSL certificates, and praying the push notification service stayed connected. We've migrated clients from every legacy platform: ARD-only management, Munki + DeployStudio, custom imaging workflows, and manual setup chaos. We understand MDM evolution because we've lived it. That means we design systems for Apple's current architecture—not legacy workarounds from the Intel Mac era.
Jamf & JumpCloud Certified, Platform-Agnostic
We're Jamf-certified and JumpCloud-certified, deploying both platforms regularly. Jamf Pro is the most powerful MDM for Apple-first environments, especially education and creative sectors. JumpCloud excels at unified device management across Mac, Windows, and Linux with built-in identity. We're not resellers chasing commission—if you're a 30-device studio, Mosyle might fit better. Paying for Microsoft 365 E5? Intune could make sense. We recommend what fits your environment, team capability, and budget—then configure it so it works.
We Integrate MDM with the Rest of Your Infrastructure
Most MDM consultants treat device management as an isolated system. We don't. Your MDM needs to integrate with your identity platform (JumpCloud, Entra ID, Okta), network (802.1X, NAC, certificates), backup strategy (FileVault escrow, endpoint agents), and security controls (conditional access, device trust). We architect MDM as part of your complete infrastructure—not a standalone tool fighting everything else.
Knowledge Transfer, Not Vendor Lock-In
You shouldn't need us every time you deploy an app or update a profile. We document everything: runbooks for common tasks, configuration templates, enrollment workflows, troubleshooting guides, escalation procedures. Every engagement includes live admin training—not just PDFs. Some clients want ongoing managed services (we offer retainers). Others run it themselves. Either way, you own the knowledge, not just the subscription.
Apple MDM for Your Industry
Canterbury Schools & Education Providers
Primary schools, secondary colleges, tertiary institutions, early childhood centers
- Apple School Manager integration with Google Workspace for Education or Microsoft 365 Education
- Shared iPad deployment for junior classrooms (automatic student login, app reset between users)
- 1:1 device programs with automated enrollment for student-owned or school-owned devices
- Teacher-managed device groups with self-service app deployment for classroom needs
- Content filtering and screen time restrictions enforced via MDM (no separate MDM required)
- Bulk device purchasing via Apple Financial Services with automated ABM enrollment
Christchurch Creative Studios & Production
Design agencies, video production, photography studios, architecture firms, media agencies
- Jamf Pro deployment for Mac-first creative environments (Adobe CC, Final Cut, Cinema 4D workflows)
- Self-service catalog for licensed creative apps with automated VPP license assignment
- High-performance configuration profiles (disable spotlight indexing on scratch disks, custom storage mount points)
- Integration with render farm infrastructure and shared storage authentication
- Bring-your-own-device (BYOD) support for freelancers with limited access profiles
- iPad deployment for client presentations and on-location production work
Professional Services & SMBs (10-150 Staff)
Law firms, accounting practices, consultancies, financial advisors, real estate agencies
- Microsoft 365 integration with Intune or Jamf for unified endpoint management
- Conditional access policies (only MDM-enrolled, encrypted devices can access client data)
- Document management app deployment (NetDocuments, iManage, SharePoint) with SSO integration
- Compliance reporting for ISO 27001, legal privilege, and client confidentiality requirements
- Remote worker support with automated VPN and certificate deployment
- Executive device management with enhanced privacy controls and priority support
Growing Tech & SaaS Companies
Software development teams, startups, cloud-native businesses, remote-first organizations
- Developer-friendly MDM with minimal restrictions (no blocking of Homebrew, CLI tools, or VM software)
- Automated provisioning for new hires with GitHub access, Slack, 1Password, and dev tools preloaded
- Certificate-based authentication for internal services (GitLab, CI/CD, staging environments)
- macOS and iOS device support for engineering, design, and go-to-market teams
- Integration with identity platforms (Okta, Entra ID, JumpCloud) for SSO and device trust
- Zero-touch onboarding for remote employees (ship device to home, auto-configure on first boot)
Frequently asked questions
Common questions about working with magnumit
What's the difference between Jamf Pro, Jamf School, Mosyle, and other MDM platforms?
What's the difference between Jamf Pro, Jamf School, Mosyle, and other MDM platforms?
Jamf Pro is enterprise-grade with advanced scripting, custom profiles, detailed reporting, and deep integrations—most powerful but requires admin expertise. Jamf School is simplified for primary and secondary schools with classroom tools and lower pricing. Mosyle is Apple-only, popular in NZ education for pricing and teacher features. JumpCloud combines device management with identity (SSO, MFA, directory) in one platform—excellent for unified Mac/Windows/Linux management. Microsoft Intune works if you're licensed for M365 and need cross-platform management. We evaluate your environment, team capability, and budget to recommend the right platform—then configure it properly.
How long does it take to deploy Apple MDM and migrate existing devices?
How long does it take to deploy Apple MDM and migrate existing devices?
New organizations with brand-new devices can be operational in 2-3 weeks: Apple Business Manager setup, MDM configuration, policy design, testing, and go-live. Organizations migrating existing devices typically take 4-8 weeks depending on device count and complexity. We design phased migrations: IT team devices first (to catch issues), then departments one at a time. Most users experience zero downtime—they just approve a new MDM profile and continue working. Shared devices (iPads, Apple TVs, lab Macs) may require factory resets for proper enrollment. We provide a detailed timeline after your discovery session.
Can we manage both organisation-owned and employee-owned (BYOD) devices?
Can we manage both organisation-owned and employee-owned (BYOD) devices?
Yes. Apple supports two enrolment types: Device Enrolment (for organisation-owned devices with full management) and User Enrolment (for BYOD with privacy protections). Device Enrolment gives you full control—enforce encryption, deploy apps, wipe the device if needed. User Enrolment creates a separate managed partition for work data/apps but can't access personal data, photos, or messages. Most organisations use Device Enrolment for organisation-owned Macs and iPads, and User Enrolment for personal iPhones accessing work email. We design policies that match your security requirements whilst respecting staff privacy for BYOD scenarios.
What happens if our MDM server goes offline—can users still work?
What happens if our MDM server goes offline—can users still work?
Yes. MDM uses Apple Push Notification Service (APNs) to communicate with devices, but devices cache configurations locally. If your MDM server is offline, users can still log in, use apps, and work normally. They just won't receive new policies or app deployments until connectivity is restored. Cloud-hosted MDM platforms (Jamf Cloud, Mosyle, JumpCloud, Intune) have 99.9%+ uptime SLAs, so outages are rare. For on-premise Jamf Pro deployments, we design high-availability architectures with failover if uptime is critical. The bigger risk is losing your APNs certificate (expires annually)—we configure automated renewal monitoring to prevent this.
How does FileVault recovery key escrow work, and who can access the keys?
How does FileVault recovery key escrow work, and who can access the keys?
When FileVault encryption is enabled via MDM, the recovery key is automatically generated and escrowed (uploaded) to your MDM platform without the user seeing it. Keys are encrypted in transit and at rest. Only designated MDM administrators can retrieve keys—typically via the admin console or API. This prevents users from losing keys (they never see them) and ensures IT can recover data if a user forgets their password or the device fails. We configure role-based access controls so only authorized admins can view keys, and all key retrievals are logged for audit compliance. This is required for most security frameworks (ISO 27001, SOC 2, Essential Eight).
Can we enforce software updates without disrupting users?
Can we enforce software updates without disrupting users?
Yes, with proper configuration. Modern MDM platforms support scheduled update policies: install updates overnight, require updates within X days of release, or allow users to defer updates for a grace period. For macOS, we typically configure: critical security patches auto-install within 72 hours, minor updates notify users with a 7-day deferral option, and major OS upgrades (e.g., macOS 14 to 15) require user consent unless devices are unattended (labs, shared devices). For iOS/iPadOS, updates can be forced during off-hours or blocked until your team validates app compatibility. We design update policies that balance security (patches deployed quickly) with user productivity (no surprise reboots during presentations).
What's the typical cost for Apple MDM licensing and deployment?
What's the typical cost for Apple MDM licensing and deployment?
Investment depends on platform choice and deployment complexity. Platform licensing typically ranges from $2-12/device or user per month depending on features needed. The real value is what you gain: eliminate manual device setup (saving hours per device), enforce encryption and compliance automatically (reducing security incidents), enable self-service app deployment (reducing helpdesk tickets), and get complete fleet visibility without spreadsheets. Most organisations see ROI within 6-12 months through reduced admin overhead and faster device provisioning. We provide fixed-price quotes after discovery based on your specific requirements—no surprises. All prices exclude GST.
How does Apple MDM integrate with our identity platform (AD, JumpCloud, Entra ID)?
How does Apple MDM integrate with our identity platform (AD, JumpCloud, Entra ID)?
MDM works alongside your identity system—it doesn't replace it. Jamf Pro integrates with JumpCloud, Okta, Entra ID, or Google Workspace for user-based app deployment and SSO. With Jamf Connect, users log into their Mac using their cloud identity password (JumpCloud, Okta) instead of a separate local password. Intune has native Entra ID integration for conditional access—only compliant, enrolled devices can authenticate. If you're still on Active Directory, Jamf can bind Macs to AD, but we typically recommend cloud identity for better remote work support and security. We design the integration to match your existing identity architecture—whether that's cloud-native, hybrid, or legacy AD.
Can we deploy custom internal apps and scripts via MDM?
Can we deploy custom internal apps and scripts via MDM?
Absolutely. We build and sign custom installers as part of most MDM deployments—we're registered Apple Developers, so we can properly code-sign packages for Gatekeeper compliance. MDM platforms support deploying .pkg installers, .dmg disk images, scripts (bash, Python, zsh), and custom configuration profiles. Common use cases: internal tools, VPN clients, print drivers, browser extensions, security agents, monitoring tools, and automated configuration scripts. For App Store apps, you use VPP (Volume Purchase Programme). For your internal apps, we create signed packages that deploy via MDM to device groups or users. Scripts can run on-demand, at check-in intervals, or triggered by events (e.g., certificate renewal when device joins your Wi-Fi). Custom deployment automation is part of our standard MDM implementations—not an add-on.
Do you provide ongoing MDM management and support, or just initial setup?
Do you provide ongoing MDM management and support, or just initial setup?
Both—you choose what fits your team. Some clients want us to manage everything ongoing: user provisioning, app deployment, policy updates, compliance monitoring, and incident response. Managed service retainers start at $1,500/month and scale with fleet size and complexity. Other clients prefer to run MDM in-house after launch—we provide full documentation, runbooks, admin training, and on-call support for when you need it. Many clients start with managed service for the first 3-6 months whilst their team learns the platform, then transition to self-operation with our support for complex changes. Either model works—we design handover based on your team's capability and capacity, not what makes us the most money.
Serving Canterbury & Nationwide
Based in Christchurch with on-site services across Canterbury. MDM deployments delivered nationwide across New Zealand.
Remote MDM deployment and training available nationwide. On-site device enrollment and support across Canterbury.
Let's Build Your MDM Architecture
We'll assess your current setup, map your requirements, and design an MDM platform that scales. You'll get a fixed-price quote with no obligation, and honest advice about whether you even need us.