Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal - Policy Updates #35

Merged
merged 1 commit into from
Aug 29, 2024

Conversation

ugurkocde
Copy link
Contributor

Hi James,

First of, I’m really impressed with the settings you’ve provided.

I’ve imported, deployed, and tested them all, and I see some opportunities for improvement. Below is my proposal for Version 1.1.

Please note, the version number in the file names must be updated after the merge.


MacOS - OIB - Microsoft OneDrive - D - Service and Access - v1.1

Changes:

  • Login → Service Management - Managed Login Items:

    • Removed 2 Rules besides OneDrive (Standalone) and Launcher. KFM is only supported for the Standalone version that is part of the M365 Apps installation. You can only run one instance of OneDrive at a time, so it doesn't make sense to manage all different versions, in my opinion.
    • Changed the Rule Type of OneDrive Standalone from Label to Label Prefix.
  • Privacy → Privacy Preferences Policy Control:

    • Removed the identifier for com.microsoft.OneDrive-mac, which is the Store App that does not support KFM.
  • System Configuration → System Extension:

    • Removed com.microsoft.OneDrive-mac.FinderSync from the identifier as this is not needed.

MacOS - OIB - Microsoft OneDrive - U - Known Folder Move - v1.1

  • Added the setting “Open at login” and set it to True. This automatically starts OneDrive after the user signs in.

MacOS - OIB - Disk Encryption - D - FileVault - v1.1

  • Added “Recovery Key Rotation In Months” and set it to 6 months. This makes it more secure and aligns with a lot of the security baseline in enterprises (same with Bitlocker Key rotation on Windows Devices)
  • Removed Defer setting as this causes problems activating it in the Setup Assistant. Despite what Microsoft Techcommunity suggests, it works better without it.

FYI: You need to show the FileVault screen in the Setup Assistant. This can be configured in the enrollment profile.


MacOS - OIB - Microsoft AutoUpdate - D - MAU Configuration - v1.1

  • Enabled the setting “Guard against app modification” to enable delta updates.
  • Changed Update Channel from Current Channel to Current Channel (Monthly). This is the monthly enterprise channel on Windows M365 apps.
  • Changed the setting for “Updater optimization technique” from Lower network overhead to Lower processor overhead. This is because updates are only installing beta updates when Guard against app modification is enabled, and most problems users experience are related to processor performance (e.g., the device getting warmer and slower).

MacOS - OIB - Microsoft Office - D - Updates - v1.0

  • I think we can delete this.
  • Policy not needed as those apps are getting auto-registered into MAU.
  • Only necessary if using different update channels for these apps, but generally not advised. The MAU Configuration - v1.0 is perfectly fine.

MacOS - OIB - Defender Antivirus - D - Antivirus Configuration - v1.1

  • Changed the setting “Show / hide status menu icon” from enabled to disabled: Set to disabled so the icon is displayed in the menu bar, allowing users to see the status and manually force updates if needed. Key is hideStatusMenuIcon, so disable (default) shows the icon in the menubar.

MacOS - OIB - Firewall - D - Gatekeeper - v1.1

  • Changed the setting “Allow Identified Developers” (Gatekeeper) from false to true: Some apps are installed with scripts, like Company Portal and M365. Setting "Allow Identified Developers" to false means only Apps from the App Store are allowed.
  • Changed the setting “Block all incoming” (Firewall) from true to false. This prevents connection issues with devices on the same network, e.g., AirPrint, headphones, and external displays or TVs.

MacOS - OIB - Device Security - D - Accounts and Login - v1.1

  • Changed the setting “Hide Admin Users” from true to false: Setting "Hide Admin Users" to true is super annoying. Most users are still local admins on their macOS devices, and when trying to log in, the username is not pre-filled, requiring manual entry on the login screen.

@SkipToTheEndpoint SkipToTheEndpoint changed the title Proposal - Update to 1.1 Proposal - Policy Updates Aug 29, 2024
@SkipToTheEndpoint SkipToTheEndpoint merged commit 87730f1 into SkipToTheEndpoint:MacOSBeta Aug 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants