Instant Apple Configurator How-to
By TJ Houston and Charles Edge
()
About this ebook
Related to Instant Apple Configurator How-to
Related ebooks
Learning iOS Security Rating: 0 out of 5 stars0 ratingsiOS Forensics Cookbook Rating: 0 out of 5 stars0 ratingsInstant Java Password and Authentication Security Rating: 0 out of 5 stars0 ratingsAsterisk Hacking Rating: 0 out of 5 stars0 ratingsAndroid Security Cookbook Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsAndroid Programming: Pushing the Limits Rating: 0 out of 5 stars0 ratingsKismet Hacking Rating: 0 out of 5 stars0 ratingsFlash Development for Android Cookbook Rating: 3 out of 5 stars3/5Apple Secure Enclave Processor Rating: 0 out of 5 stars0 ratingsThe Ridiculously Simple Guide to Apple Services: A Beginners Guide to Apple Arcade, Apple Card, Apple Music, Apple TV, iCloud Rating: 0 out of 5 stars0 ratingsHackproofing Your Wireless Network Rating: 0 out of 5 stars0 ratingsMac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit Rating: 0 out of 5 stars0 ratingsXDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming Rating: 2 out of 5 stars2/5Mobile Device Exploitation Cookbook Rating: 0 out of 5 stars0 ratingsMethods to Increase the Internal Storage Space of Android Devices Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsSamsung Galaxy S4 User Manual: Tips & Tricks Guide for Your Phone! Rating: 4 out of 5 stars4/5Starting with Android: Android application development guide Rating: 0 out of 5 stars0 ratingsAndroid & Cellphones Rating: 5 out of 5 stars5/5Hacking Android Rating: 4 out of 5 stars4/550 Android Hacks Rating: 5 out of 5 stars5/5Not Just Another Computer Book Rating: 0 out of 5 stars0 ratingsAndroid Forensics: Investigation, Analysis and Mobile Security for Google Android Rating: 3 out of 5 stars3/5Mastering Mobile Forensics Rating: 0 out of 5 stars0 ratingsLearning Android Forensics Rating: 4 out of 5 stars4/5Mobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5Apple For Business: A Guide to Mac, iPad, and iPhone Rating: 0 out of 5 stars0 ratingsMobile Data Loss: Threats and Countermeasures Rating: 0 out of 5 stars0 ratings
System Administration For You
Linux Bible Rating: 0 out of 5 stars0 ratingsConfigMgr - An Administrator's Guide to Deploying Applications using PowerShell Rating: 5 out of 5 stars5/5Learn Cisco Network Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsMastering Microsoft Endpoint Manager Rating: 0 out of 5 stars0 ratingsLinux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Improve your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsLearn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsLearn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsWordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsOperating Systems DeMYSTiFieD Rating: 0 out of 5 stars0 ratingsMastering Bash Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Learning Linux Shell Scripting Rating: 4 out of 5 stars4/5Learn SQL Server Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Let's Use BASH on Windows 10! Rating: 0 out of 5 stars0 ratingsSummary of Lights Out: by Ted Koppel | Includes Analysis Rating: 0 out of 5 stars0 ratingsLinux Commands By Example Rating: 5 out of 5 stars5/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5
Reviews for Instant Apple Configurator How-to
0 ratings0 reviews
Book preview
Instant Apple Configurator How-to - TJ Houston
Table of Contents
Instant Apple Configurator How-to
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Instant Apple Configurator How-to
Signing up for an Apple ID (Must know)
Getting ready
How to do it...
How it works...
There's more...
Bulk account creation
Removing credit card information from an Apple ID
Finding the Apple ID for purchased apps
Installing Apple Configurator (Must know)
Getting ready
How to do it...
How it works...
There's more...
Before you click, prepare…
Configuring the Apple Configurator preferences (Should know)
Getting ready
How to do it...
How it works...
There's more...
Apple ID association
Migrating existing profiles into Apple Configurator (Should know)
Getting ready
How to do it...
How it works...
There's more...
Enrolling in Mobile Device Management
Deciding whether to prepare, supervise, or assign (Must know)
Getting ready
How to do it...
How it works...
There's more...
Creating a cart workflow (Should know)
Getting ready
How to do it...
How it works...
Leveraging Configurator in a one-to-one environment (Should know)
Getting ready
How to do it...
How it works...
There's more...
One-to-one for elementary schools
Checking out devices (Should know)
Getting ready
How to do it...
How it works...
Creating a device backup (Should know)
Getting ready
How to do it...
How it works...
There's more...
Device activation
Naming conventions
Restoring a device backup (Should know)
Getting ready
How to do it...
How it works...
There's more...
iOS 5 versus iOS 6
Backing up Apple Configurator
Understanding profiles (Become an expert)
Getting ready
How to do it...
How it works...
There's more...
Profiles and OS X
Viewing profiles from iOS
Building a profile (Must know)
Getting ready
How to do it...
How it works...
There's more...
Empty fields
Exploring all profiles (Should know)
Getting ready
How to do it...
How it works...
There's more...
Multiple instances and removing payload entries
Exporting profiles (Must know)
Getting ready
How to do it...
How it works...
There's more...
Signatures
Creating auto enrollment profiles (Become an expert)
Getting ready
How to do it...
How it works...
There's more...
Mobile Device Management providers
Purchasing applications through the VPP (Should know)
Getting ready
How to do it...
How it works...
There's more...
Countries without VPP
Importing applications (Should know)
Getting ready
How to do it...
How it works...
There's more...
Managing the VPP code spreadsheet
Deploying applications on prepared devices (Become an expert)
Getting ready
How to do it...
How it works...
There's more...
Apple IDs
Deploying applications on managed devices (Become an expert)
Getting ready
How to do it...
There's more...
Device supervision and assignment
Adding files to devices (Should know)
Getting ready
How to do it…
How it works…
Importing files back to the computer (Should know)
Getting ready
How to do it…
How it works...
Instant Apple Configurator How-to
Instant Apple Configurator How-to
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: March 2013
Production Reference: 1210313
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-84969-406-3
www.packtpub.com
Credits
Authors
Charles Edge
TJ Houston
Reviewer
Allister Banks
Acquisition Editor
Akram Hussain
Commissioning Editor
Harsha Bharwani
Technical Editor
Veronica Fernandes
Project Coordinator
Amigya Khurana
Proofreader
Maria Gould
Production Coordinator
Manu Joseph
Cover Work
Manu Joseph
Cover Image
Conidon Miranda
About the Authors
Charles Edge is the Chief Technology Officer of 318 Inc, a national, Mac-first consultancy based in Santa Monica, California. Here he manages a team of elite systems administrators who enjoy improving technology as much as they enjoy figuring out the weird things people do to computers. Charles has been involved with opening 318 offices around the United States, including a presence in New York, Nashville, Minneapolis, San Francisco, and Portland. He speaks at a number of conferences. His first speaking appearance at a large conference was DefCon 2004. Since then he has spoken at conferences such as MacSysAdmin, MacWorld, LinuxWorld, and BlackHat. He is also the author of krypted.com, a site dedicated to heterogeneous networking and Apple systems administration.
He has authored several books including:
Enterprise iPhone and iPad Administrator's Guide, Apress, November 2010, ISBN 1-4302-3009-6
The Mac Tiger Server Little Black Book, Paraglyph Press, February 2006, ISBN 1-933097-14-0
Web Scripting Little Black Book, Paraglyph Press, April 2007, ISBN 1-933097-19-1
Foundations of Mac OS X Leopard Security, Apress, March 2008, ISBN 1-59059-989-6
Foundations of Mac OS X Snow Leopard Security, Apress, February 2010, ISBN 1-4302-2730-3
Enterprise Mac Administrator's Guide, Apress, October 2009, ISBN 1-4302-2443-6
Beginning Mac OS X Snow Leopard Server: From Solo Install to Enterprise Integration, Apress, February 2010, ISBN 1-4302-2772-9
Using Mac OS X Lion Server, O'Reilly, January 2012, ISBN 1-4493-1605-0
TJ Houston is the Director of Technology for Huron City Schools and has worked with educators for over 5 years. A significant amount of this time has been