Skip to main content

Software Update Deployment Rings for Managed macOS Devices

· loading ·
Intune Apple macOS Updates Groups Security
Author
Nick Benton
Principal Cloud Endpoint Consultant and Intune Blogger
Table of Contents

So you’ve pulled the trigger on managing macOS devices in Microsoft Intune, and with this year being the year of macOS for Microsoft (this seems like an oxymoron), you should probably look at how to handle software updates.

I’ve been waiting a little while to put this post together, as unlike the monthly release of Windows Updates, macOS updates come few and far between, with the recent release of Sonoma 14.4 on March 7th 2024, giving me an actual update to test any phased update configurations. Though maybe I should have got this post out sooner looking at the reception that the update has gotten since its release.

Either way, as Microsoft Intune is now a safe space for macOS device management, instead of the mild headache it used to be, we can now look at how we control the update of software on these devices, so macOS users don’t escape the same fate placed upon your normal everyday Windows user.

Update Configuration Precedence
#

I wish this was as straight forward as Windows Update Rings, but it isn’t, and with the recent changes to macOS device management in Microsoft Intune, we now have three different ways to control updates on these devices.

I’m not sure we needed all three, but there is a clear documented hierarchy for the settings, along with which versions of macOS support each. In summary though, the precedence of update configuration profiles looks like this:

  1. Managed software updates - Settings catalog > Declarative Device Management > Software Update
  2. Update policies - Devices > Update policies for macOS
  3. Software updates - Settings catalog > System Updates > Software Update

I’m going to avoid numbers 1 and 2, and although this goes against my love of all things latest and greatest, and leans on the user to install updates, does give us the functionality of phased updates we require, and without reliance on specific versions of the operating system.

Deployment Approach
#

As with our previous look at update deployment across Windows devices, we’re going to split our macOS device estate into key deployment groups, this time we’re back with four, I’ll explain why later.

Sticking with the Pilot, Pre-production, and production deployment approach, we end up with something like the below:

  • Pilot - This should be a stratified sample of either users or devices, ~5% of your device estate.
  • Pre-Production - The early adopters deployment, ~15% of your device estate.
  • Initial Production - The first production deployment, ~30% of your device estate.
  • Final Production - The final production deployment, the remaining ~50% of the device estate.

These groups can be used not just for macOS software updates, but also with some additional configuration, Microsoft Updates as well. What a world we live in.

Deployment Groups
#

As we like to please Microsoft, we’re going to use what are referred to as efficient groups, stopping the use operators like match, in the hope that they reinstate Microsoft Developer Intune subscriptions for free.

Group Type Membership
Pilot Assigned TBC
Pre-Production Dynamic Device (device.deviceManagementAppId -ne null) and (device.deviceOSType -eq "MacMDM") and (device.deviceOwnership -eq "Company") and ((device.deviceId -startsWith "0") or (device.deviceId -startsWith "1") or (device.deviceId -startsWith "a"))
Initial Production Dynamic Device (device.deviceManagementAppId -ne null) and (device.deviceOSType -eq "MacMDM") and (device.deviceOwnership -eq "Company") and ((device.deviceId -startsWith "2") or (device.deviceId -startsWith "3") or (device.deviceId -startsWith "4") or (device.deviceId -startsWith "b") or (device.deviceId -startsWith "c"))
Final Production Dynamic Device (device.deviceManagementAppId -ne null) and (device.deviceOSType -eq "MacMDM") and (device.deviceOwnership -eq "Company") and ((device.deviceId -startsWith "5") or (device.deviceId -startsWith "6") or (device.deviceId -startsWith "7") or (device.deviceId -startsWith "8") or (device.deviceId -startsWith "9") or (device.deviceId -startsWith "d") or (device.deviceId -startsWith "e") or (device.deviceId -startsWith "f"))

These groups will naturally split your macOS device estate across the three pre-production and production dynamic groups, allowing for suitable phasing of the delivery of updates.

With the Pilot group, you should add devices into this group that you want to get updates the earliest, so actual pilot devices here please, not your own or your work besties.

Software Update Configuration
#

Before we start looking at the option to delay or defer software updates, we need to create a baseline configuration that sets devices update preference settings, to allow for this phased approach of update delivery.

So with a quick Settings Catalog profile created with the below settings, and assigned to your devices, we can ensure that the devices will get the updates they need, but when we tell them:

Area Setting Value
Software Update Config Data Install True
Software Update Automatic Check Enabled True
Software Update Allow Pre Release Installation False
Software Update Critical Update Install True
Software Update Restrict Software Update Require Admin To Install False
Software Update Automatic Download True

You’ll notice that for Critical Update Install and Config Data Install we’re allowing these to just happen, you should, as they’re important. What we want to control is when devices get OS updates, not leaving gaping security flaws in devices.

Phased Software Updates
#

The phasing of Software update is a little bit of a pain, but it can be achieved using the below settings, creating one Settings Catalog profile for each deployment group. Now you don’t get the same pause and uninstall functionality as you would with Windows Update Rings, but at least you’re not pushing out updates all at once to devices.

Update Ring Automatically Install App Updates Automatically Install Mac OS Updates Force Delayed App Software Updates Force Delayed Software Updates Enforced Software Update Delay Enforced Software Update Non OS Deferred Install Delay Enforced Software Update Minor OS Deferred Install Delay
Pilot True True False False - - -
Pre-Production False False True True 5 5 5
Initial Production False False True True 9 9 9
Final Production False False True True 12 12 12

These phased deployment of updates across the groups, will ensure that there is enough time between each phase to identify any issues (cough like with Sonoma 14.4 cough), allowing for some level of testing of updates prior to a full deployment across your whole macOS device estate.

When assigning these profiles to the created deployment groups, ensure that you are excluding the Pilot group from the pre-production and production profiles.

Software Update Results
#

Seeing the Settings Catalog profiles in action, with a first look at the configuration being applied:

macOS Update Configuration
Screenshot of the macOS Update Configuration Settings

Looks good, and matches what we’ve configured in our baseline software update profile.

Checking on the status of the updates, we’ve actually got Sonoma 14.4 available on this device, regardless of the deployment group it’s a member of, as 7+12=19 (quick maths) which is less than the date of this post:

macOS Update Configuration
Screenshot of the macOS Update Configuration Settings

Luckily we’ll be ready with our configured deferral settings for the next macOS software update release, and I hope it goes a little better than this release.

Microsoft AutoUpdate Settings
#

Bringing additional functionality to our update deployments, and to allow for the management of visibility and installation of any update covered under the Microsoft AutoUpdate (MAU) application, we need to to implement some more baseline settings to configure Microsoft AutoUpdate.

So go create yourself another Settings Catalog profile, and throw the below settings into it:

Area Setting Value
Microsoft AutoUpdate (MAU) Disable Office Insider membership True
Microsoft AutoUpdate (MAU) Number of minutes for the final countdown timer 60
Microsoft AutoUpdate (MAU) Register app on launch True
Microsoft AutoUpdate (MAU) Update channel Current Channel
Microsoft AutoUpdate (MAU) Update check frequency (mins) 240

Feel free to amened the Number of minutes for the final countdown timer and Update check frequency (mins) if you like your user base more than I do.

Phased Microsoft Updates
#

To phase the delivery of Microsoft Application updates across the four deployment groups, you will need to create four separate Settings Catalog profiles with the below settings, with restrictions configured to stop users checking for updates and relying on the deferral and deadline settings where applicable.

Update Ring Enable AutoUpdate Enable check for updates Deferred updates Days before forced updates
Pilot True - - -
Pre-Production True False Defer 3 days 2
Initial Production True False Defer 7 days 2
Final Production True False Defer 7 days 5
Updated the Enable AutoUpdate settings based on feedback from Somesh Pathak (MVP)

You can now see why I stuck with four deployment groups, as we love working within the National Cyber Security Centre guidelines to ensure that updates are installed in that wonderful 14-day window, and the Microsoft AutoUpdate configuration only allows set values for Deferred updates.

When assigning these profiles to the created deployment groups, ensure that you are excluding the Pilot group from the pre-production and production profiles.

Microsoft Update Results
#

Checking in on a device that is set to defer and delay the installation of Microsoft Updates, we can see that the profile has applied correctly:

Microsoft AutoUpdate settings
Screenshot of Microsoft AutoUpdate Settings

With no ability for the end user to install the updates on their own, and the correct configuration applied to the device we’re off to a good start.

Let’s look at the updates themselves:

Microsoft AutoUpdate Updates
Screenshot of Microsoft AutoUpdate Updates

Perfect, the Microsoft AutoUpdate application has detected that there are actually updates, but will adhere to the deferral and deadline settings, ensuring that the application updates do get installed, but when we want them to, not at the whim of the end user.

Summary
#

With each deployment group now configured to get update deferrals and installation deadlines for Software, Operating System, and Microsoft Applications aligned to the same day, we have the ability to unify the deployment approach of updates to Microsoft Intune managed macOS devices.

This may not give us all the functionality we want just yet, still relying on users to carry out installations, but until there is another flexible approach to enforced software updates that doesn’t rely on check-in or day of the week, or scripts and property lists, or community tools like nudge, this will have to do.

We are at least, one step closer to getting some level of feature parity between device management for Windows devices and macOS devices in Microsoft Intune, and with more on the horizon, it’s a good time to be a hybrid macOS and Windows device consultant.

Related

A Flexible Approach to Microsoft Update Deployments
· loading
Intune Windows 10 and later Updates Groups Security
So this isn’t the first time we’ve looked at improving the management of updates using Microsoft Intune, and probably won’t be the last time either, especially with declarative device management looming, for Apple and hopefully Windows devices, covering configuration of software updates.
Intelligent Phased Windows Update for Business Deployments
· loading
Intune Windows 10 and later Updates Groups Security
You might have been asked the question, especially from organisations that currently utilise Microsoft Configuration Manager, about how you mimic existing Device Collections used for Software Update deployments in Microsoft Intune.
Revisiting macOS National Cyber Security Centre Security Settings
· loading
Intune Apple macOS Security NCSC Configuration
We looked at some of the ways to secure macOS devices in Microsoft Intune, aligned with the NCSC platform guidance in macOS National Cyber Security Centre Security Settings in Intune, but this was when macOS device management in Intune was, at best, in beta.