Blog Post

Intune Customer Success
2 MIN READ

Support Tip: Erase remote action on macOS 12.0.1 devices requires bootstrap token

Intune_Support_Team's avatar
Intune_Support_Team
Silver Contributor
Mar 23, 2022

You can wipe macOS devices using the Erase remote action in Microsoft Endpoint Manager, as explained in Erase all data from a macOS device. However, a remote wipe for Apple silicon-based devices running macOS 12.0.1 or later requires a bootstrap token issued by Microsoft Intune. For detailed requirements to remotely wipe macOS devices, go to Wipe Apple devices remotely - Apple Support.

 

On March 26th, as part of Intune’s 2203 service release, we will add support for bootstrap tokens (public preview). Once this feature is rolled out, a bootstrap token will be automatically generated and escrowed to Intune after a secure token user (usually an administrator account) signs in to the device. If your remote wipe fails due to a missing bootstrap token, continue reading to learn how to diagnose the issue and restore the device.

 

Note: Bootstrap tokens are not currently supported for Intune for Government or Intune operated by 21Vianet.

 

When you initiate the Erase remote action in Intune without the required bootstrap token, a failed wipe status is returned.

 

Screenshot of the Microsoft Endpoint Manager admin center showing a ‘Wipe: Failed’ status for a MacBook Pro device.

 

The device will still receive the Erase remote action but will use the macOS “obliteration behavior,” which is explained in the above Apple Support article. When this occurs, the device will be unable to boot and may show the following error screen.

 

Screenshot of a macOS black screen with a warning (!) icon and the text “support.apple.com/mac/restore".

 

If a device enters this state, you will need to use another macOS device running Apple Configurator 2 to restore it. Steps on how to restore mac devices are available at Revive or restore a Mac with Apple silicon using Apple Configurator 2 - Apple Support.

 

If you have any feedback or questions reply to this post or reach out to @IntuneSuppTeam on Twitter.

Updated Dec 01, 2023
Version 3.0

5 Comments

    • obold1's avatar
      obold1
      Copper Contributor

      Here is it:

      https://github.com/microsoft/shell-intune-samples/blob/master/macOS/Custom%20Attributes/Check%20bootstrap%20token%20escrow%20status/checkBootstrapTokenEscrowStatus.sh

  • Hi Tim_bl, thanks for the questions and we would be happy to assist here! Regarding the ability to check when a bootstrap token was generated on devices, see our GitHub: microsoft / shell-intune-samples | Check bootstrap token escrow status which is a custom attribute you can leverage to return the results of the bootstrap token escrow status. One thing to keep in mind is that a macOS device must be supervised or enrolled through Apple Device Enrollment (ADE) in order to have support for a bootstrap token with Intune and you can find more info here: Set up enrollment for macOS devices. To confirm, both personal and corporate devices with bootstrap token are supported and we’d be happy to help if you have further questions about either.

  • Tim_bl's avatar
    Tim_bl
    Brass Contributor

    Dear Intune_Support_Team,

     

    Is there any way to verify remotely whether this bootstrap token was generated on devices after 2203 release? Furthermore is there any difference between devices enrolled as personal (Company Portal application) or corporate (automated device enrollment) regarding auto bootstrap token generation?

    Thank you!

     

    Tim