Managing Apple Intelligence in the Enterprise: What You Can Control and What You Cannot
Apple Intelligence shipped with iOS 18.1, iPadOS 18.1, and macOS 15.1 Sequoia in late 2024. The feature set has expanded with each OS release since. Organizations managing Apple devices face a decision: allow it, restrict it partially, or attempt to block it entirely.
This article covers the MDM restrictions available, the features that remain unmanageable, the privacy architecture behind Private Cloud Compute, and how to form a policy position based on your organization's risk tolerance.
How Apple Intelligence Works
Apple Intelligence processes requests in two ways:
On-device processing. A ~3 billion parameter model optimized for Apple Silicon handles many tasks locally. Email summaries, notification previews, Writing Tools for short text, and natural language search in Photos run on the device. No data leaves the device for these operations.
Private Cloud Compute (PCC). When a task exceeds on-device capability, Apple Intelligence sends relevant data to Apple Silicon servers in Apple's data centers. The request is encrypted end-to-end. Apple states that data is processed only to fulfill the request, not stored, and not accessible to Apple employees. Independent security researchers can inspect the server software through Apple's Virtual Research Environment.
The decision about on-device vs. PCC happens automatically. Users cannot force one path or the other. Administrators cannot configure which path is used.
Third-party integrations. Apple Intelligence can optionally connect to external AI services like ChatGPT for certain queries. These requests leave Apple's ecosystem entirely and are governed by the third party's privacy policy, not Apple's. A separate MDM restriction controls this integration.
Available MDM Restrictions
Apple provides granular restrictions for Apple Intelligence features through the com.apple.applicationaccess payload. These require supervised devices for full enforcement.
| Restriction Key | What It Controls | Minimum OS |
|---|---|---|
allowWritingTools |
Proofreading, rewriting, summarizing text | iOS/iPadOS 18.0, macOS 15.0 |
allowMailSummary |
Email thread summaries in Mail | iOS/iPadOS 18.1, macOS 15.1 |
allowGenmoji |
Custom emoji generation | iOS/iPadOS 18.0, macOS 15.0 |
allowImagePlayground |
AI image generation app | iOS/iPadOS 18.0, macOS 15.0 |
allowImageWand |
AI image generation in Notes | iOS/iPadOS 18.0, macOS 15.0 |
allowPersonalizedHandwritingResults |
Handwriting personalization | iOS/iPadOS 18.0, macOS 15.0 |
allowExternalIntelligenceIntegrations |
Third-party AI (ChatGPT) queries | iOS/iPadOS 18.0, macOS 15.0 |
allowExternalIntelligenceIntegrationsSignIn |
Signing into third-party AI accounts | iOS/iPadOS 18.0, macOS 15.0 |
allowNotesTranscription |
Audio transcription in Notes | iOS/iPadOS 18.0, macOS 15.0 |
allowNotesTranscriptionSummary |
Transcription summaries in Notes | iOS/iPadOS 18.0, macOS 15.0 |
Example restriction profile (partial):
<dict>
<key>PayloadType</key>
<string>com.apple.applicationaccess</string>
<key>allowWritingTools</key>
<false/>
<key>allowMailSummary</key>
<false/>
<key>allowGenmoji</key>
<false/>
<key>allowImagePlayground</key>
<false/>
<key>allowExternalIntelligenceIntegrations</key>
<false/>
<key>allowExternalIntelligenceIntegrationsSignIn</key>
<false/>
</dict>
Setup Assistant skip keys. You can prevent the Apple Intelligence onboarding screens from appearing during device setup through your ADE profile. This prevents users from enabling Apple Intelligence during initial configuration but does not prevent them from enabling it later in Settings.
iOS 26 behavior. When any Apple Intelligence feature is restricted via MDM, the device no longer shows "Ready for Apple Intelligence" notifications and badges. This reduces user confusion about why features appear unavailable.
What You Cannot Manage
Apple does not provide MDM restrictions for all Apple Intelligence features. Bob Gendler's analysis on JAMF Nation documents this gap clearly: even with all available restrictions deployed, some Apple Intelligence features remain unmanageable.
Features without MDM restrictions:
- Clean Up in Photos (object removal)
- Natural language search in Photos
- Create a Memory movie (iOS/iPadOS)
- Enhanced Siri capabilities (improved responses, product knowledge, conversational context)
- Visual Intelligence (iPhone 16 and later)
- Smart Reply suggestions in Messages
No master kill switch. There is no single allowAppleIntelligence key that disables all AI features. You must deploy individual restrictions for each feature you want to block. When Apple adds new features in future OS releases, those features will be enabled by default until Apple provides a new restriction key and you deploy it.
No DDM support. Despite Apple's push toward Declarative Device Management, Apple Intelligence restrictions use traditional MDM restrictions, not DDM declarations. The WWDC 2025 announcement noted that DDM was not extended to Apple Intelligence settings.
User-level preference problem. Apple Intelligence opt-in status is stored in a user-level preference file tied to the Apple Account's DSID (Directory Services ID). This identifier is unique per user per device. You cannot manage this preference via configuration profile because the key changes based on which Apple Account is signed in.
Network-Level Blocking
Some organizations attempt to block Apple Intelligence at the network layer by blocking Private Cloud Compute endpoints.
PCC domains:
apple-relay.apple.com
*.apple-cloudkit.com
Blocking these domains prevents PCC-based features from functioning. On-device features continue to work.
Problems with this approach:
- Users on external networks bypass your blocks
- Other Apple services may share these domains
- Features fail silently or with confusing error messages
- The
/etc/hostsfile approach requires custom scripting to deploy and maintain
Network blocking is a blunt instrument. It does not provide the granularity of MDM restrictions and creates unpredictable user experiences.
Privacy and Compliance Considerations
Private Cloud Compute Architecture
Apple's PCC design includes several security properties relevant to enterprise risk assessment:
No data retention. Apple states that PCC processes requests ephemerally. Data exists only during processing and is not written to persistent storage.
No privileged access. Apple removed SSH, remote shells, and debug tools from PCC nodes. Apple employees cannot access data on PCC servers, even with administrative credentials.
Cryptographic attestation. User devices verify that PCC servers are running publicly logged, signed software before sending requests. If a server's software does not match the logged version, the device refuses to communicate with it.
Researcher verification. Apple provides a Virtual Research Environment that replicates PCC locally. Security researchers can inspect server behavior.
The Siri Complication
Research presented at Black Hat USA 2025 by Lumia Security documented that Siri transmits data to Apple servers outside the PCC system. When users dictate messages through Siri to apps like WhatsApp, message content is sent to Siri servers under Siri's privacy policy, not PCC's policy.
Apple disputed the characterization that this represents a privacy violation, pointing to existing Siri privacy disclosures. However, the distinction matters for compliance: Siri servers and PCC servers operate under different policies. Two similar queries may follow different data paths with different privacy implications.
Enterprise Observability Gaps
PCC provides strong privacy guarantees for individual users. It does not provide enterprise observability:
- No enterprise APIs for tracking AI usage
- No SIEM integration for AI activity monitoring
- No conditional logic, geofencing, or behavioral controls
- No data loss prevention integration
- No ability to audit what data was sent to PCC
Organizations with strict compliance requirements (HIPAA, financial regulations, government contracts) may find these gaps problematic. You cannot prove what data did or did not leave a device through Apple Intelligence because Apple does not provide that telemetry to enterprise administrators.
User-accessible logging. Users can generate an Apple Intelligence Report showing PCC requests from their device (Settings > Privacy & Security > Apple Intelligence Report). This is user-initiated and user-controlled. MDM cannot collect these reports.
Forming a Policy Position
Organizations typically land in one of three positions:
Position 1: Allow Apple Intelligence
Rationale: Apple's privacy architecture provides stronger guarantees than most enterprise AI tools. On-device processing keeps most data local. PCC's design prevents data retention and unauthorized access. The productivity benefits outweigh the compliance gaps.
Implementation: Deploy no Apple Intelligence restrictions. Consider restricting only allowExternalIntelligenceIntegrations to prevent data from leaving Apple's ecosystem to third parties like OpenAI.
Risk: Users may inadvertently process sensitive data through AI features. You cannot audit what was processed. Some regulated industries may have requirements that prohibit any cloud AI processing.
Position 2: Restrict Partially
Rationale: Allow low-risk features while blocking features that process sensitive content. Writing Tools on short text is lower risk than features that process emails, messages, or images.
Implementation: Deploy restrictions for high-risk features:
allowMailSummary= false (prevents email content processing)allowExternalIntelligenceIntegrations= false (prevents third-party AI)allowNotesTranscription= false (prevents audio processing)
Allow productivity features:
- Writing Tools for document editing
- Genmoji for communication
Risk: Inconsistent user experience. Some AI features work, others do not, with no clear pattern from the user's perspective.
Position 3: Restrict Everything Available
Rationale: Compliance requirements or risk tolerance demand blocking all AI features possible. Accept that some features remain unmanageable.
Implementation: Deploy all available restrictions. Block PCC domains at the network level for on-premises users. Skip Apple Intelligence Setup Assistant panes during enrollment.
Risk: Features without restrictions still function. New features in future OS releases are enabled by default until you deploy new restrictions. Users on external networks bypass network blocks.
Implementation Steps
Step 1: Inventory Your MDM Capabilities
Verify your MDM solution supports Apple Intelligence restrictions. JAMF Pro, Intune, Workspace ONE, Kandji, Mosyle, SimpleMDM, and Addigy all support these keys. Check your MDM's documentation for the specific UI location or whether custom XML is required.
Step 2: Determine Supervision Status
Full Apple Intelligence restrictions require supervised devices. Check your fleet:
# On a Mac, check supervision status
profiles status -type enrollment
For iOS/iPadOS, supervised devices show "This iPhone is supervised" in Settings > General > About.
If devices are not supervised, you need ADE enrollment to achieve supervision. User-enrolled and unsupervised devices have limited restriction enforcement.
Step 3: Create a Restriction Profile
Build a configuration profile with your chosen restrictions. Test on a pilot group before fleet deployment.
For JAMF Pro:
- Computers/Devices > Configuration Profiles
- Create profile > Restrictions payload
- Locate Apple Intelligence section (may require Settings Catalog or custom payload depending on JAMF version)
For Intune:
- Devices > Configuration profiles > Create profile
- Settings catalog > Add settings
- Search for individual restriction keys
Step 4: Configure ADE Profiles
Update your Automated Device Enrollment profiles to skip Apple Intelligence Setup Assistant panes:
- Skip Apple Intelligence setup screen
- Skip Siri setup screen (if also restricting Siri)
This prevents users from enabling Apple Intelligence during initial device configuration.
Step 5: Communicate Policy
Users will notice when AI features are unavailable. Publish your AI acceptable use policy before deploying restrictions. Explain what is blocked and why.
Step 6: Monitor for New Features
Subscribe to Apple's release notes for iOS, iPadOS, and macOS. When Apple adds new Apple Intelligence features, determine whether new restriction keys are available and whether your policy requires deploying them.
What to Watch For
Future OS releases. Apple continues expanding Apple Intelligence. macOS 26 Tahoe and iOS 26 include additional features. Monitor Apple's enterprise release notes for new restriction keys.
WWDC announcements. Apple's device management session at WWDC typically covers new restriction capabilities. The gap between feature announcement and MDM restriction availability creates a window where new features cannot be managed.
Regulatory guidance. Industry regulators are still developing positions on AI in regulated environments. HIPAA, PCI-DSS, and government security frameworks may issue specific guidance on Apple Intelligence.
Third-party AI expansion. Apple may add integrations beyond ChatGPT. Each integration introduces a new data flow outside Apple's control.
Summary
Apple Intelligence provides MDM restrictions for major features but not for all features. No master kill switch exists. PCC provides strong privacy guarantees for individuals but limited observability for enterprises. Network blocking is possible but imprecise.
Form your policy based on:
- Regulatory requirements for your industry
- Risk tolerance for cloud AI processing
- Acceptable gaps in auditability
- User productivity considerations
Deploy your chosen restrictions to supervised devices. Update ADE profiles to skip AI setup. Communicate your policy to users. Monitor for new features and restriction keys with each OS release.
Published by MacJediWizard Consulting