FileVault
Last Updated: May 2025
Implementation Effort: Low – Admins only need to configure and assign a device configuration profile in Intune.
User Impact: Low – Encryption is silent and automatic; users are not required to take any action.
Introduction
FileVault is Apple’s native full-disk encryption technology for macOS. In Intune, administrators can enforce FileVault through configuration profiles to ensure that data at rest on macOS devices is encrypted and protected. This section helps macOS administrators evaluate their FileVault deployment strategy and ensure it aligns with Zero Trust principles—particularly around data protection, compliance, and secure recovery.
This guidance applies to both new deployments and existing environments where FileVault enforcement may need to be reviewed or standardized.
Why This Matters
- Protects data at rest on macOS devices using native encryption.
- Supports Zero Trust by ensuring that only encrypted, compliant devices can access corporate resources.
- Reduces risk in the event of device loss or theft.
- Enables compliance enforcement through Intune compliance policies.
- Improves audit readiness by ensuring encryption is consistently applied and monitored.
- Supports secure recovery by allowing users to reset their local password using a personal recovery key.
Key Considerations
Enabling FileVault via Intune
- Use a device configuration profile with the Endpoint protection > FileVault settings.
- You can enforce encryption at login or defer it until the user logs in next.
- Intune supports personal recovery keys, which are unique to each device.
Recovery Key Management
- Personal recovery keys are automatically escrowed to Intune when FileVault is enabled via policy.
- Admins can view and rotate recovery keys through the Intune admin center.
- Users can retrieve their recovery key via the Company Portal, if enabled.
- Recovery keys can also be used by end users to reset their local macOS password if forgotten.
- Organizations can also deploy shell scripts to rotate the recovery key, which will then be re-escrowed to Intune automatically.
Compliance Policy Integration
- FileVault encryption status can be used as a condition in Intune compliance policies.
- Devices that are not encrypted can be marked non-compliant and blocked via Conditional Access.
Deployment Scenarios
- For corporate-owned devices, enforce FileVault at first login using ADE and Await Configuration.
- For BYOD devices, consider prompting users to enable FileVault but avoid enforcement if it risks user resistance or data loss.
Monitoring and Reporting
- Use the Intune admin center to monitor encryption status across enrolled macOS devices.
- Reports show whether FileVault is enabled and whether recovery keys are escrowed.
User Experience
- Users are prompted to enable FileVault during login if it’s not already active.
- Clear communication and support documentation can reduce confusion and improve compliance.