Edit

Share via


Encrypt macOS devices with FileVault using Intune

Use Microsoft Intune to configure and manage FileVault disk encryption on macOS devices. FileVault is a whole-disk encryption program included with macOS that uses XTS-AES 128-bit encryption. This article covers comprehensive FileVault deployment, management, and recovery scenarios for enterprise environments.

FileVault disk encryption is available on devices running macOS 10.13 or later and provides full disk encryption to protect data on lost, stolen, or compromised devices.

Note

FileVault uses XTS-AES 128-bit encryption as implemented by Apple's macOS. This encryption standard is fixed and can't be changed to 256-bit through Intune or macOS settings. Apple considers XTS-AES 128-bit encryption sufficient for enterprise security requirements.

Tip

Intune provides a built-in encryption report that presents details about the encryption status of devices across all your managed devices. After Intune encrypts a macOS device with FileVault, you can view and manage FileVault recovery keys through the encryption report.

FileVault encryption scenarios

Intune supports multiple approaches to deployment of FileVault that can fit different organizational needs:

  • Standard FileVault encryption - User-interactive deployment with prompts and deferral options.
  • Setup Assistant enforcement - Automatic encryption during initial device setup (macOS 14+).
  • Assumption of existing encryption - Take management of user-encrypted devices.
  • Recovery key management - Comprehensive key rotation and recovery scenarios.

FileVault deployment process

After you create a policy to encrypt devices with FileVault, the policy is applied to devices in two stages:

  1. Key escrow preparation - The device is prepared to enable Intune to retrieve and back up the recovery key. This action is referred to as escrow.
  2. Disk encryption initiation - After the key is escrowed, the disk encryption can start.

When Intune first encrypts a macOS device with FileVault, a personal recovery key is created. Upon encryption, the device displays the personal key a single time to the device user.

Note

The FileVault settings available through Intune cover core macOS encryption features but do not expose every FileVault capability. Only options provided in Intune's templates or settings catalog can be configured through MDM. Advanced FileVault settings available directly in macOS might not be configurable via Intune policies.

Prerequisites

Licensing and macOS versions

FileVault encryption management requires:

  • macOS 10.13 or later for basic FileVault functionality.
  • macOS 14 or later for Setup Assistant enforcement features.
  • User-approved MDM enrollment - Users must manually approve the management profile from System Preferences.

Role-based access controls

To manage FileVault in Intune, an account must be assigned an Intune role-based access control (RBAC) role that includes the Remote tasks permission with the Rotate FileVault key right set to Yes.

You can add this permission to your own custom RBAC roles or use one of the following built-in RBAC roles:

  • Help Desk Operator
  • Endpoint Security Administrator

Apple Business Manager considerations

For Setup Assistant enforcement scenarios, ensure:

  • Devices are enrolled through Apple Business Manager or Apple School Manager.
  • Await final configuration is properly configured for automated deployment.
  • Enrollment profiles are configured for supervised device management.

Policy types for FileVault encryption

Choose from the following Intune policy types to configure FileVault encryption based on your deployment needs:

Endpoint security policy

Best for: Standard FileVault deployments with streamlined configuration.

The Endpoint security Disk encryption policy provides focused, security-specific FileVault configuration:

  • FileVault profile - Dedicated settings for configuring FileVault encryption with comprehensive recovery options.
  • Streamlined configuration focused on security requirements.
  • Integration with Intune's encryption monitoring and reporting.
  • Simplified setup for most FileVault scenarios.

Settings catalog policy

Best for: Advanced deployments requiring Setup Assistant enforcement or comprehensive configuration options.

The settings catalog provides the most comprehensive FileVault configuration options:

  • Access to all the settings that are available through Intune for FileVault
  • Setup Assistant enforcement capabilities (macOS 14+) - unique to Settings Catalog
  • Advanced configuration options that aren't available in templates
  • Granular control over user experience and security settings
  • Maximum flexibility for complex deployment scenarios

Device configuration policy (deprecated)

The Device configuration > Endpoint protection template includes FileVault as part of broader endpoint protection.

Note

The macOS template for Endpoint Protection is deprecated and no longer supports creating new profiles. Use Endpoint security or Settings Catalog for new FileVault deployments.

Create endpoint security policy

Standard FileVault deployment

  1. Sign in to the Microsoft Intune admin center.

  2. Select Endpoint security > Disk encryption > Create Policy.

  3. Set the following options:

    • Platform: macOS
    • Profile: MacOS FileVault
  4. On the Configuration settings page, configure core FileVault settings:

    Required settings:

    • for FileVault: Enable = On (to enable FileVault)
    • Use Recovery Key = Enabled

    Recovery key management:

    • Recovery Key Rotation In Months = Set rotation interval
    • Location = Enter some descriptive guidance to guide your users for key retrieval.

    User experience settings:

    • Allow deferral until sign out = Configure based on organizational needs
    • Defer Dont Ask At User Logout = Configure user interaction preferences
    • Defer Force At User Login Max Bypass Attempts = Set enforcement strictness
  5. On the Scope (Tags) page, assign appropriate scope tags for your organization's management structure.

  6. On the Assignments page, select the groups that receive this profile. Consider:

    • Device groups for company-owned devices
    • User groups for BYOD scenarios
    • Pilot groups for initial testing
  7. Select Create to deploy the policy.

Escrow location guidance

Configure helpful escrow location descriptions to guide users on how to retrieve their recovery key. This information is useful when you use the setting for Personal recovery key rotation, which can automatically generate a new recovery key for a device periodically.

Message example:

To retrieve a lost or recently rotated recovery key, sign in to the Intune Company Portal website from any device. In the portal, go to Devices and select the device that has FileVault enabled, and then select 'Get recovery key'. The current recovery key is displayed.

Additional configuration considerations:

  • Include your organization's support contact information.
  • Reference your internal IT procedures for device recovery.
  • Provide clear, simple language that nontechnical users can understand.

Create Settings Catalog policy

Settings Catalog provides the most comprehensive FileVault configuration options, including Setup Assistant enforcement.

Standard Settings Catalog deployment

  1. Sign in to the Microsoft Intune admin center.

  2. Select Devices > By platform > macOS > Manage devices > Configuration > Create > New policy.

  3. Select Settings catalog for the Profile type.

  4. On the Configuration settings page, select + Add settings and navigate to Full Disk Encryption.

    Image of the FileVault options in the Full Disk Encryption category of the Settings picker.

  5. Configure the following core FileVault settings:

    FileVault:

    • Enable = On
    • Defer = Enabled (required for successful FileVault application)

    FileVault Recovery Key Escrow:

    Advanced options (as needed): (All are found under FileVault)

    • Show Recovery Key = Configure visibility during encryption
    • Defer Don't Ask At User Logout = Control prompt timing
    • Defer Force At User Login Max Bypass Attempts = Set enforcement limits
    • Recovery Key Rotation In Months = Configure automatic rotation
  6. Complete policy assignment and deployment following standard Intune procedures.

Setup Assistant enforcement (macOS 14+)

Important

Setup Assistant enforcement requires specific enrollment and configuration prerequisites. Verify your environment meets these requirements before deployment.

Tip

macOS 14.4 adds refinements that apply to Setup Assistant. Prior to macOS 14.4, Setup Assistant requires the user account created interactively during Setup Assistant to have the role of Administrator.

For automated FileVault enablement during device setup:

Prerequisites for Setup Assistant:

  • macOS 14 or later
  • Apple Business Manager or Apple School Manager enrollment
  • Await final configuration = Yes in enrollment profile
  • Device filter using EnrollmentProfileName attribute

Additional Settings Catalog configuration: (Found under FileVault)

  • FileVault > Force Enable in Setup Assistant = Enabled

  • FileVault > Defer = Enabled

    Important

    The Defer setting must be configured to Enabled to successfully enable FileVault in Setup Assistant for devices running macOS 14.4.

    Screenshot of the settings needed to enable File Vault in Setup Assistant.

Enrollment profile configuration:

  1. Configure enrollment profile with Await final configuration = Yes.
  2. Create device filter for targeted deployment.
  3. Assign Settings Catalog policy to filtered devices.

FileVault encryption process

Understanding the FileVault encryption process helps with deployment planning and troubleshooting:

Encryption stages

FileVault deployment occurs in two distinct phases:

  1. Key escrow preparation - Intune prepares the device to backup recovery keys to Microsoft cloud services
  2. Disk encryption initiation - FileVault encryption begins after successful key escrow

User experience considerations

Standard deployment user experience:

  • Users might see FileVault enablement prompts (depending on configuration)
  • Recovery key is displayed once during encryption process
  • Users should be directed to record recovery key information
  • Encryption continues in background after initial setup

Setup Assistant user experience:

  • Encryption occurs automatically during device setup
  • No user interaction required for encryption initiation
  • Recovery key is automatically escrowed to Intune
  • Users complete setup with encrypted device

Monitor and manage FileVault

View encryption status

To view information about devices that receive FileVault policy, see Monitor disk encryption.

Monitor FileVault deployment through multiple Intune interfaces:

  1. Encryption report - Navigate to Devices > Monitor > Device Encryption status:

    • View encryption status across all managed devices
    • Access recovery key information for encrypted devices
    • Monitor policy deployment and compliance
  2. Device-specific monitoring - Select individual devices to view:

    • FileVault enablement status
    • Recovery key availability
    • Encryption policy assignment details

FileVault key escrow and management

For managed devices, Intune can escrow a copy of the personal recovery key. Escrow of keys enables Intune administrators to rotate keys to help protect devices, and users to recover a lost or rotated personal recovery key.

Intune escrows a recovery key when:

  • Intune policy encrypts a device
  • A user uploads their recovery key for a device that they manually encrypted

After Intune escrows the personal recovery key:

  • Admins can manage and rotate the FileVault recovery keys for any managed macOS device using the Intune encryption report.
  • Admins can view the personal recovery key for only managed macOS devices that are marked as Corporate. They can't view the recovery key for Personal devices.
  • Users can view and retrieve their personal recovery key from supported locations.

Recovery key management

Intune provides comprehensive recovery key management for FileVault-encrypted devices:

View recovery keys

Important

Administrator Access Restrictions: Administrators can only view and manage FileVault recovery keys for devices marked as Corporate. Recovery keys for Personal (BYOD) devices aren't accessible to administrators, ensuring user privacy. This distinction is critical for admin expectations and troubleshooting.

For administrators:

  • Access recovery keys for devices marked as Corporate only
  • Cannot view recovery keys for Personal/BYOD devices
  • Navigate to device details > Monitor > Recovery keys
  • Select Show Recovery Key (generates audit log entry)

Required permissions:

  • Intune RBAC role with Remote tasks permission
  • Rotate FileVault key right set to Yes

Recovery key access locations

End users can retrieve recovery keys from:

  • Company Portal website (portal.manage.microsoft.com) - Primary and most reliable method
  • iOS/iPadOS Company Portal app - Shows FileVault recovery key for Mac devices
  • Android Company Portal app - Shows FileVault recovery key for Mac devices
  • Intune mobile app - Shows FileVault recovery key for Mac devices

Important

The device must be enrolled with Intune and encrypted with FileVault through Intune. While recovery keys are available through mobile Company Portal apps, the Company Portal website is the primary method for reliable recovery key retrieval.

Recovery key retrieval process:

  1. Using Company Portal website (Recommended):

    • Sign in to the Company Portal website (https://portal.manage.microsoft.com/) from any device.
    • Navigate to Devices and select the macOS device that's encrypted with FileVault.
    • Select Get recovery key - The current recovery key is displayed.
  2. Using mobile Company Portal apps:

    • Open the iOS/iPadOS Company Portal app, Android Company Portal app, or Intune mobile app.
    • Navigate to Devices and select the encrypted and enrolled macOS device.
    • Select Get recovery key - The browser shows the Web Company Portal and displays the recovery key.

Recovery key rotation

Intune supports both automatic and manual recovery key rotation:

Automatic rotation

Configure automatic key rotation in FileVault policies:

  • Personal recovery key rotation = Set interval (1-12 months)
  • New keys are automatically generated and escrowed
  • Previous keys become invalid after successful rotation
  • Users must retrieve new keys through Company Portal

Manual rotation

Administrators can manually rotate recovery keys:

  1. Sign in to the Microsoft Intune admin center
  2. Select Devices > All devices
  3. Select the encrypted device
  4. Under Monitor, select Recovery keys
  5. Select Rotate FileVault recovery key

Note

Manual rotation is only available for Corporate devices. Personal devices use automatic rotation configured in policy.

Assume management of existing FileVault encryption

Intune can assume management of devices that users encrypted before receiving Intune FileVault policy. This scenario enables centralized recovery key management for previously encrypted devices.

Prerequisites for assumption of management

  • Device must receive active FileVault policy from Intune
  • User must have access to current recovery key or ability to generate new key

Both methods require an active FileVault policy deployed through Intune. Use an endpoint security disk encryption profile for policy delivery.

Method 1: Upload existing recovery key

When to use: User knows their current personal recovery key.

Process:

  1. Deploy FileVault policy to previously encrypted device.
  2. Direct user to Company Portal website (portal.manage.microsoft.com).
  3. User selects encrypted device and chooses Store recovery key.
  4. User enters current personal recovery key.
  5. Intune validates key and rotates to new recovery key.
  6. New key is escrowed and available through Company Portal.

User communication:
Inform users that they must upload their recovery key to enable Intune management. Consider compliance policy enforcement to ensure completion.

Method 2: Generate new recovery key on device

When to use: User doesn't know current recovery key but has device access.

Process:

  1. Deploy FileVault policy to previously encrypted device.
  2. User opens Terminal app on encrypted device.
  3. Execute key rotation commands:
    cd /Applications/Utilities
    sudo fdesetup changerecovery -personal
    
  4. User provides device password when prompted.
  5. System generates and displays new recovery key.
  6. Device checks in with Intune and management is assumed.

Expedite device check-in:

  • Admin: Devices > Select device > Sync
  • User: Company Portal app > Settings > Sync

Verification of management assumption

After either method, verify successful management assumption:

  1. Check device encryption status in Intune encryption report.
  2. Confirm recovery key availability in device details.
  3. Test recovery key retrieval through Company Portal.

Troubleshooting FileVault deployment

Common deployment issues

Issue Solution Verification
FileVault enablement fails Verify user-approved MDM enrollment status Check System Preferences > Profiles
Recovery key escrow fails Ensure device network connectivity Check encryption report for escrow status
Setup Assistant enforcement not working (macOS 14+) Verify Defer setting is Enabled in Settings Catalog Check enrollment profile for Await final configuration
Users can't retrieve recovery keys Check device ownership type and user permissions Verify Corporate device designation in Intune
Administrator can't access recovery keys Device marked as Personal/BYOD (expected behavior) Verify device ownership type - Personal devices protect user privacy

Error code reference

Error -2016341107 / 0x87d1138d: User hasn't accepted FileVault enablement prompt.

  • Resolution: User education on accepting FileVault prompts.
  • Prevention: Consider Setup Assistant enforcement for automated deployment.

Policy conflict resolution

Use Intune's policy conflict detection to identify:

  • Overlapping FileVault policies
  • Conflicting endpoint protection settings
  • Compliance policy interactions

Security considerations

Recovery key security

Key protection:

  • Recovery keys are encrypted in transit and at rest
  • Keys are stored securely in Microsoft cloud services
  • Access is controlled through Intune RBAC permissions

Audit logging:

  • All recovery key access is logged in Microsoft Entra audit logs
  • Logs include user identity, timestamp, and key ID
  • Review logs regularly for unauthorized access attempts

Corporate vs Personal devices

Note

The device ownership type (Corporate vs Personal) determines administrator access to FileVault recovery keys. This is a fundamental security and privacy design.

Corporate devices:

  • Full administrative access: Administrators can view, rotate, and manage recovery keys
  • Complete recovery key management capabilities through Intune admin center
  • Suitable for company-owned equipment where full IT control is expected
  • Audit logging tracks all administrative recovery key access

Personal devices (BYOD):

  • No administrative access: Administrators can't view or directly manage recovery keys
  • Users maintain complete control through self-service Company Portal access
  • Balances organizational security needs with employee privacy requirements
  • Keys are still escrowed to Microsoft cloud for user self-service recovery
  • Automatic rotation still functions based on policy configuration

Compliance integration

FileVault encryption integrates with Intune compliance policies:

  • Set Require encryption of data storage in compliance policy
  • Block access to corporate resources until encryption is enabled
  • Monitor compliance through device compliance reports

Next steps