{"id":75263,"date":"2023-05-17T11:46:27","date_gmt":"2023-05-17T15:46:27","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75263"},"modified":"2023-06-05T13:11:04","modified_gmt":"2023-06-05T17:11:04","slug":"create-a-mac-filevault-2-policy","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/create-a-mac-filevault-2-policy","title":{"rendered":"Create a Mac FileVault 2 Policy"},"content":{"rendered":"\n

You can use this policy to remotely enforce FileVault on macOS devices and easily view Recovery Keys. FileVault full-disk encryption (FileVault 2) helps prevent unauthorized access to the information on your user’s startup disks. FileVault 2 uses XTS-AES-128 encryption with a 256-bit key.<\/p>\n\n\n\n

After you enforce a FileVault policy, your users need a secure token to enable it. The advent of Apple File Systems (APFS) in macOS 10.13 changed the way Apple manages FileVault encryption keys. To secure and provide access to encryption keys required for FileVault decryption, Apple introduced Secure Tokens. Ensure your users have Secure Tokens by following the instructions in Install and Use the Service Account for macOS<\/a>. You can also watch a video tutorial on FileVault Management<\/a>.<\/p>\n\n\n\n

Prerequisites<\/strong><\/p>\n\n\n\n