After verifying that I hadn’t somehow enabled Focus or done something else to stop Notification Center notifications from appearing, I did some research which uncovered the solution. For more details, please see below the jump.
As part of the Notifications preferences in the Settings app, there is the following option:
Allow notifications when mirroring or sharing the display
This setting also apparently includes making screen recordings, because enabling it allowed Notification Center notifications to appear during screen recordings. To enable this setting, please use the following procedure:
1. Open Settings
2. Go to Notifications.
3. Enable the Allow notifications when mirroring or sharing the display setting.
You should now see notifications appearing while mirroring, sharing the display, or when making screen recordings.
]]>
As of macOS 15.3, management options are available for the following Apple Intelligence functionality:
The relevant key values are below:
Restriction | Setting available in version | Description | Key | Key value | Default setting in macOS | |
---|---|---|---|---|---|---|
Allow Image Playground | macOS 15.0.0 | If key value is set to FALSE, prohibits the use of image generation. | allowImagePlayground | Boolean | TRUE | |
Allow Writing Tools | macOS 15.0.0 | If key value is set to FALSE, allows only anonymous access to external services | allowWritingTools | Boolean | TRUE | |
Allow Genmoji | macOS 15.0.0 | If key value is set to FALSE, disables Genmoji | allowGenmoji | Boolean | TRUE | |
Allow Mail Summary | macOS 15.1.0 | If key value is set to FALSE, prohibits the ability to create email summaries | allowMailSummary | Boolean | TRUE | |
Allow External Intelligence Integrations | macOS 15.2.0 | If key value is set to FALSE, prohibits integrations with external services including ChatGPT and Google Gemini | allowExternalIntelligenceIntegrations | Boolean | TRUE | |
Allow External Intelligence Sign-Ins | macOS 15.2.0 | If key value is set to FALSE, prohibits the ability to create email summaries | allowExternalIntelligenceIntegrationsSignIn | Boolean | TRUE | |
Allow External Intelligence Workspace IDs | macOS 15.3.0 | If key value is set to the correct workspace ID string, Apple Intelligence will only allow the given external integration workspace ID to be used and will require a sign-in in order to make requests | allowedExternalIntelligenceWorkspaceIDs | String | None | |
Allow Notes Transcription Summary | macOS 15.3.0 | If key value is set to FALSE, disables transcription summarization in Notes. | allowNotesTranscriptionSummary | Boolean | TRUE |
It’s important to note that while all of the settings listed above work on macOS Sequoia 15.3, not all work on earlier versions of macOS Sequoia. Here’s the compatibility list:
macOS 15.0 and later:
macOS 15.1 and later:
macOS 15.2 and later:
macOS 15.3 and later:
Most of these settings can be managed by a configuration profile, where setting a boolean value of false will disable the Apple Intelligence feature in question. The one exception at this point is the one for managing workspace IDs for allowed external intelligence integrations, which uses a string value. An example profile which allows one workspace ID is available below:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowedExternalIntelligenceWorkspaceIDs</key> | |
<array> | |
<string>workspace_id_goes_here</string> | |
</array> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Alows External Intelligence Integrations using specific Workspace ID</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Allow External Intelligence Workspace ID</string> | |
<key>PayloadIdentifier</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
If you need to allow the use of multiple workspace IDs, an example profile which allows multiple workspace IDs is available below:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowedExternalIntelligenceWorkspaceIDs</key> | |
<array> | |
<string>first_workspace_id_goes_here</string> | |
<string>second_workspace_id_goes_here</string> | |
<string>third_workspace_id_goes_here</string> | |
</array> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Alows External Intelligence Integrations using specific Workspace ID</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Allow External Intelligence Workspace ID</string> | |
<key>PayloadIdentifier</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Please see below for example profiles. The example profiles are also available via the following links:
Note: If you’re planning to use the example profiles with Jamf Pro, it will need to be signed before it can be uploaded to Jamf Pro. If you’re not familiar with how to sign profiles, the post linked below is a good guide to how that process works:
https://macblog.org/sign-configuration-profiles/
Genmoji:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.1281701E-9695-4447-9028-4962C25162FF</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>1281701E-9695-4447-9028-4962C25162FF</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowGenmoji</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables creation of new Genmoji</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Genmoji</string> | |
<key>PayloadIdentifier</key> | |
<string>B83678F5-B2CB-467C-A89F-73F2E2E1346C</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>B83678F5-B2CB-467C-A89F-73F2E2E1346C</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Image Playground:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.4FDE23F1-2652-4653-813C-205C9B86C0F5</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>4FDE23F1-2652-4653-813C-205C9B86C0F5</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowImagePlayground</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Image Playground and prohibits the use of image generation</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Image Playground</string> | |
<key>PayloadIdentifier</key> | |
<string>5596EE02-5B47-4B4C-B3F0-AA531C1E9AEB</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>5596EE02-5B47-4B4C-B3F0-AA531C1E9AEB</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Writing Tools:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.2C74FDD6-E3CD-4E3B-9193-CD4818452895</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>2C74FDD6-E3CD-4E3B-9193-CD4818452895</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowWritingTools</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Apple Intelligence writing tools</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Writing Tools</string> | |
<key>PayloadIdentifier</key> | |
<string>FDDB4857-545D-4538-9C0B-B8ED78FFCE3E</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>FDDB4857-545D-4538-9C0B-B8ED78FFCE3E</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Summarize emails:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.6DD01B26-8368-45FE-A4F7-35F4CD153E5D</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>6DD01B26-8368-45FE-A4F7-35F4CD153E5D</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowMailSummary</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Mail Summary and prohibits the ability to create email summaries</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Mail Summary</string> | |
<key>PayloadIdentifier</key> | |
<string>45B76C44-A61D-4A1B-82B9-6118B18DB129</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>45B76C44-A61D-4A1B-82B9-6118B18DB129</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Block Siri from connecting to third party cloud-based intelligence services:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.69140388-BF31-4C0E-A791-F8EFDCB54C49</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>69140388-BF31-4C0E-A791-F8EFDCB54C49</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowExternalIntelligenceIntegrations</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables External Intelligence Integrations and prohibits integrations with external services including ChatGPT and Google Gemini</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable External Intelligence Integrations</string> | |
<key>PayloadIdentifier</key> | |
<string>2B3EE9B6-249E-44DD-B9A6-1E71F72A7E34</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>2B3EE9B6-249E-44DD-B9A6-1E71F72A7E34</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Disable non-anonymous login to third party cloud-based intelligence services:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.EB34F905-0ED5-4E29-9A4A-5AE77F4D6652</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>EB34F905-0ED5-4E29-9A4A-5AE77F4D6652</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowExternalIntelligenceIntegrationsSignIn</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables External Intelligence Sign-in and allows only anonymous access to external services</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable External Intelligence Logins</string> | |
<key>PayloadIdentifier</key> | |
<string>995CBF19-0AE8-4098-93A3-A87812366961</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>995CBF19-0AE8-4098-93A3-A87812366961</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Allow external intelligence workspace IDs:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>CF921560-2717-4986-8885-4FC8002C6BF7</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowedExternalIntelligenceWorkspaceIDs</key> | |
<array> | |
<string>workspace_id_goes_here</string> | |
</array> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Alows External Intelligence Integrations using specific Workspace ID</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Allow External Intelligence Workspace ID</string> | |
<key>PayloadIdentifier</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>14A04D12-F054-4E11-8943-D55DA53A61E9</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Notes transcription summaries:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.50642C07-6992-47E0-A0BB-A777068878B4</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>50642C07-6992-47E0-A0BB-A777068878B4</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowNotesTranscriptionSummary</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Apple Intelligence transcription summary for Notes</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Notes Transcription Summary</string> | |
<key>PayloadIdentifier</key> | |
<string>0FDA9EBB-31CF-40DD-84CF-1EF76B8992CF</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>0FDA9EBB-31CF-40DD-84CF-1EF76B8992CF</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
However, the password is not the only option you’re setting when creating a Jamf Pro standard user. Assuming that this is an account not tied to a specific person (as would be the case for a service account or an emergency use admin account), you can set to the username to a long randomized string. This can help secure the account because an attacker needs both the username and password for an account in order to authenticate and the long randomized string should make it more difficult for an attacker to guess the username. For more details, please see below the jump.
The Jamf Pro standard user’s username field can support up to 255 characters. The username field itself supports using lowercase letters and numbers when creating usernames. Within this 255 character limit, you can set a very long randomized string as the username.
Note: The Jamf Pro standard user’s username field should be able to support more than lowercase letters and numbers, but in my experience usernames are normally set using lowercase letters and numbers, like this:
localadmin121
Usernames are usually not set using the following:
When folks historically don’t do something, it also usually means that there hasn’t been a lot of testing of those conditions. In turn, that may mean there’s yet-undiscovered problems which can crop up.
For this reason, I’m going to stick with only using lowercase letters and numbers in the examples used in this blog post. It’s possible the use of uppercase letters and special characters is just fine and setting a username like LOLRICHISWRONG!@()_ works without problems, but I’ll leave further experimentation on this topic to my readers and for this post stick with a format which I see the least problems with: lowercase letters and numbers.
To leave some room in the character limit, let’s generate a username which is 250 characters long which is a randomized string of lowercase letters and numbers. You can do this using the following command:
export LC_CTYPE=C.UTF-8; tr -dc 'a-z0-9' </dev/urandom | head -c 250 |
Note: The export LC_CTYPE=C.UTF-8 part of the command is there because the tr command will otherwise return tr: Illegal byte sequence on macOS when working with /dev/urandom‘s output:
https://andres.jaimes.net/linux/random-string/
That command should return a 250 character string like the one shown below:
hvr91onhenfmk3jalcc2zopih2l7kqx3gx0i0dgb2cf8jdrm6kkvgo6h0z0039o0p5urvbccxsjhrn065n1k6ju7lo9m13isrtkgg1b1jp4519f7405last3gcxrdf0406725kbtfhxh2iln8loxtbu3iixqq6jn41i43tr76rrj556bg4a25jtg1818m0ugoxo0xns5wg7iutmwitkv4edyh14gborjjr16orn3tfdeeawx6uqx3dov4o |
username@computername ~ % export LC_CTYPE=C.UTF-8; tr -dc 'a-z0-9' </dev/urandom | head -c 250 | |
hvr91onhenfmk3jalcc2zopih2l7kqx3gx0i0dgb2cf8jdrm6kkvgo6h0z0039o0p5urvbccxsjhrn065n1k6ju7lo9m13isrtkgg1b1jp4519f7405last3gcxrdf0406725kbtfhxh2iln8loxtbu3iixqq6jn41i43tr76rrj556bg4a25jtg1818m0ugoxo0xns5wg7iutmwitkv4edyh14gborjjr16orn3tfdeeawx6uqx3dov4o | |
username@computername ~ % |
You can then use that string when creating a Jamf Pro standard user.
For those who find this behavior undesirable and wish to turn it off, it can be disabled using the following process:
1. Launch Mail
2. Under the Mail menu, select Settings.
3. In the Settings window, select the Composing option.
4. Uncheck the Add link previews option.
With this option disabled, here’s how it looks when I paste the following URL into a new email:
I have not found a way to disable the Add link previews option in Apple’s Mail app on macOS Sequoia using a defaults command, but it is possible to disable the Add link previews option using a configuration profile. For more details, please see below the jump.
The relevant preference domain and key values are below:
Setting a boolean value of false will disable the Add link previews option in Apple’s Mail app on macOS Sequoia. I’ve built a configuration profile with the boolean value of false set, where the profile is available on GitHub via the link below:
https://github.com/rtrouton/profiles/tree/main/AppleMailDisableLinkPreviews
]]>I have not found a way to suppress this screen using a defaults command, but it is possible to suppress the Welcome to Mac screen on macOS Sequoia using a configuration profile. For more details, please see below the jump.
The relevant preference domain and key values are below:
The profile is available on GitHub via the link below:
https://github.com/rtrouton/profiles/blob/main/SkipWelcomeToMacSetup
]]>
To start, send an MDM command to the device in question. If your MDM server says it sent successfully, see what shows up on the Mac’s end using the following command:
/usr/bin/log show –predicate 'process=="mdmclient" OR subsystem=="com.apple.ManagedClient"' –info –last 10m |
This will likely give you a large number of log entries, but it’s possible to filter for what you’re looking for. For example, a blank push remote command sent from a Jamf Pro MDM server will include a log entry that looks similar to this:
2024-12-21 13:04:21.263154-0500 0x4d0d Default 0x0 1738 7 mdmclient: [com.apple.ManagedClient:MDMDaemon] [*] [0:MDMDaemon:<0x4d0d>] Processing server request: DeclarativeManagement for: <Device> (3fb48527-9aaa-492d-94fc-efd999d812a3) PowerNap: no |
Since we can see from the log entry that the relevant process is mdmclient and the string to search for includes “Processing server request: DeclarativeManagement for“, then if you know you sent a blank push within the last ten minutes you can use the following command to see if the entry appears in the returned logs:
/usr/bin/log show –info –predicate 'process=="mdmclient" AND eventMessage contains "Processing server request: DeclarativeManagement for"' –last 10m |
That should pull up the relevant log entry:
username@computername ~ % /usr/bin/log show –info –predicate 'process=="mdmclient" AND eventMessage contains "Processing server request: DeclarativeManagement for"' –last 10m | |
Filtering the log data using "process == "mdmclient" AND composedMessage CONTAINS "Processing server request: DeclarativeManagement for"" | |
Skipping debug messages, pass –debug to include. | |
Timestamp Thread Type Activity PID TTL | |
2024-12-21 14:18:44.084210-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:MDMDaemon] [*] [0:MDMDaemon:<0xb9d7>] Processing server request: DeclarativeManagement for: <Device> (a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32) PowerNap: no | |
——————————————————————————————————————– | |
Log – Default: 1, Info: 0, Debug: 0, Error: 0, Fault: 0 | |
Activity – Create: 0, Transition: 0, Actions: 0 | |
username@computername ~ % |
From there, we can see the UUID identifier of the MDM command. In this example, the UUID is the following:
a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32 |
We can then use that to figure out from the Mac’s side if the MDM command was successful by running the following command:
/usr/bin/log show –predicate 'process=="mdmclient" AND eventMessage contains "a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32"' –info –last 10m |
From there, we should see output that looks similar to what’s shown below:
username@computername ~ % /usr/bin/log show –predicate 'process=="mdmclient" AND eventMessage contains "a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32"' –info –last 10m | |
Filtering the log data using "process == "mdmclient" AND composedMessage CONTAINS "a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32"" | |
Skipping debug messages, pass –debug to include. | |
Timestamp Thread Type Activity PID TTL | |
2024-12-21 14:18:44.084210-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:MDMDaemon] [*] [0:MDMDaemon:<0xb9d7>] Processing server request: DeclarativeManagement for: <Device> (a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32) PowerNap: no | |
2024-12-21 14:18:44.256439-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:HTTPUtil] [*] [0:MDMDaemon:HTTPUtil:<0xb9d7>] >>>>> Sending HTTP request (PUT) [Acknowledged(DeclarativeManagement):a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32] >>>>> | |
2024-12-21 14:18:44.383839-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:HTTPUtil] [*] [0:MDMDaemon:HTTPUtil:<0xb9d7>] <<<<< Received HTTP response (200) [Acknowledged(DeclarativeManagement):a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32] <<<<< | |
——————————————————————————————————————– | |
Log – Default: 3, Info: 0, Debug: 0, Error: 0, Fault: 0 | |
Activity – Create: 0, Transition: 0, Actions: 0 | |
username@computername ~ % |
If the blank push command was successful, we should see three log entries like the ones that showed up in the output above:
2024-12-21 14:18:44.084210-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:MDMDaemon] [*] [0:MDMDaemon:<0xb9d7>] Processing server request: DeclarativeManagement for: <Device> (a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32) PowerNap: no | |
2024-12-21 14:18:44.256439-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:HTTPUtil] [*] [0:MDMDaemon:HTTPUtil:<0xb9d7>] >>>>> Sending HTTP request (PUT) [Acknowledged(DeclarativeManagement):a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32] >>>>> | |
2024-12-21 14:18:44.383839-0500 0xb9d7 Default 0x0 2867 7 mdmclient: [com.apple.ManagedClient:HTTPUtil] [*] [0:MDMDaemon:HTTPUtil:<0xb9d7>] <<<<< Received HTTP response (200) [Acknowledged(DeclarativeManagement):a3a16dd4-ba49-4d3e-bd67-39c48dc2fc32] <<<<< |
Different MDM commands will have different output, but if you’re using Jamf Pro and need to figure out if a particular Mac is receiving MDM commands successfully, the process described above should assist with this. If you want to stream the logs in real time, so that you can check the logs as you’re sending a blank push command, you can use the following:
/usr/bin/log stream –info –debug –predicate 'process=="mdmclient" AND eventMessage contains "Processing server request: DeclarativeManagement for"' |
That should provide output similar to what’s shown below when you send a blank push:
username@computername ~ % /usr/bin/log stream –info –debug –predicate 'process=="mdmclient" AND eventMessage contains "Processing server request: DeclarativeManagement for"' | |
Filtering the log data using "process == "mdmclient" AND composedMessage CONTAINS "Processing server request: DeclarativeManagement for"" | |
Timestamp Thread Type Activity PID TTL | |
2024-12-21 14:36:11.577917-0500 0xdad8 Default 0x0 3139 7 mdmclient: [com.apple.ManagedClient:MDMDaemon] [*] [0:MDMDaemon:<0xdad8>] Processing server request: DeclarativeManagement for: <Device> (fe514cb5-cee6-44c5-88a2-e9247c89f1ba) PowerNap: no |
Hat tip to Bryson and his teammates for figuring out most of this and sharing it with me.
]]>https://jamf.pro.server.here/api
When choosing to view the Classic API or Jamf Pro API documentation, there’s an option to log in and authenticate, so that you can run API commands interactively to see how running the commands works in real time and what results you see. This functionality is also useful when setting up API accounts with least privileged access, as it allows testing to verify that all necessary privileges have been assigned to the accounts.
Up until now, this authentication mechanism only supported using username and password authentication but as of Jamf Pro 11.2.0, the authentication mechanism now supports both of the following authentication methods:
To use your preferred authentication method, please select it from the relevant drop-down menu.
“I installed this profile for macOS NewVersion onto macOS OldVersion, then upgraded from macOS OldVersion to macOS NewVersion. The setting didn’t work. Why didn’t it work?”
Why it didn’t work has to do with how management profile settings are handled. When a management profile is installed, the settings contained within that profile are applied.
This settings application occurs exclusively at the time of the profile installation. Those applied settings are never again re-read or re-applied as long as that profile is installed. The settings in a profile are applied only at the time of installation and that is the current state of things.
How is this relevant to settings you want to apply to macOS? Apple defines what OS version a setting was introduced for, which means it does not work for OS versions prior to that. For more information, please see below the jump.
An example of this is the management setting for iPhone mirroring:
This setting was introduced for macOS as of macOS 15 Sequoia. That means that the setting works on macOS Sequoia but what happens when you install a management profile like the one below which contains this setting onto a Mac running macOS 14 Sonoma?
Nothing.
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.DD8454BB-A1D6-4DD9-B1AC-C1B6ABA512E9</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>DD8454BB-A1D6-4DD9-B1AC-C1B6ABA512E9</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowiPhoneMirroring</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Blocks the use of iPhone mirroring</string> | |
<key>PayloadDisplayName</key> | |
<string>Block iPhone Mirroring</string> | |
<key>PayloadIdentifier</key> | |
<string>D0B2E096-2C7F-4F2F-A1C0-FFE16919768B</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>D0B2E096-2C7F-4F2F-A1C0-FFE16919768B</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
A profile’s settings get applied at the time of installation. If the setting isn’t understood by the OS the profile is installed onto at the time of installation, the setting is ignored.
In the context of the management setting for iPhone mirroring, macOS Sonoma doesn’t have the management option for managing iPhone mirroring so Sonoma will ignore the setting. It will remain ignored if the Mac gets upgraded to Sequoia because the setting only gets applied at the time of installation and the setting never gets re-evaluated to see if it applies to Sequoia. The outcome is that the setting does not get applied on Sequoia if the profile with the setting was installed on Sonoma.
How do you fix this? Remove the profile with the iPhone mirroring setting from the Sequoia Mac and re-install the profile. Once the profile is installed again, the setting will get applied as part of the install process. Sequoia has that setting as a management option, so Sequoia will then apply the setting from the profile and manage iPhone mirroring as defined by the profile’s settings.
So what does this mean for management settings you want to apply to macOS NewVersion? You’ll need to check what the introduction version is for the setting you want to apply. If it’s a brand new setting where the introduction is on macOS NewVersion, you’ll need to wait until the Mac is running macOS NewVersion before deploying a profile to manage that setting.
For Mac admins who want the capability to install a setting on macOS OldVersion and have it apply to macOS NewVersion, I recommend filing feedback with Apple to request it .
]]>The Apple Intelligence pop-up window can be suppressed for the logged-in user by running the command shown below:
/usr/bin/defaults write com.apple.SetupAssistant DidSeeIntelligence -bool true |
It is also possible to suppress the Apple Intelligence pop up window on macOS Sequoia using a configuration profile. For more details, please see below the jump.
The relevant preference domain and key values are below:
The profile is available on GitHub via the link below:
https://github.com/rtrouton/profiles/blob/main/SkipAppleIntelligenceSetup
]]>
As of macOS 15.2, management options are available for the following Apple Intelligence functionality:
The relevant key values are below:
Restriction | Setting available in version | Description | Key | Key value | Default setting in macOS | |
---|---|---|---|---|---|---|
Allow Image Playground | macOS 15.0.0 | If key vaule is set to FALSE, prohibits the use of image generation. | allowImagePlayground | Boolean | TRUE | |
Allow Writing Tools | macOS 15.0.0 | If key vaule is set to FALSE, allows only anonymous access to external services | allowWritingTools | Boolean | TRUE | |
Allow Genmoji | macOS 15.0.0 | If key vaule is set to FALSE, disables Genmoji | allowGenmoji | Boolean | TRUE | |
Allow Mail Summary | macOS 15.1.0 | If key vaule is set to FALSE, prohibits the ability to create email summaries | allowMailSummary | Boolean | TRUE | |
Allow External Intelligence Integrations | macOS 15.2.0 | If key vaule is set to FALSE, prohibits integrations with external services including ChatGPT and Google Gemini | allowExternalIntelligenceIntegrations | Boolean | TRUE | |
Allow External Intelligence Sign-Ins | macOS 15.2.0 | If key vaule is set to FALSE, disables non-anonymous login to external services including ChatGPT and Google Gemini | allowExternalIntelligenceIntegrationsSignIn | Boolean | TRUE |
It’s important to note that while all of the settings listed above work on macOS Sequoia 15.2, not all work on earlier versions of macOS Sequoia. Here’s the compatibility list:
macOS 15.0 and later:
macOS 15.1 and later:
macOS 15.2 and later:
These settings can be managed by a configuration profile, where setting a boolean value of false will disable the Apple Intelligence feature in question. Please see below for example profiles. The example profiles are also available via the following links:
Note: If you’re planning to use the example profiles with Jamf Pro, the profiles will need to be signed before they can be uploaded to Jamf Pro. If you’re not familiar with how to sign profiles, the post linked below is a good guide to how that process works:
https://macblog.org/sign-configuration-profiles/
Genmoji:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.1281701E-9695-4447-9028-4962C25162FF</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>1281701E-9695-4447-9028-4962C25162FF</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowGenmoji</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables creation of new Genmoji</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Genmoji</string> | |
<key>PayloadIdentifier</key> | |
<string>B83678F5-B2CB-467C-A89F-73F2E2E1346C</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>B83678F5-B2CB-467C-A89F-73F2E2E1346C</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Image Playground:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.4FDE23F1-2652-4653-813C-205C9B86C0F5</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>4FDE23F1-2652-4653-813C-205C9B86C0F5</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowImagePlayground</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Image Playground and prohibits the use of image generation</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Image Playground</string> | |
<key>PayloadIdentifier</key> | |
<string>5596EE02-5B47-4B4C-B3F0-AA531C1E9AEB</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>5596EE02-5B47-4B4C-B3F0-AA531C1E9AEB</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Writing Tools:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.2C74FDD6-E3CD-4E3B-9193-CD4818452895</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>2C74FDD6-E3CD-4E3B-9193-CD4818452895</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowWritingTools</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Apple Intelligence writing tools</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Writing Tools</string> | |
<key>PayloadIdentifier</key> | |
<string>FDDB4857-545D-4538-9C0B-B8ED78FFCE3E</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>FDDB4857-545D-4538-9C0B-B8ED78FFCE3E</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Summarize emails:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.6DD01B26-8368-45FE-A4F7-35F4CD153E5D</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>6DD01B26-8368-45FE-A4F7-35F4CD153E5D</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowMailSummary</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables Mail Summary and prohibits the ability to create email summaries</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable Mail Summary</string> | |
<key>PayloadIdentifier</key> | |
<string>45B76C44-A61D-4A1B-82B9-6118B18DB129</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>45B76C44-A61D-4A1B-82B9-6118B18DB129</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Block Siri from connecting to third party cloud-based intelligence services:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.69140388-BF31-4C0E-A791-F8EFDCB54C49</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>69140388-BF31-4C0E-A791-F8EFDCB54C49</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowExternalIntelligenceIntegrations</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables External Intelligence Integrations and prohibits integrations with external services including ChatGPT and Google Gemini</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable External Intelligence Integrations</string> | |
<key>PayloadIdentifier</key> | |
<string>2B3EE9B6-249E-44DD-B9A6-1E71F72A7E34</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>2B3EE9B6-249E-44DD-B9A6-1E71F72A7E34</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |
Disable non-anonymous login to third party cloud-based intelligence services:
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadDisplayName</key> | |
<string>Restrictions</string> | |
<key>PayloadIdentifier</key> | |
<string>com.apple.applicationaccess.EB34F905-0ED5-4E29-9A4A-5AE77F4D6652</string> | |
<key>PayloadType</key> | |
<string>com.apple.applicationaccess</string> | |
<key>PayloadUUID</key> | |
<string>EB34F905-0ED5-4E29-9A4A-5AE77F4D6652</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
<key>allowExternalIntelligenceIntegrationsSignIn</key> | |
<false/> | |
</dict> | |
</array> | |
<key>PayloadDescription</key> | |
<string>Disables External Intelligence Sign-in and allows only anonymous access to external services</string> | |
<key>PayloadDisplayName</key> | |
<string>Apple Intelligence Disable External Intelligence Logins</string> | |
<key>PayloadIdentifier</key> | |
<string>995CBF19-0AE8-4098-93A3-A87812366961</string> | |
<key>PayloadOrganization</key> | |
<string>Company Name</string> | |
<key>PayloadScope</key> | |
<string>System</string> | |
<key>PayloadType</key> | |
<string>Configuration</string> | |
<key>PayloadUUID</key> | |
<string>995CBF19-0AE8-4098-93A3-A87812366961</string> | |
<key>PayloadVersion</key> | |
<integer>1</integer> | |
</dict> | |
</plist> |