Share via

macOS devices in Intune

Djordje Petrovic 0 Reputation points
2026-04-07T15:01:53.48+00:00

Hi all,
I am experiencing an issue with macOS devices managed via Microsoft Intune where the FileVault policy reports error code 9681.

The error message shown is: "The VPN Service payload could not be installed. The VPN service could not be created."

However, based on our validation:

  • FileVault is successfully enabled on the device (fdesetup status confirms "FileVault is On")
  • The recovery key is successfully escrowed and visible in Intune
  • There are no VPN profiles configured in Intune
  • No VPN configuration is present on the device (no VPN in Network settings, no com.apple.vpn profile)
  • Device profiles (profiles -P) show only standard Intune-related profiles (FileVault, firewall, passcode, etc.)

Despite this, the following settings in the FileVault policy report Error (9681):

  • Enable
  • Force Enable In Setup Assistant
  • Show Recovery Key
  • Use Recovery Key

Other settings in the same policy report Succeeded.


Troubleshooting steps already performed:

  • Verified FileVault status on device
  • Confirmed recovery key escrow in Intune
  • Checked for VPN configurations on device and in Intune (none found)

Request:

  • Is this a known issue or limitation with Intune/macOS reporting?
  • Why is a VPN payload error being returned for a FileVault policy?
  • Is there a recommended fix or workaround to resolve the incorrect error state?
Microsoft Security | Intune | Microsoft Intune MacOs

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-07T15:02:20.2366667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The behavior described matches a reporting/interpretation issue rather than a real FileVault/VPN configuration problem.

    From the device side and Intune encryption perspective, the scenario is healthy:

    • FileVault is enabled and active (fdesetup status = “FileVault is On”).
    • The personal recovery key is escrowed and visible in Intune.
    • Encryption reporting can show non‑success states even when the device is actually encrypted and manageable, for example:
      • “The recovery key hasn't been retrieved and stored yet. Most likely, the device hasn't been unlocked, or it hasn't checked in.”
      • “The user is deferring encryption or is currently in the process of encryption.”
      • “The device is already encrypted. Device user must decrypt the device to continue.”

    These examples illustrate that Intune’s status and error fields for macOS disk encryption are not always a direct reflection of a current, actionable problem on the device, but can represent transient or edge conditions in how the profile is applied and evaluated.

    In this case:

    • There is no VPN configuration in Intune or on the device.
    • FileVault settings are applied and working (encryption on, key escrowed, rotation supported).
    • The error text about a “VPN Service payload” is therefore best understood as a mis‑mapped or generic MDM payload error being surfaced against the FileVault profile.

    Within the provided material, there is no specific mapping for error code 9681, nor any documented dependency between FileVault and VPN payloads. The FileVault feature set and its monitoring/management are documented independently of VPN, and all functional prerequisites for FileVault management are already met in this environment.

    Given that:

    • This appears as a reporting artifact rather than a supported, documented failure mode.
    • There is no functional impact on FileVault enablement or recovery key escrow.

    The practical guidance from the available documentation is:

    1. Treat the device as compliant for encryption if:
      • FileVault is On on the device.
      • The recovery key is escrowed and retrievable via the Company Portal.
      • The encryption report shows the device as encrypted and the key available.
    2. Use the encryption report and device details as the primary source of truth for FileVault health, not the mis‑labeled payload error.
    3. If needed, verify:
      • In the encryption report, that the device is listed as encrypted and that the recovery key is present.
      • In the device’s profile state summary and status details, that there are no other actionable errors (for example, “device is already encrypted” when trying to apply a new policy).

    No specific fix or workaround is documented for remapping or suppressing this VPN‑payload error when FileVault is functioning correctly. The recommended approach, based on the available information, is to rely on the encryption status and recovery key escrow indicators as the authoritative health signals and treat the 9681/VPN text as a non‑blocking reporting anomaly.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.