Jamf Protect for Mobile Evaluation Guide
  • 07 Jun 2024
  • 4 Minutes to read
  • Dark
    Light
  • PDF

Jamf Protect for Mobile Evaluation Guide

  • Dark
    Light
  • PDF

Article summary

Summary

After the discussions with your Jamf account team, they will provision access to the Jamf Protect product for purposes of evaluating the capabilities against your needs. Use the following guide to review each feature of Jamf Security Cloud.

Disclaimer

Do not test these features in your production environment. We recommend evaluating Jamf Protect in evaluation environments.

Features of Jamf Protect Content Filtering

Utilizing Secure DNS on macOS, iOS, iPadOS, Android, or Windows to explicitly allow or block your devices from accessing various types of content. This is accomplished with the content filtering policy feature.

Feature

Description

Scope

Documentation Link(s)

Pre-built Content Filtering Categories

Utilizing content filtering pre-built categories

Global Policy or Group Policy

Configuring your Block Policy

Customized Content Filtering Rules

Configure custom blocked domains into Jamf Security Cloud to allow or block across all secured devices.

Global Policy or Group Policy

Configuring your Block Policy

Define Search Engine Rules

Search rules are used to filter out explicit or mature content from Google and YouTube search results on user devices.

Global Policy or Group Policy

Configuring your Block Policy

End-user / admin Notifications

Notifying end-users of policy blocks via the end-user application and/or the customizable block pages via Jamf Security Cloud.

Global Policy or Group Policy

Block Pages

Features of Jamf Protect Content Filtering Reporting

Reporting on the events blocked by content filtering rules tested above:

Feature

Description

Documentation Link(s)

Internet Usage Reports

Utilizing in-console data usage and block reports based upon multiple searchable criteria (user, user group, site, categories, etc.)

Data Policy Reports

Exportable Usage Reports

Build customized, exportable usage reports for data usage and Jamf Security Cloud policy blocks across all devices or select devices

Exporting All or Selected Devices

Features of Jamf Protect Endpoint/Network Security

Jamf Protect's endpoint and network security service offers web threat prevention and mobile device protection to keep your devices protected against a multitude of common and uncommon threats. This protection includes vulnerability assessments, app scans, device behavior anomaly detection, and network-based security protections as described below:

Feature

Description

Scope

Documentation Link(s)

Web Prevention Policies

Defining a threat prevention policy for the customer's needs. Each threat category can be set within the leaf environments to inherit the rules from the root.

Global Policy or Group Policy

Configuring your Threat Response Policy

Set Auto-Response per category

Configuring Jamf Security Cloud to immediately block the threat at category and sub-category level.

Global Policy or Group Policy

Configuring your Threat Response Policy

Customized Severity scoring

Changing the severity score on each threat category to suite the needs of InfoSec and SecOps teams.

Global Policy or Group Policy

Severity and Risk Score

Customized User-level Alerts

Customize each threat category to alert either both or individually the end-user or admin. Also customize block pages to alert end-users of blocks in the browser with a corporate landing page.

Global Policy or Group Policy

Setting Automated Threat Responses &

Block Pages

Setup UEM Connect for Signaling

Threat policies allow for UEM Signaling for responsive measures, allowing both Jamf Security Cloud and the UEM to take action in the event of threat detection.

Global Policy or Group Policy

Configuring Signal UEM

Create Exceptions

Ability to insert exceptions to allow for certain approved applications or websites to be accessed if they are flagged via Jamf Security Cloud.

Global Policy or Group Policy

Configuring your Threat Response

Set ignored sites

Setup any website/domain to be completely ignored in reports, policies, and notifications, such as low severity threats.

Global Policy or Group Policy

Configuring your Threat Response

Upload Internal Root Certs

Upload any customer root certificates that will be approved by Jamf Security Cloud.

Global Policy

Configuring your Threat Response

External threat intel upload

Upload an external threat intel CSV file for blocking of a customized threat feed.

Global Policy or Group Policy

Custom Threat Intelligence

Set App Watchlist Category/Custom

Configure admin email notifications regarding specific app or app categories getting installed on Jamf Security Cloud enrolled devices.

Global Policy or Group Policy

App Watchlist

Block Specific App Network Traffic

Requires Supervised iOS 16 and above with ODCF enabled. Setup rule to block all traffic related to a particular app bundle.

Global Policy

App Blocking

Features of Jamf Protect Security Reporting

Reporting on the events occurring by security rules tested above:

Feature

Description

Documentation Link(s)

Threat View

Dashboard view of the entire device fleet's threats organized by risk level. Secured threats and Open threats are categorized separately.

Security Reports

Threat View Details

Selecting the "Manage Policy" option next to any threat allows admins to gain additional security insight from Jamf Threat Labs on the threat itself and remediation recommendations.

Security Reports

Device View

Dashboard view of devices currently deployed with Jamf Security Cloud organized by risk level.

Security Reports

Event Logs

SecOps can gain additional insight into any device level event within this dashboard and provide details of the threat and device at the time of attack. Additional details provided by Jamf Threat Labs can be found in Reports -> Security -> Event log.

Security Reports

Vulnerability management

View report on all Apple device vulnerabilities as assessed by the National Institute of Standards and Technology (NVD) against documented CVEs.

Vulnerability Management

App Insights

Dashboard information on the apps installed on your devices, including their versions, permissions, and the level of risk they may pose.

App Insights

Data Streams

Integrate Jamf Security Cloud with your SIEM dashboard to ingest or pull threat event data for customized reporting.

Data Streams

Risk API

Query the Jamf Security Cloud API through custom scripts.

Risk API

Shared Signal Framework (SSF)

Integrate with a third-party security vendor which Jamf Security Cloud can signal device risk level changes to.

Shared Signals Framework

After review each of these features of Jamf Protect reach back out to your Jamf account team to schedule next steps. Thank you for your time and attention to successfully securing your organization.


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.