Results (77)
Resources: Terraform, GitHub, and Jamf Configurations
v1
English
A crash course guide for Mac admins looking to move from manual configuration ("ClickOps") to automated, version-controlled infrastructure management using Terraform and GitOps workflows. Part 1: Understanding the Fundamentals Before diving into Jamf-specific implementations, it's essential to
Jamf Pro API Connector for Okta Workflows
v1
English
Mobile Device Inventories Return paginated results of all mobile devices inventory data. List Volume Purchasing Locations Return information on VPP locations, including token expiration date. Read Computer Compliance Status Return basic compliance information for the given computer device. Read Computer
Tailored Event Monitoring on macOS
v1
English
related signing information as well. We could use this data in a SIEM, saving us from creating a custom analytic and preserving system performance. As a security analyst , I want to monitor tamper events related to the Jamf Pro management
Enforcing Compliance Baselines for Network Access
v1
English
Cloud which will immediately sync the endpoint to the related device groups Login to Jamf Pro instance that’s going to be used for this workflow Navigate to Settings from the navigation menu Navigate to Webhooks On the top
Platform SSO for macOS
v1
English
ongoing workflows like Privilege Elevation after computers are deployed. Jamf Connect and Platform SSO applications both both have a number of optional and customizable options, some of which could overlap and cause conflicts. When testing options for transitioning or
Implement ZTNA Risk Signaling
v1
English
🛡️Jamf Security Integration Protect | Pro | Connect This article outlines how to automatically protect organizational data from out-of-compliance or risky macOS devices using the Jamf platform.  Specifically, you will see how an on-device threat detected by Jamf
Stryker MDM Cyberattack: Lessons for the Jamf Ecosystem
v1
English
alerting. Per-device wipe workflow : Unlike Intune's ability to bulk-wipe from a single action, Jamf Pro's wipe command is issued per-device from the individual device record's Management tab. There is no "select all and wipe
Detecting, Blocking & Remediating OpenClaw using Jamf
v1
English
either manually, or via a Smart Group which bases its membership on one of the detection mechanisms listed above. Note The openclaw_removal.sh script has been created and provided to give a best effort in removing the most common
Managing Jamf Protect with Terraform: The Jamf Protect Provider
v1
English
exception set to exclude known IT administration tools from threat prevention: resource "jamfprotect_exception_set" "it_admin_tools" { name = "IT Admin Tools" description = "Exceptions for trusted IT administration software." exceptions = [ { type = "Override Endpoint Threat Prevention" sub_type = "Process" rules = [ { rule
Getting Started with Jamf Protect for Mobile
v1
English
This Getting Started guide serves as a playbook for the Network Threat Defense and Content Filtering services provided by Jamf Protect. Jamf Protect is offered both as an enterprise-grade macOS Endpoint Protection Platform as well as a mobile-first
Securing LLM Access with Trusted Egress IPs
v1
English
Securing LLM Access with Trusted Egress IPs Access to most hosted LLM endpoints is protected by a shared API key coded into client configurations. API keys are straightforward to deploy but easy to share, leak, or exfiltrate — and with LLM
Managing Jamf Configuration with Terraform: An Introduction
v1
English
Legacy “Click-Ops” approaches to dealing with modern SaaS apps and Enterprise services are fast becoming legacy approaches for many organizations. Teams concerned with future proofing and codifying their setups have started to look to GitOps friendly approaches to managing
SIEM & XDR Integration
v1
English
Many mid-to-large organizations utilize a SIEM and/or XDR in order to correlate digital events and activity generated across as many endpoints as possible. The more data, the better the chance of being able to identify patterns that
Implementing Behavioral Baselines in Security Monitoring
v1
English
not common in regular usage. Contextual Awareness : Consider the context in which osascript is being used. For instance, an osascript command that is triggered shortly after an application download might warrant closer inspection. Alert Configuration : Set up alerts for patterns
Aftermath Incident Response for macOS
v1
English
Incident Response on macOS As the Mac footprint grows across organizations of all sizes, attackers are increasingly focusing their efforts on exploiting macOS. For endpoint security, InfoSec teams look to Jamf for device configuration, threat detection & prevention, and telemetry data
Automated Network Isolation
v1
English
Group which is the Smart Computer Group we created in Jamf Pro earlier to the group in Jamf Security Cloud we created in step 2 Drag and Drop the group mapping to the top It is important to give
Defining Security Policy
v1
English
Defining a security policy for your organization is a foundational configuration step to deploy Trusted Access. A security policy defines the types of threats your organization considers risky, and defines a risk level for each. Jamf Protect for Mobile Devices
Deep Packet Inspection
v1
English
Alongside OS and App DLP controls , many organizations wish to implement additional inspection of network traffic to ensure compliance policies are not being circumvented. With Deep Packet Inpection (DPI), IT administrators are able to implement policies that filter traffic based
Establishing Compliance Baselines with Compliance Editor
v1
English
Regulated industries and government agencies that handle sensitive or classified data are required by their InfoSec teams to harden and secure endpoints as much as possible. Other organizations may not need the highest security possible, but may still want to
Configuring Simplified Setup for Platform SSO using Jamf Pro and Okta
v1
English
Dynamic-Microsoft CA URL to SCEP Admin: Enter the Challenge URL provided while configuring the dynamic SCEP challenge in the Okta tenant Username: Enter the Username provided while configuring the dynamic SCEP challenge in the Okta tenant Password: Enter