Results (75)
Detecting, Blocking & Remediating OpenClaw using Jamf
v1
English
either manually, or via a Smart Group which bases its membership on one of the detection mechanisms listed above. Note The openclaw_removal.sh script has been created and provided to give a best effort in removing the most common
Resources: Terraform, GitHub, and Jamf Configurations
v1
English
episode explaining Terraform for Mac admins I Have No Idea What Terraform Is (Podcast) Audio version for on-the-go learning Blog Posts Resource Description ClickOps to GitOps: Infrastructure as Code (Jamf Blog) Why you should move from manual configuration
Platform SSO for macOS
v1
English
truly "passwordless" like Windows Hello for Business. Consumer accounts will still require passwords for initial login and FileVault authentication Supported Not currently supported. Okta customers can consider Fastpass features for non-phishable hardware-bound authentication Smart Card Integration Perfect for
Jamf Pro API Connector for Okta Workflows
v1
English
Mobile Device Inventories Return paginated results of all mobile devices inventory data. List Volume Purchasing Locations Return information on VPP locations, including token expiration date. Read Computer Compliance Status Return basic compliance information for the given computer device. Read Computer
Tailored Event Monitoring on macOS
v1
English
related signing information as well. We could use this data in a SIEM, saving us from creating a custom analytic and preserving system performance. As a security analyst , I want to monitor tamper events related to the Jamf Pro management
Enforcing Compliance Baselines for Network Access
v1
English
Cloud which will immediately sync the endpoint to the related device groups Login to Jamf Pro instance that’s going to be used for this workflow Navigate to Settings from the navigation menu Navigate to Webhooks On the top
Implement ZTNA Risk Signaling
v1
English
🛡️Jamf Security Integration Protect | Pro | Connect This article outlines how to automatically protect organizational data from out-of-compliance or risky macOS devices using the Jamf platform.  Specifically, you will see how an on-device threat detected by Jamf
Managing Jamf Configuration with Terraform: An Introduction
v1
English
you can use. Some of these will be necessary as you build specific functions and some you’ll never use but they’re all very well documented over at https://developer.hashicorp.com/terraform References Deployment Theory Jamf Pro
Getting Started with Jamf Protect for Mobile
v1
English
This Getting Started guide serves as a playbook for the Network Threat Defense and Content Filtering services provided by Jamf Protect. Jamf Protect is offered both as an enterprise-grade macOS Endpoint Protection Platform as well as a mobile-first
SIEM & XDR Integration
v1
English
Many mid-to-large organizations utilize a SIEM and/or XDR in order to correlate digital events and activity generated across as many endpoints as possible. The more data, the better the chance of being able to identify patterns that
Implementing Behavioral Baselines in Security Monitoring
v1
English
not common in regular usage. Contextual Awareness : Consider the context in which osascript is being used. For instance, an osascript command that is triggered shortly after an application download might warrant closer inspection. Alert Configuration : Set up alerts for patterns
Managing Jamf Protect with Terraform: The Jamf Protect Provider
v1
English
In our previous write-up, Managing Jamf Configuration with Terraform: An Introduction , we walked through the basics of Infrastructure as Code and how to get started with Terraform and Jamf Pro. If you haven't read that yet, we'd
Aftermath Incident Response for macOS
v1
English
Incident Response on macOS As the Mac footprint grows across organizations of all sizes, attackers are increasingly focusing their efforts on exploiting macOS. For endpoint security, InfoSec teams look to Jamf for device configuration, threat detection & prevention, and telemetry data
Automated Network Isolation
v1
English
Group which is the Smart Computer Group we created in Jamf Pro earlier to the group in Jamf Security Cloud we created in step 2 Drag and Drop the group mapping to the top It is important to give
Defining Security Policy
v1
English
Defining a security policy for your organization is a foundational configuration step to deploy Trusted Access. A security policy defines the types of threats your organization considers risky, and defines a risk level for each. Jamf Protect for Mobile Devices
Deep Packet Inspection
v1
English
Alongside OS and App DLP controls , many organizations wish to implement additional inspection of network traffic to ensure compliance policies are not being circumvented. With Deep Packet Inpection (DPI), IT administrators are able to implement policies that filter traffic based
Establishing Compliance Baselines with Compliance Editor
v1
English
Regulated industries and government agencies that handle sensitive or classified data are required by their InfoSec teams to harden and secure endpoints as much as possible. Other organizations may not need the highest security possible, but may still want to
Configuring Simplified Setup for Platform SSO using Jamf Pro and Okta
v1
English
Dynamic-Microsoft CA URL to SCEP Admin: Enter the Challenge URL provided while configuring the dynamic SCEP challenge in the Okta tenant Username: Enter the Username provided while configuring the dynamic SCEP challenge in the Okta tenant Password: Enter
Threat and Risk Management
v1
English
Just because a device is sanctioned doesn't mean that the device is safe . For this reason, the Trusted Access solution calls for on-device and in-network endpoint protection technologies that ensure devices are: Protected from inbound threats to
Remote Browser Isolation
v1
English
Alongside OS and App DLP controls , some organizations want to reduce data loss and exfiltration capabilities via web browsers. Using Remote Browser Isolation, administrators can configure numerous policies, including copy/paste and printing controls. These work in any modern browser