I'm trying to come up with a solution that will require our High Sierra machines upon enrollment to get encrypted with a individual recovery key (IRK). I also need JSS to capture this key in the management tab of the computer object so we can use it in recovery scenarios.
JamF support stated that on High Sierra we should no longer use policies and use configuration profiles to enable Filevault (FV). I used that method and while it does ask the user to enable FV at logout it has the cancel option. If the user hits cancel at each logout they can avoid encryption indefinitely. Additionally, if they enter their password and encrypt the IRK is displayed. Unless I can suppress that window I'm worried they will scribble that down on a sticky note in their offices.
sudo fdesetup enable -defer /tmp/filevault.plist -forceatlogin 0
I ended up playing around with fdesetup and found a method to enable it via command line. Similar to the configuration profile (CP) method if you use the defer switch it prompts the user at login to encrypt. The difference being if you hit cancel you're logged back out. It enforces it with the 0 value.
The problem is the key is written in my example to /tmp and during a jamf recon it's not getting into JSS. JamF support doesn't think recon has anything to do with it. They're suggesting that unless I use a CP the IRK won't get into JSS.
Anyone have any suggestions?
Thanks in advance.
