Our Casper admins are researching how to prevent admin users of the Casper environment (using either JSS or the Casper Utilities) from initiating an Emory University-type disaster, in which the management server could send out commands to all managed systems, erase the hard drive and deploy a new OS.
Has anybody encountered, or can think of, a scenario that where a IT tech - trained or otherwise - could initiate a mass reimaging of a Mac fleet? What I'm most concerned about are the ways in which a tech would "imaginatively" use the tools in ways that are unanticipated. What have community members done to prevent this kind of disaster from occurring in their environment? User restrictions in the Casper server itself? Continual training and education of techs? Hope-and-pray?
For background, we are a higher-ed institution running a single JSS instance configured with multiple sites, each of which generally corresponds to a college. Techs in one site generally don't have permission to access another site. While most sites only have a couple admins and a few dozen devices, we do have a couple sites that have hundreds of machines. The largest site has about 20 techs that can use Remote and Imaging to manage machines for the departments they manage within that college. Only a few techs have access to the Full Site settings to create scripts or packages. We have NetBoot servers scattered around campus for convenience for those areas with large numbers of Macs. The NetBoot images are configured to automatically run Casper Imaging.
Thanks everyone!
