We have recently put an external JSS node into production. To our surprise, several MacBooks that were stolen over a year ago were now checking in with our JSS. I have jumped on this to put a process in place using Prey (http://preyproject.com/) to gather some information. As great as this sounds, I have not yet targeted the stolen Macs with Prey and will not be doing so until someone at a higher pay grade than mine tells me to go forward with it. However, I thought it might be handy for someone else to know how I put it together. Comments and suggestions are always welcome.
We have several MacBooks that were stolen a while ago and they are now sending inventory reports and usage data to the JSS (thanks to our new external web node) and they are installing the latest JAMF binary. So, the challenge is to get more information from these Macs. After a little Googling, it looked like Prey might be the quickest option. While being able to install Prey on a Mac, configure it using the GUI and have it be there if, or when, a Mac gets stolen would be a wonderful thing, I had a slightly different situation on my hands. First, I needed to get this software on Macs that were already stolen. Second, putting Prey on all the Macs in our school district would cause some serious privacy concerns (students and employees don't generally like to think about their activities on the district-owned computers as not being private--but that's a whole different discussion).
I did a little playing with the Prey installer on a test Mac and discovered that the "Advanced" option could do exactly what I wanted. It does not install the system preference pane and it sets up the Prey software to report information directly to an email address--no need to involve GUI configuration or the Prey web site. I went to Google and created a gmail account that could be used to receive this data while re-imaging the test Mac. I fired up Composer to capture a snapshot, installed the Prey software with the Advanced setting and configured the advanced fields. First, I included the URL of an address that I know doesn't exist so that when the software gets installed on the stolen Mac, it will immediately start sending information--no need to be able to turn this on or off, the Macs have already been stolen. Next, I entered all the email information for the gmail account I just set up. And finally, I set the run interval to "2" so that it would run every two minutes. This may be overkill, but for my first attempt at catching thieves, I'd rather have too much data than too little. I then finalized the snapshot and created the package.
I manually installed the package on a test Mac and, sure enough, I started receiving emails from the test Mac. However, I discovered the emails were coming in at much longer intervals than I had intended. After looking through the package I had created, I could see that the /private/var/at/tabs/root file had been created with a 5-minute interval--presumably the smallest the Prey installer will let you configure. I rebuilt the package, editing this file to set the interval to 1 minute (mostly to see if I could) and after installing this package on a test Mac, I was receiving emails every 1 minute.
There remained one hurdle to this process: getting the package installed on the stolen Macs. We have set up an external web node, but not an external distribution point. I'm not prepared to have a full external distribution point with all of our packages on it, yet, so I created a share point on an external server, defined an HTTP distribution point in the JSS for this share point and copied the Prey package to the share point manually. In hopes of not inciting any privacy riots, I have also chosen not to have the package exist on any of the internal distribution points. This required uploading the package into Casper Admin so that I could configure the package information and then manually deleting the package from the main distribution point before it could be replicated to the others. In this way, Casper knows about the package and the package exists on the external distribution point (in fact, it is the only package on the external distribution point), but if any Mac on our internal network tried to install it, it would fail.
I created a policy to install the Prey package and scoped it to a test MacBook and set the distribution point for the test Mac to the external distribution point (yet another requirement for this package to be installed and another way to ensure it does not inadvertently get installed on other Macs) and headed home for the weekend with the test MacBook.
Shortly after getting the MacBook connected to my network at home, I started receiving emails in the gmail account with information about the Mac's location (GPS and IP), screenshots and pictures of myself. Woohoo!
Now the really difficult part… trying to get someone to approve using this process to track down the district's stolen equipment. Hopefully it is easier to get permission to install software on computers that are already identified as "stolen" than it would be to install (an inactive Prey) on computers that are being legitimately used by students and teachers. Wish me luck!