I’m wondering how others approach Macs that have become unaccounted for, lost or stolen?
We have a fleet of approx 1500 - many that were purchased before any of the stuff currently involved in managing them were working for our organisation.
Sometimes I’ll come across a Mac that is still checking into Jamf, but we have no record of who it belongs to and whether it was legitimatly bought-out or not.
Othertimes we have Macs that have just been plain stolen.
There’s another scenario on top of this where I’ll encounter Macs that check-in, so can seemingly run Policies but aren’t doing an inventory update, and won’t run Management commands. (the Wipe Computer command being one I’d find quite useful in particular)
With that in mind, I put together a script to install a launch daemon that launches a script that agressively notifies the user that the device belongs to our org, and to contact our helpdesk - it blocks the screen out to the point the device becomes unusable. I am yet to deploy it though. I’m concerned it might be a bit much, especially if it were to get scoped to somebody by mistake.
I’m interested to know if anyone else goes with such a heavy-handed approach, or if there are any ready-made tools out there that might be more elegent?