Posted on 01-29-2024 03:18 AM
Leverage a client-side LaunchDaemon, script and .plist trio to determine computer health, based on the Mac’s ability to execute an inventory update policy
In the spring of 2022, I renewed my Utah’s driver license and noted it wouldn’t expire for six years. When I obtained my Ohio’s driver license last Halloween, I was tickled with the option for an eight-year expiration: “Yes, please!”
When I enrolled a Mac in our Dev lane yesterday, I was also pleased that its Jamf Pro-related certificates won’t expire for more than three years. (Although, by the time you’re reading this, that box has probably already been nuked-and-paved. Thrice.)
If we base a Mac’s compliance solely on the presence of valid MDM certificates, we’re probably allowing too many computers access to sensitive data
However, if at next week’s traffic stop the police officer simply confirmed I had a valid driver’s license and sent me on my way with a warning to “slow down” — never double-checking what I’ve actually been up to using the computer in the police cruiser — I could continue not worrying about all those unpaid parking tickets.
Similarly, just because a Mac has valid MDM certificates doesn’t guarantee its enrollment is healthy.
The Jamf Pro Health Check script executes on the following approach:
unhealthy
each morning shortly after midnight (local time) and immediately after each restart (i.e., negative trust).healthy
when the policy executes successfully; end-users can also self-remediate by logging into Self Service and manually running your modified “update computer inventory” policy..plist
values to determine if the Mac is healthy
or unhealthy
(based on the Mac’s ability to successfully execute the assigned Jamf Pro inventory update policies).