When I started at my current organization they were (and still are)
using a Mac mini to mount an iSCSI share. Previously this was being done
on a machine running macOS 10.10 with Server. Earlier this year when I
had to replace the machine I didn't in...
I'm willing to try this on my own, but after the struggles we
encountered getting our JIM working in the DMZ I wondered if anyone had
attempted this successfully before I go down the rabbit hole. Do you
have your JIM and your ADCS on the same server/...
Recently we updated our JSS to 9.100, previously 9.93, and since then
our DEP Pre-Stage enrollments are stalling out for about 1-2 hours (no
exact times) before the actual enrollment takes place and enrollment
policies kick in. There are a few other ...
I am using an EA to pseudo-track this. It's not perfect, but it meets
what our InfoSec team wants to know.#!/bin/sh loggedInUser=$(stat -f %Su
/dev/console) arch=$(/usr/bin/arch) brewPath="" if [ "$arch" == "arm64"
]; then brewPath="/opt/homebrew/bin...
As @cwaldrip said if the device is scoped properly to a prestage a
student can't reset it and just use it free of management. If they wipe
the device, it boots right back to the remote management screen during
OS setup and the whole process starts ov...
We're using Crowdstrike and a PPPC for this. You'll need access to their
portal, but the documentation can be found here - Falcon Sensor for
Macand Jamf's documentation here - Preparing Your Organization for User
Data Protections on macOS 10.14.