Latest Articles

jamf articles scripts

Enrolling M1-M4 Devices into Automox with JAMF with secure tokens

Blog Series Automox Secure Token with modern macOS deployments Enrolling M1-M4 Devices into Automox with JAMF with secure tokens The Problem: Updated Managing Secure Tokens on macOS has long been a challenge for administrators using JAMF and Automox. In my previous post, Managing the macOS Secure Token with JAMF Pro, I discussed a script-based approach to grant Secure Tokens to additional users. However, this method required administrators to manually pass usernames and passwords into the JAMF configuration—an approach that, while effective, was not ideal from a security or usability perspective....

scripts jamf tutorials

Modified JAMF Compliance Editor Extension: List failed items NOT in exemption list

macOS Compliance Project + JAMF Compliance Editor As promised I am continuing to look for ways to build out my JAMF Github Repo. One of the items that I have been working heavily with in my role is the macOS Compliance Project and as I am a JAMF administrator that means leveraging the JAMF Compliance Editor. The JAMF Compliance Editor gives you the ability to rapidly configure, tailor and deploy a custom baseline with the macOS Compliance Project. If you are new to either the macOS Compliance Project or JAMF...

scripts jamf tutorials

How to setup exemptions with JAMF Compliance Editor

Setting the stage If you are new to either the macOS Compliance Project or JAMF Compliance Editor, I would recommend watching and reading the following videos and blog posts on the topic. NIST macOS Security & JAMF Compliance Review NIST macos security How-To 2023 JNUC Presentation on JAMF Compliance Editor Lets assume for the sake of this blog post that you are familiar with both of these wonderful solutions to baseline compliance on macOS. For many who use JAMF and the macOS Compliance Project, the use of JAMF Compliance Editor,...

scripts jamf tutorials

BYOD Restrictions & Strategies for 2025

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Restrictions As organizations continue to embrace Bring Your Own Device (BYOD) strategies, ensuring security without compromising user experience remains a challenge. This post outlines a minimum baseline for BYOD restrictions across iOS, Android, macOS, and Windows devices—providing a foundation for companies to secure personal devices while allowing employees the...

articles video

Reflecting on a Transformative Journey: From Entrepreneur to Cybersecurity Leader

As 2025 begins, it’s a fitting time to reflect on the transformative journey I’ve undertaken over the past few years. It’s been a whirlwind, filled with growth, learning, and exciting challenges. 2022: Closing One Chapter In 2022, I sold the company I had poured my heart and soul into for nearly a decade. For nine and a half years, I ran that business as its CEO, primary consultant, and wearer of every other hat imaginable. Growing the business and eventually selling it was a monumental achievement, but it also marked...

articles video

Good Cybersecurity policies, procedures, guidelines take time. They're not rushed and aren't rubber stamped

Cybersecurity is no longer a luxury or an afterthought—it’s an absolute necessity. But how can you tell if the company you work for, as a security professional, truly values cybersecurity? Let’s explore some clear indicators that demonstrate a company’s commitment to implementing robust security practices in-house. A company passionate about cybersecurity doesn’t treat it as a one-time project or a compliance checkbox. Instead, security is deeply embedded in their culture and operations. Organizations that take cybersecurity seriously prioritize it from the top down, with leadership advocating for and investing in...

Prev 1 ... Next