Join me on my journey as I share my insights and experiences on web development, business, and content creation.
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be...
A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...
About App Configs and Managed Preferences As I work on building out my JAMF Github Repo I am constantly looking at sharing some of the configurations that have worked for me and saved me time and effort. Many of these came from the JAMF Library, but some I wrote specifically due to tools and workflows that I had to tackle in my very own ecosystem. The following iOS App Configs were helpful in automating the configuration of key iOS apps. Some of these were a direct result of the AppConfig...
Introduction Contributing to open-source projects on platforms like GitHub can significantly enhance your skills and expand your network. This article focuses on how to contribute to a GitHub repository, using the “Awesome Mac Admin Tools” repo as an example. Whether you’re a seasoned developer or new to coding, you’ll learn how to fork a repository, make modifications, and submit pull requests. Understanding Git and GitHub Git is a version control system that allows multiple developers to collaborate on projects efficiently. GitHub is a cloud-based platform that hosts Git repositories and...
The Problem For those who have worked with macOS for a while the struggle of managing secure tokens on macOS is a very real one. Lets start off with the basics. What is a secure token? On a Mac, a secure token is an account attribute that allows users to carry out essential macOS functions, such as activating FileVault, authorizing system and kernel extensions, and managing software updates. The secure token is typically granted to the first account created on a workstation, so many administrators struggle with managing computers that...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Setting up SNIPE-IT with Portainer Ok so now that we have Portainer up and running, its running securely so now we are ready to setup SNIPE-IT. Here are the steps to add SNIPE via Portainer. The first step is logging into Portainer. Upon logging into Portainer you will click on “Local” under Environments....
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Option #1: Reverse Proxy with NGINX-PROXY Ok so I’ve done a lot of research on reverse proxys and they are great at protecting your internal assets but there are some inherent security flaws that you have to live with if you want perfect security. Lets face it there is no such thing, but...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Installing Docker, Portainer and SSL At this stage were assuming your still connected to the Raspberry Pi via a monitor. If you’re already SSH’d into the machine great your one step ahead. Now that we have the Rasberry Pi setup we need to set up Docker. Why? Because eventually, we will use the...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi How to setup Rasberry Pi The first step in setting up SNIPE-IT is to setup the platform that it will run on. Luckily the best platform and most economical is a Rasberry Pi. We are using a Rasberry Pi 3 in this case. Before we get too far we need to pick the...