Join me on my journey as I share my insights and experiences on web development, business, and content creation.
macOS Compliance Project + JAMF Compliance Editor As promised I am continuing to look for ways to build out my JAMF Github Repo. One of the items that I have been working heavily with in my role is the macOS Compliance Project and as I am a JAMF administrator that means leveraging the JAMF Compliance Editor. The JAMF Compliance Editor gives you the ability to rapidly configure, tailor and deploy a custom baseline with the macOS Compliance Project. If you are new to either the macOS Compliance Project or JAMF...
Setting the stage If you are new to either the macOS Compliance Project or JAMF Compliance Editor, I would recommend watching and reading the following videos and blog posts on the topic. NIST macOS Security & JAMF Compliance Review NIST macos security How-To 2023 JNUC Presentation on JAMF Compliance Editor Lets assume for the sake of this blog post that you are familiar with both of these wonderful solutions to baseline compliance on macOS. For many who use JAMF and the macOS Compliance Project, the use of JAMF Compliance Editor,...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Restrictions As organizations continue to embrace Bring Your Own Device (BYOD) strategies, ensuring security without compromising user experience remains a challenge. This post outlines a minimum baseline for BYOD restrictions across iOS, Android, macOS, and Windows devices—providing a foundation for companies to secure personal devices while allowing employees the...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea...
A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...
About App Configs and Managed Preferences As I work on building out my JAMF Github Repo I am constantly looking at sharing some of the configurations that have worked for me and saved me time and effort. Many of these came from the JAMF Library, but some I wrote specifically due to tools and workflows that I had to tackle in my very own ecosystem. The following iOS App Configs were helpful in automating the configuration of key iOS apps. Some of these were a direct result of the AppConfig...
Introduction Contributing to open-source projects on platforms like GitHub can significantly enhance your skills and expand your network. This article focuses on how to contribute to a GitHub repository, using the “Awesome Mac Admin Tools” repo as an example. Whether you’re a seasoned developer or new to coding, you’ll learn how to fork a repository, make modifications, and submit pull requests. Understanding Git and GitHub Git is a version control system that allows multiple developers to collaborate on projects efficiently. GitHub is a cloud-based platform that hosts Git repositories and...
The Problem For those who have worked with macOS for a while the struggle of managing secure tokens on macOS is a very real one. Lets start off with the basics. What is a secure token? On a Mac, a secure token is an account attribute that allows users to carry out essential macOS functions, such as activating FileVault, authorizing system and kernel extensions, and managing software updates. The secure token is typically granted to the first account created on a workstation, so many administrators struggle with managing computers that...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Setting up SNIPE-IT with Portainer Ok so now that we have Portainer up and running, its running securely so now we are ready to setup SNIPE-IT. Here are the steps to add SNIPE via Portainer. The first step is logging into Portainer. Upon logging into Portainer you will click on “Local” under Environments....
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Option #1: Reverse Proxy with NGINX-PROXY Ok so I’ve done a lot of research on reverse proxys and they are great at protecting your internal assets but there are some inherent security flaws that you have to live with if you want perfect security. Lets face it there is no such thing, but...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi Installing Docker, Portainer and SSL At this stage were assuming your still connected to the Raspberry Pi via a monitor. If you’re already SSH’d into the machine great your one step ahead. Now that we have the Rasberry Pi setup we need to set up Docker. Why? Because eventually, we will use the...
Blog Series Setting up SNIPE-IT with DietPi on a Raspberry Pi Installing Docker & Portainer on DietPi for Snipe-IT Securing Raspberry Pi with Reverse Proxy and or Cloudflare Proxy Tunnel Setting up Snipe-IT on Portainer with DietPi How to setup Rasberry Pi The first step in setting up SNIPE-IT is to setup the platform that it will run on. Luckily the best platform and most economical is a Rasberry Pi. We are using a Rasberry Pi 3 in this case. Before we get too far we need to pick the...