Latest Articles

cybersecurity tips microsoft

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block...

scripts jamf tutorials

A few helpful JAMF extension attributes for Computers

A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...

scripts jamf tutorials

Some of my favorite iOS and macOS App Configurations in JAMF

About App Configs and Managed Preferences As I work on building out my JAMF Github Repo I am constantly looking at sharing some of the configurations that have worked for me and saved me time and effort. Many of these came from the JAMF Library, but some I wrote specifically due to tools and workflows that I had to tackle in my very own ecosystem. The following iOS App Configs were helpful in automating the configuration of key iOS apps. Some of these were a direct result of the AppConfig...

reviews video

Mactracker Walkthrough and Review

Introduction In the world of Mac administration, having the right tools at your disposal is crucial. One of the standout applications that every Mac admin should consider is Mac Tracker. This powerful app serves as a comprehensive database of all historical Mac OS versions and Apple accessories, making it an invaluable resource for both seasoned professionals and newcomers alike. In this article, we will explore the features of Mac Tracker, how it can enhance your workflow, and why it deserves a spot in your toolkit. Key Features of Mac Tracker...

cybersecurity tips video

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

How I Passed the CISSP Exam After 9 Months of Study Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here’s how I did it, the resources I used, and some tips to help you on your journey. My Study Plan 1. Set a Realistic Timeline From the outset,...

git tutorials

Using Git and GitHub to contribute changes to Repositories with Pull Requests

Introduction Contributing to open-source projects on platforms like GitHub can significantly enhance your skills and expand your network. This article focuses on how to contribute to a GitHub repository, using the “Awesome Mac Admin Tools” repo as an example. Whether you’re a seasoned developer or new to coding, you’ll learn how to fork a repository, make modifications, and submit pull requests. Understanding Git and GitHub Git is a version control system that allows multiple developers to collaborate on projects efficiently. GitHub is a cloud-based platform that hosts Git repositories and...