portmanager.blogg.se

Jamf pro admin guide
Jamf pro admin guide









  1. #JAMF PRO ADMIN GUIDE PRO#
  2. #JAMF PRO ADMIN GUIDE PASSWORD#

There are two login methods you can choose from: After enabling Self Service User Login, you must select a login method and authentication type. Self Service User Login is disabled by default. The Self Service User Login settings allow you to configure the method for logging in to Jamf Self Service for macOS. Require user authentication to Self Service

#JAMF PRO ADMIN GUIDE PRO#

It is recommended that you use "Always" if computers in your environment are configured to trust the certificate before they are enrolled.įor steps to ensuring proper certificate verification, visit the Security Settings page in the Jamf Pro Administrator's Guide and the Safely Configuring SSL Certificate Verification Knowledge Base article on Jamf Nation.

  • If you are using an SSL certificate from an internal CA or a trusted third-party vendor, select either "Always" or "Always except during enrollment".
  • If you are using the self-signed certificate from Apache Tomcat that is built into Jamf Pro, you must select "Always except during enrollment".
  • This prevents computers from communicating with an imposter server and protects against man-in-the-middle attacks.Ĭonsider the following when configuring SSL certificate verification: Enable certificate-based authentication and configure SSL certificate verificationĬonfiguring the SSL Certificate Verification setting in Jamf Pro ensures that computers only communicate with a host server that has a valid SSL certificate. You can also choose to flush logs that are older than a certain number of days, weeks or months.įor steps to set up your ideal flushing scenario, visit the Scheduling Log Flushing section of the Flushing Logs page in the Jamf Pro Administrator's Guide. You can schedule log flushing to take place daily, or you can manually flush logs as needed.
  • Mobile device inventory reports (mobile device inventory information from past inventory submissions).
  • Computer inventory reports (computer inventory information from past inventory submissions).
  • Computer and mobile device management history.
  • You can flush the following types of logs: Schedule log flushing at appropriate intervalsįlushing logs reduces the size of the database and can speed up searches. To know what changes took place and when, begin your set up by visiting the Viewing Change Management Logs in Jamf Pro section of the Change Management page in the Jamf Pro Administrator's Guide.
  • Object name (such as the username of a Jamf Pro user account).
  • Object type (such as a Jamf Pro user account).
  • Username of the administrator who made the change.
  • The Change Management logs can also be viewed in Jamf Pro.

    jamf pro admin guide

    On-premises customers can log changes to a log file (JAMFChangeManagement.log) on the Jamf Pro host server and log the changes to a syslog server. Configure the Change Management settings to log changes

    jamf pro admin guide

    Enable the minimum required privilegesĮnable the minimum privileges required by your organization for all user accounts and groups.įor steps to set up, visit the Creating a Jamf Pro User Account section of the Jamf Pro User Accounts and Groups page in the Jamf Pro Administrator's Guide.

    jamf pro admin guide

    #JAMF PRO ADMIN GUIDE PASSWORD#

    For steps to set up, visit the Configuring the Password Policy section of the Jamf Pro User Accounts and Groups page in the Jamf Pro Administrator's Guide.

  • Settings to allow a user to unlock their own accountīy configuring proper password settings, you put mechanisms in place to prevent unauthorized access.
  • Number of login attempts allowed before a Jamf Pro user is locked out of the account.
  • You can configure the following password settings: The Password Policy applies to all standard Jamf Pro user accounts. The Password Policy in Jamf Pro allows you to configure the password settings.

    jamf pro admin guide

    Configure the Password Policy for Jamf Pro user accounts With an array of security possibilities, we want to ensure your Jamf Pro server and all supporting technology (including server operating system, Java, Apache Tomcat and MySQL) are compliant with your own internal security standards.Īs such, here are seven basic recommendations to best secure your Jamf Pro server and underlying infrastructure. Jamf Pro offers a variety of security settings for servers hosted on-premises or with Jamf Cloud. With such power, comes great responsibility… As the standard in Apple Enterprise Management, Jamf solutions are ideal for connecting users to the resources they need, fully managing all Apple devices, and protecting users, devices and networks against threats.











    Jamf pro admin guide