A holistic approach to security: Visibility and Compliance

Share me

A holistic approach to security: Visibility and Compliance

What are your endpoints doing that they shouldn’t be (or not doing what they should be)? The symbiotic relationship between visibility and compliance is a delicate, yet powerful one if managed properly. With the proper tooling, organizations can not only deploy secured configurations and roll out policies to enforce secure baselines, but they can also gain deep visibility into each endpoint to verify that each device is operating in alignment with company policies and complying with regulatory requirements.

Author: Jamf

Date: 28 November 2022

When discussing compliance, no talk is complete without visibility. After all, what good is understanding the complexities of complying with regulatory requirements when you lack the auditing data to make the necessary changes that bring your endpoints into compliance? Conversely, insight into each and every detail required of your organization to comply with industry, governmental and/or regional regulations will be of little significance if organizations do not know how to put telemetry data to work toward meeting your compliance goals.

To put each to good use, they rely on one to inform the other iteratively. This means that insight into device health statuses will reveal areas of deficiency that IT and Security teams can effectively target to bring endpoints into compliance. While understanding how and where compliance requirements impact your organization will aid those same teams in configuring security tooling to identify and report on device-based auditing data, providing them the information they need to assess endpoint security and provide proof of compliance with standards and requirements.

A tale of two compliances

Compliance = compliance, right?! Yes, except when it doesn’t. Confused yet? Let us explain.

Compliance can mean demonstrating that your endpoint is configured to the necessary standards and requirements. For example, things like a passcode, disk encryption, Bluetooth status, screensaver policy, etc. However, compliance can also mean you’re storing the appropriate logging data relating to endpoint activities in a centralized location for future reference.

Depending on your organization, the industry it falls under and where it does business, it could be subject to any type of compliance — or maybe even both. It really comes down to the organization’s unique needs.

As an example, let’s look at Fintech (financial technology). Since they operate in the finance sector, they are required to ensure that endpoints are hardened against threats. This means deploying secure configurations, app restrictions and enforcing network data to meet certain encryption requirements to name a few of the requirements. At the same time, Fintech organizations are also required to show proof of compliance, meaning endpoint health data must be recorded and logs stored centrally to aid organizations in proving that not only are their devices secured but there’s a paper trail to verify this claim to independent auditors and regulators when needed.

Eliminating the guesswork

Security mantra: if you can’t prove that a device was secure, it wasn’t secure.

In a nutshell, when required to show proof that your endpoints are secured and meet the requirements of the regulatory body that governs your industry, proof of compliance must be provided or else it’s viewed as the organization did (or could) not comply with regulations.

That could directly cost the organization, and sometimes its executives as well, with steep penalties such as large fines, lost business opportunities, loss of eligibility to access government funding and/or even criminal liability. Indirectly, it could lead to a loss of faith amongst your existing customers and clients stemming from a negative impact on your reputation and resulting in loss of revenue or potentially even terminating business operations entirely.

But it’s not all doom and gloom, rather with the right solutions as part of their infrastructure, IT and Security teams can glean the necessary granular data needed to not only stay informed as to the latest information relating to endpoint health but also turn that knowledge into actionable power.

Telemetry

Consider for a minute your organization, the number of endpoints relied upon by employees to get work done and balance that against the needs of the company and its users, as well as any regulatory requirements imposed. Without knowing the specifics of your company or its needs, it’s likely not a simple undertaking.

Now factor in the modern threat landscape, which adds in a bevy of threats and attacks by bad actors, setting that against the backdrop of a work-anywhere world. With endpoints and multiple ownership models to contend with, it can be increasingly challenging as your workforce is dispersed. And without the right tools, a difficult task just became infinitely more of a challenge to resolve.

However, by choosing the right solutions to remotely collect comprehensive logging around the system, user and network activity — and sending gathered data to your single pane of glass — leveraging rich telemetry data is made a whole lot easier, simpler and requires less of an impact on your infrastructure or your users. Moreover, the right tooling helps organizations succeed in their auditing goals by using it to craft configurations that keep devices secured and by implementing policies to enforce device compliance while having real-time visibility data in the form of granular logging and reports that provide exactly the proof to verify compliance. And with a powerful, scalable cloud-based solution on your side, all that data is accessible at your fingertips from anywhere — regardless of where your endpoints are.

Device status

Do you know what the status of say, the endpoint security solution is on all the devices deployed within your organization? Which devices are up-to-date with patches? And if any applications are restricted from use by company policy, which endpoints (if any) have actively broken that rule, potentially putting sensitive company data and the users’ own personal and privacy data at risk of exposure?

If the answers to the questions posited above are anything except “Yes”, “They all are.” and “Here’s a current report I just pulled up which shows which devices were caught by our policies, automatically enforcing the rule and bringing the affected devices into compliance.”, then it’s a fair belief that might be endpoints accessing organizational data without the necessary (and possibly required, if regulated) safeguards to provide insight into and enforce compliance goals.

Close your eyes for a minute and imagine having a solution that taps into this granular level of visibility at all times. 24/7/365, your organization can simply tap on an individual endpoint, and gather a group of them that meet or do not meet specific criteria, such as not being on the latest version of macOS, or receiving real-time alerts when endpoints have fallen out of compliance along with why this occurred and how to correct the issue.

Ok, now open your eyes, we’d like you to meet Jamf Protect.

Customizable analytics

Analytics is a cornerstone of Jamf’s endpoint security solutions. They provide pre-defined rule sets that are used to detect and prevent known threats targeting your Mac fleet. Think of malware and its variants and you’ll have an idea of how analytics work when detecting a known strand, kicking into action to promptly remove the threat from your devices without impacting the end user’s experience or even breaking a sweat.

But that’s not all! Jamf Protect also employs behavioral analytics that targets unknown threats that may be as yet undetected and lying dormant on your endpoints, waiting for the chance to strike at your users, compromise devices and/or steal sensitive data.

But wait, there’s more! Jamf knows each organization is unique in size, scope and needs, hence why analytics are also customizable, so IT and Security teams can determine how to best configure analytics to meet the needs of their organization. By matching your unique needs, analytics can be finely tuned to provide greater capability for identifying, preventing and remediating threats that pose a greater risk. Also, customizing analytics allows organizations to provide support against Mac-focused security threats, for example, aiding threat-hunting teams in discovering novel threats in a concerted effort to proactively stop attacks before they have a chance to occur.

Extending capabilities

Apple and Jamf have a long, deep relationship, one that extends to all of Jamf’s offerings. Thanks to this, our endpoint security products integrate harmoniously across Apple’s entire lineup of Mac devices, providing deep integration with Apple’s Endpoint Security API for maximum visibility into all device health statuses. Furthermore, the deep level of integration means greater insight and extension of built-in Apple security tools, like Gatekeeper, XProtect and MRT just to name a few.

Speaking of evolving capabilities through integration, Jamf’s RISK API securely connects with first- and third-party solutions to not only expand functionality but also drive comprehensive workflows that holistically protect endpoints while granting administrators increased flexibility when monitoring and identifying threats on endpoints, on-device and in-network threat prevention, triaging and automatic remediation of detected issues and keeping tabs on endpoint compliance levels by evaluating audit data (more on that a bit later).

Reporting

Real-time visibility tracks the goings on occurring in the background on your Mac fleet, arming administrators with the data they need to effectively mitigate risks as they develop – not waiting until risks become too big to contain or lead to a data breach. After all, knowledge is power, and having insight into critical network and system processes, including user activity adds color to what’s being done to the Mac – and on it.

The result? IT and Security teams obtain this data faster by leveraging logging data, permitting them to investigate immediately, mitigating or remediating risk quickly and efficiently.

Looking for more robust reporting options? Leveraging Jamf’s integration capability, streaming real-time data to a third-party solution, like Splunk adds a whole new dimension to reporting by combining all data points gathered with visualizations to paint a more complete picture of the state of your macOS-based endpoints.

Manage and validate compliance

An effective way to illustrate the importance of security and compliance tooling on Apple, even as we agree that Apple makes a very secure operating system, is the ability for organizations to manage and validate compliance. While organizations choose Apple for many different reasons, their natural security advantage is among the chief reasons to adopt Apple at the workplace.

Despite its enhanced security, organizations still have an obligation to meet certain reporting and compliance standards and this requires the right tools to accomplish this on the Mac. Simply put: nobody offers more robust macOS visibility than Jamf.

Plus, our same-day support promise means you, your organization and your users can always embrace the latest features, functionality and capabilities without putting compliance at risk.

Secure baselines

Incorporating secure baseline assessment into your comprehensive security strategy is not only a best practice, but Jamf makes auditing against industry-standard security benchmarks a breeze. Aligning your processes with Center for Internet Security (CIS) Benchmarking standards is available right out-of-the-box.

The built-in presets quickly validate that your fleet meets the requirements set forth by your business or industry, while the aforementioned integration with first-party solutions, like Jamf Pro, allows administrators to develop automated workflows that securely share telemetry data from Jamf Protect with Jamf Pro, where endpoints are then brought back into compliance automatically thanks to the policy-based management groups, ensuring endpoints are protected and stay compliant against risk.

In addition to baking in support for CIS, Jamf supports other device-hardening frameworks, such as:

Policy-based management

A crucial part of compliance management is the identification of risks that have brought endpoints out of compliance, potentially exposing critical data. This is on par with the ongoing management of compliance risk, but what about when devices are found to be out of compliance, what then?

There are, of course, manual options that require a member of IT or your Security team to intervene and mitigate the risk. This is possible certainly, but only as effective as when the issue was caught. If users fail to report anomalies or IT does not detect them for some period of time, this incident could linger, leaving the door open for threats to grow and bad actors to attack, potentially resulting in device compromise, data theft or regulatory penalties – or all of the above, unfortunately.

This is why Jamf solutions incorporate policy-based management, so as to leave nothing to chance. By implementing policies that are aligned with organizational policies and industry regulations, organizations can customize targeting groups to easily audit endpoints while constantly analyzing data to verify that they remain compliant. If endpoints are found to be out of the parameters set, the configured policy executes, automatically remediating the issue and bringing the affected endpoints back into the compliance fold.

Automatically enforcing policies to maintain the compliance goals of your organization, industry and/or region has never been this easy.

Curate auditing data

Preparation is one of the keys to success by making the incident response workflow more comprehensive. This allows security teams to investigate the full picture of an incident with logs that have been stored centrally and have not been manipulated by a malicious actor.

An effective process removes the obstacles by developing a workflow for IT and Security teams to follow when investigating. After all, each minute spent on tasks other than the investigation itself is precious time that a threat or bad actor could use to further compromise devices or make further inroads into breaching your data.

Did you know that Jamf Protect has a built-in component, named Jamf Protect High Compliance that combines compliance and audit data captured with analysis tools to minimize non-compliance? Yes indeed! By integrating audit data and app integration, Jamf helps organizations take their compliance auditing to the next level. When further enhanced with powerful API access, the unprecedented level of integration and management fuse with endpoint security to further bolster the protection of your Macs.

EDR/XDR Integration

As mentioned previously, organizations have different needs, There is no “one size fits all” solution that addresses the needs of each straightaway, so it’s understandable that you might use other Endpoint Detection and Remediation/Extended Detection and Remediation tools, even just a SIEM for the centralized gathering of logging data for holistic visibility.

Bearing this in mind, Jamf provides the most comprehensive endpoint telemetry available on macOS. Bar none. This ensures you’ve got the richest, most complete data flowing into your single pane of glass. By actively monitoring endpoints and updating device health data, administrators are in the best position to know what each endpoint is doing (as well as what’s being done to them), in order to develop the best possible strategies to keep your endpoints secure.

Armed with actionable data at the ready, administrators can proactively assess the device security posture, maintaining devices, users and organizational data secure against any threats or bad actors that may probe for vulnerabilities or find attack vectors to exploit.

Key Takeaways:

  • Gain deep visibility into endpoint health data across your entire Mac fleet
  • Make telemetry data actionable through effective management of risk
  • Know the status of your endpoints and verify their compliance levels at all times
  • Leverage rich telemetry data against threat defense and prevention, while maintaining compliance
  • Behavioral analytics find known and unknown threats while permitting organizations to customize analytics to adapt to their unique needs
  • Extend capabilities, functionality, features and protections by securely sharing endpoint health data through Jamf’s RISK API with first- and third-party solutions
  • Obtain deep insight into Apple-native security tooling with support of Apple’s Endpoint Security API
  • Real-time alerting notifies administrators of risks and threats targeting your Mac
  • Align endpoint security with secure baselines from CIS, NIST, DISA STIG and mSCP to assess and maintain compliance security right out-of-the-box
  • Curate auditing data to meet your needs and aid in threat-hunting processes and incident response workflows with your existing EDR/XDR solutions

Don’t think your endpoints might be protected – know and verify their status at all times

while keeping Mac compliant and performing optimally across your entire fleet.

Request Trial

A holistic approach to security: Content Filtering and Safe Internet

Share me

A holistic approach to security: Content Filtering and Safe Internet

Are your users safe on the internet? Whether working on important job-related tasks or taking part in a collaborative team learning effort – online access to critical resources is at the heart of productivity. Counting on websites or ISPs to “police”their own content or filter out the unwanted bad stuff isn’t the answer. Learn about how Jamf content filtering and network threat prevention solutions contribute to a safe internet for all stakeholders.

Author: Jamf

Date: 25 November 2022

When thinking about the security of your endpoints, it’s easy to focus on the threats themselves and the solutions that directly identify, prevent and mitigate them, like endpoint security solutions and Zero Trust paradigms.

You’d be forgiven for overlooking the delivery mechanism for a large majority of threats and attacks – the internet. More specifically, how always-on access and the reliance on it to power our professional, as well as personal tasks, is both a blessing and sometimes, a curse.

Let me explain.

The former’s obvious. Unlimited access to data at your fingertips, at any time and from anywhere. Great, right?! The latter however isn’t so hot for us because that door effectively swings both ways and allows bad actors unlimited access to your data at any time from anywhere. Hence the criticality that a comprehensive endpoint security solution is made up of multiple layers of protective solutions as part of a defense-in-depth strategy offers holistic protection for your devices, users and sensitive data.

An integral part of this strategy is content filtering and combining it with:

  • Powerful controls to thwart in-network threats
  • Prevention of zero-day phishing attacks
  • Minimizing risk and liability from inappropriate content
  • Upholding end-user privacy
  • Alignment with and enforcement of compliance with organizational policies

Why content filtering is necessary

Content filtering sometimes gets a bad rap from those that view this service as “spying” on your users. Unfortunately, this was sometimes the case in the early days of the technology being introduced. While the intent always rests on the organization deploying content filtering, luckily, the technology has evolved well beyond this into a concise, efficient solution that is deployed to mitigate threats and minimize risks introduced across the modern threat landscape.

We’ll go into greater detail about how it safeguards endpoints against bad actors and network-based attacks just a bit later. For now, suffice it to say that content filtering is just one feature of securing internet access, with network threat prevention and mobile threat defense serving as equally important solutions to endpoint security.

Navigating the information highway safely

Imagine if you will, safe, private connections everywhere students learn and employees work. No, it’s not a pipedream but rather the security challenge that solutions like Jamf Safe Internet and Jamf Data Policy resolve for a variety of industries, like education (former) and commercial organizations (latter).

Not only does privacy-focused content filtering control what content is accessed on managed devices, but the cloud-based controls extend protection across many device types and support modern operating systems, like macOS, iOS-based, Android and Windows.

Furthermore, Jamf’s content filtering and network threat protection engine deliver powerful security that is seamless to the user and simple to deploy for IT and Security admins with pre-defined safety, blocking and bandwidth restriction rule sets.

Looking for a bit of hands-on capability? Jamf solutions offer unprecedented levels of flexibility, allowing you to customize existing rules or create the level of content control that fits each class, based on your risk appetite.

All while empowering IT and Security teams with visibility into understanding the effects of your work through granular reporting that serves to inform, adjust and tune proactive measures iteratively.

No download for you

Whether it’s intentional or simply just bad luck – it’s inevitable that end users will come across inappropriate content at one time or another. Limiting access to inappropriate content:

  • Minimizes risk from malware, risky apps and suspicious files
  • Reduces liabilities stemming from accessing inappropriate content
  • Mitigates zero-day phishing attacks and prevents access to malicious URLs
  • Allows users to focus on productivity while keeping them safe online

Private eyes…are (not) watching you

Jamf’s solutions watch for malicious traffic and prevent accessing URLs that are questionable at best or outright linked to bad actors at worst. We uphold user privacy and sensitive data being submitted via company-owned devices by never inspecting your personal data.

Not only that, but our filters extend beyond domains, such as helping to hide explicit content from Google Search results and hiding mature content on YouTube, including embedded videos and viewing comments, as well.

The enforcer

In a perfect world, you would simply request end-users abide by the organization’s Acceptable Use Policy (AUP). Unfortunately, the modern threat landscape is such that risk associated with accessing online resources is ever present whether users are following AUPs or not. As such, policy-based enforcement aligns content filtering and network threat prevention practices to organizational policies and/or regulatory compliance requirements, ensuring that risky behaviors, actions, downloads and web-based content are disallowed on company-owned devices.

In addition, policies can be configured to:

  • Customize context-aware management for different device types and supported OS’
  • Eliminate shadow IT to prevent the use of unauthorized tools and minimize data leakage
  • Aid organizations in complying with the regulatory requirements of their industry

Full house

Keep track of it all and never miss a beat with device usage statistics and seamless integration with your existing first- and third-party tools. Seamless integration with solutions like Jamf Pro and Jamf School for enterprise and educationally focused mobile device management respectively, facilitate simple, yet intuitive synching between solutions.

Unlock deep visibility into network-based threats impacting your endpoints while using the insight to develop granular workflows specifically tailored to meet the needs of your users. Merging internet safety solutions with a platform you already trust – right out of the box!

Key Takeaways:

  • “Prevention over inspection” approach upholds user privacy without compromising safety on the internet
  • Give students and users the freedom to learn and work anytime, anywhere
  • Intelligent rule sets ensure that only acceptable websites are accessible
  • Reduce legal exposure from access to inappropriate content
  • Maximize user productivity stemming from non-compliant use of online resources
  • Limit the risk of data leakage or exposure from shadow IT and unauthorized app/service usage
  • Context-aware management adapts policies to different groups of users and devices, extending protections across your entire fleet
  • Customize content filtering and network threat protections to meet the unique needs of your organization – including devices, users and data security requirements
  • Support for any modern device and ownership level – iOS, iPadOS, Android and Windows
  • Minimal resource utilization + same-day support = low impact on the user experience

Choosing between user safety on the internet or keeping confidential data protected isn’t much of a choice.

Get both! (and a whole lot more) when choosing Jamf, the comprehensive endpoint security solution that provides defense-in-depth protection for your entire fleet.

Request Trial

Introducing Jamf How-to Video Shorts

Share me

Introducing Jamf How-to Video Shorts

Check out Jamf how-to video shorts for no-nonsense training and support tutorials from your Jamf Customer Success team.

Author: Jamf

Date: 22 November 2022

It’s another chaotic day managing the queue of help desk tickets, ensuring users have the apps they need to stay productive, and triaging hardware. You’ve just received a notification that your Apple Push Notification service (APNs) certificate is due to expire in a week. It’s been nearly a year since it was renewed, and the process to do so is a little foggy, but you know it’s important that devices maintain communication with Jamf; allowing this certificate to expire could compromise everything with your devices.

At Jamf, we appreciate the value of providing context and the ‘why’ around technology. Why is APNs so important? Why should we enforce secure passcodes? Why worry about chains of trust? For many of our users, these questions have been asked and answered, and that’s why we’re releasing Jamf Shorts, or Jorts. Jorts are succinct videos that bypass the ‘why’ and jump right into the ‘how’.

What are Jamf Shorts good for?

We’ve designed Jorts to demonstrate common tasks, relieve pain points, and move on with your day. Need to renew that APNs certificate? See our ‘How to Renew a Push Certificate in Jamf Pro’ video for a no-nonsense tutorial on how to do just that. In minutes, you can be confident the above scenario will be resolved and you can safely point your IT extinguisher toward the next fire.

Jamf Shorts are a new addition to our Jamf Training and Support YouTube channel, and we’re thrilled to provide tutorials that are to-the-point and can save you some searching. This quarter, we’re committed to providing token and certificate renewal videos to help you keep services active with Jamf ProJamf Now, and Jamf School. In 2023, you can expect regular releases on our YouTube channel for common workflows and troubleshooting.

Ready to watch?

Check out the Jamf Training and Support channel on YouTube and subscribe.

Watch Videos

A holistic approach to security: Self Service

Share me

A holistic approach to security: Self Service

You may think of Jamf’s Self Service offering as a convenience, and perhaps an inventory-management and cost-savings tool. And you’d be right. But it’s also a powerful security tool in guarding against third-party app breaches.

Author: Jamf

Date: 22 November 2022

What is Self Service?

Self Service from Jamf is a curated app catalog— a powerful way to manage and secure third-party apps. It’s also a way to empower and equip employees on the spot with the productivity tools they need.

Self Service is obviously a great tool for saving end-users waiting time, and for saving IT time they could be focusing on other work rather than installing applications.

But it’s a lot more than that.

Self Service as security tool

There are many ways that an organization’s network and data can be compromised; one of the most risky is third parties. According to a September 2022 study by the Ponemon Institute, 59 percent of respondents reported third-party vendors have caused a data breach at their companies.

It’s easy to see how this can happen; without automated device management, even conscientious IT staff choosing well-known and trustworthy apps can lose track of who has what apps and what state they are in. And if IT gives employees free rein, it’s easy for staff to download apps from unsafe sources, leaving them (and, subsequently, your network) open to phishing attacks— as well as their devices open to malware.

Even if employees are carefully trained to avoid dangerous domains and untrustworthy sources, if IT doesn’t know an app is on a device, they can’t ensure it’s the most recent version or that it’s received important security patches in a timely fashion.

This leaves organizations open to attack, and businesses can’t afford to ignore this risk.

Okay, then— why not shut down all outside apps?

For the vast majority of companies, this won’t work. Re-creating common productivity apps like email, word processing and spreadsheet software simply is not feasible. And without industry-specific apps such as Adobe Suite for designers, Atom or Notepad++ for developers, or Salesforce for marketers— you won’t get much done.

How about just shutting down most apps?

Or, perhaps just shutting down apps that allow certain activities that might feel risky such as messaging or filesharing?

Well, as Jamf CEO Dean Hagen says, “People will find a way to be productive.”

Most employees want to do a good job, and they want to get things done in an efficient manner. If your organization shuts down any way for employees to communicate in real-time from varying locations, or to quickly share files when working on projects together, employees will figure out a way. This often means that they disable security protocols that they see as getting in the way of their ability to work or that they use unsecured personal devices.

How does Self Service help secure devices and data?

When employees have access to fully-vetted and approved applications on demand, they are far more likely to download these apps for their work than similar ones that are possibly unsafe.

This means Apple administrators know which machines have what apps on them, and they can ensure that all apps are automatically patched and updated.

And employees can rest easy knowing that anything they download from Self Service has not only been fully vetted, but also continually and automatically monitored.

Self Service also allows IT to have more control over who uses which apps, which can help to protect devices and data along with permissions levels. Using Smart Groups, Apple admins can:

  • Personalize app access by department, language, user role or location
  • Integrate with directory services and cloud identity
  • Allow for requests for apps that aren’t currently available

Employees receive real-time notifications for security enhancements and app updates, as well.

Self Service ensures that your organization has control over third-party apps and the potential risks that might arise. It also provides employees with flexibility, choice and a good user experience— without slowing them down or holding them back.

Learn how Self Service can keep your employees safe and productive.

Request Trial

Adopt macOS Erase All Content and Settings for fast and secure redeployment

Share me

Adopt macOS Erase All Content and Settings for fast and secure redeployment

macOS Monterey brought us the ability to only remove user data instead of the OS when wiping Macs. With the release of Ventura, it’s time to make this standard practice: read this blog to learn how.

Jamf Blog has maintained a series of posts for the past few years titled “Reinstall a clean macOS with one button”. The idea for reinstalling a clean operating system was born out of an axiom administrators have followed which is to always erase and reinstall computer drives before repurposing them, preparing to retire them, or when troubleshooting has failed.

Apple is practically eliminating this need to erase and reinstall everything and replacing it with just needing to erase the data — leaving the operating system behind. If that makes administrators or security professionals a little queasy, that’s understandable. They’ve been following this erase/reinstall practice since the computer started taking a permanent place on the desktop in the 1990s.

However, “because that’s the way it’s always been done” isn’t a reason to avoid this new feature that only came to macOS last year with Monterey. Let’s review:

  • How Erase All Content and Settings works
  • The road to Erase All Content and Settings on macOS
  • The security of Erase All Content and Settings
  • Running Erase All Content and Settings
  • When we may still need to completely erase and install

Our goal should be to move the practice of erasing the entire Mac disk to its own little isolated island in the middle of the Dead Sea.

How Erase All Content and Settings works

For more than a dozen years — at least since the iPhone 3 — iOS has supported Erase All Content and Settings. Apple designed this feature from the ground up to be a secure method for resetting an iPhone without having to reinstall iOS. Remember, the iPhone was a consumer product first, and Apple needed to make this process consumer friendly.

They did two things.

First, the data storage on iPhone has always been encrypted. Adding a PIN code gave the consumer a means to decrypt the device for use and a way to protect their data when not in use. But Apple never gave the consumer direct access to the iOS operating system itself. It couldn’t be altered.

Next, the iPhone storage was partitioned into a read-only operating system partition and a writeable data partition. The operating system partition only changed when applying an update. It remained read-only and unchangeable during normal use.

When the consumer was ready to sell their iPhone or maybe hand it over to a family member to use, the Erase All Content and Settings feature simply deleted the encryption key to the data partition and left the operating system partition alone. The benefit was speed and convenience. The operating system was always there and didn’t need reinstalling, and it was as up-to-date as the last update applied.

Diagram showing how Erase All Content and Settings preserves the operating system while making customer data unusable and over-writable

The road to Erase All Content and Settings on macOS

The Mac, though, didn’t have this speedy and convenient option until very recently. That’s because it had to go through a series of major changes over time to match the level of security built into iOS from the start.

The line where the transition began is blurry, but a good place to start is with OS X El Capitan 10.11, which is when Apple introduced System Integrity Protection (SIP). SIP was the beginning of protecting the Mac operating system from external threats like malware, or even administrators, by removing their ability to modify it directly. Doing so required them to now boot to the Recovery HD to disable SIP first. And this could only be done by a human sitting in front of the computer.

Over the next several major releases, more and more of the operating system fell under SIP. To further increase security, Apple introduced its Apple File System (APFS) with macOS High Sierra 10.13, setting the stage for some major under-the-hood changes with how it could handle data on the drive. And it tied the operating system to specific hardware models by requiring firmware. That installation process required an Internet connection to download the machine-specific firmware version.

Apple introduced another new security feature starting in 2017 that was specific to the hardware not the operating system — the T2 security chip. This chip along with the Apple Silicon chip introduced in late 2020 became important for securing macOS installs. Just like iOS devices were encrypted out-of-the-box, these chips enabled Mac disks to be encrypted out-of-the-box.

In March 2018, Apple introduced the startosinstall command in its macOS High Sierra 10.13.4 installer. It included an --eraseinstall option for completely erasing the operating system on a disk (plus its user data ) and then installing a clean macOS. Because startosinstall was a command line tool, it was easy to remotely invoke on Macs. No longer did a technician need to sit in front of the computer and boot it to an external drive to prepare it for something else.

MacOS Catalina 10.15 started the process of dividing the computer’s disk into the read-only operating system and writeable user data partition. This was the first obvious sign that Erase All Content and Settings was coming. It also laid the groundwork for macOS Big Sur 11.0 to introduce signing for the system volume, which goes through a rigorous checksum validation process at both installation and each boot to ensure its integrity.

Finally, when all the pieces were in place, macOS Monterey introduced Erase All Content and Settings to the Mac. The new process was a speedy 4-5 minutes compared to using the startosinstall command with the --eraseinstall option, which could take 20 minutes on a fast Mac or longer depending on the model.

Timeline of macOS operating systems

The security of Erase All Content and Settings

A local computer admin can invoke Erase All Content and Settings. It does several things:

  • Signs the end user out of all Apple services, such as iCloud
  • Removes fingerprints from Touch ID
  • Unpairs Bluetooth accessories
  • Turns off Find My Mac and Activation Lock
  • Erases apps, data, and user settings
  • Erases all other volumes including system volumes using BOOTCAMP

Similarly, sending the EraseDevice command from a Mobile Device Management (MDM) server like Jamf Now, Jamf Pro or Jamf School, will invoke Erase All Content and Settings on macOS Monterey and Ventura computers instead of wiping the entire drive.

The first thing Erase All Content and Settings will do is verify the operating system hasn’t been modified or corrupted. How does it know?

This is where the T2 or Apple Silicon chip becomes important. Each chip contains an area called the Secure Enclave. The Secure Enclave stores a cryptographic key that’s specific to each Mac. That cryptographic key is what allows the computer to unlock the signed system volume. (Remember, the system volume is encrypted out-of-the-box.)

If the cryptographic key doesn’t match the signed system volume, Erase All Content and Settings will display an alert indicating the macOS needs reinstalling. It won’t allow a modified or “corrupt” macOS system to remain on the computer. And the only way to get a new operating system is from Apple.

But what stops an admin from installing their own modified operating system? It’s still possible, but only when the security of the Mac has been lowered from Full Security to Permissive Security (Apple Silicon) or No Security (Intel). This type of security is intended for developers who need to test low-level software.

Erase All Content and Settings then does one more very important task. If the security level of a Mac was lowered from Full Security to a lower security setting, it’ll reset the level to Full Security, restoring all the security mechanisms from the Secure Enclave and the cryptographically signed system volume.

To verify the security level of any Intel or Apple Silicon Mac using Jamf Pro, navigate to the computer record and select Inventory > Security. Alternatively, create an advanced computer search or smart computer group with the Secure Boot Level criterion to create a list.

Dashboard stating the security level of your Mac on Jamf Pro

Just know that even if Jamf Pro reports reduced security, simply running Erase All Content and Settings or the EraseDevice command successfully will restore the Mac to its most secure settings prior to preparing it for another purpose.

Running Erase All Content and Settings

An end user can run Erase All Content and Settings directly from the computer itself or an MDM administrator can send the EraseDevice command to one or more computers. Both have the same requirements:

  • Intel computers must have a T2 security chip
  • All Apple Silicon computers support Erase All Content and Settings
  • The computer must be running macOS Monterey 12.0 or newer
  • If running the command from the computer itself, the current login account must be an admin and have the necessary credentials to sign out of iCloud

To run the command on macOS Ventura, open System Settings (formerly System Preferences) > General > Transfer or Reset and click Erase All Content and Settings. The Erase Assistant first prompts for administrator credentials to continue.

Erase all content and settings button in macOS Ventura

The Erase Assistant will then provide a summary of what’s about to happen.

macOS erase assistant window

If the computer is connected to iCloud, the administrator is prompted for the password of the account’s Apple ID.

macOS sign out window

After authenticating, the end user is given one last warning that all data, settings, and apps will be erased and that it cannot be undone.

Final warning window before erasing all content and settings from macOS

The computer will restart temporarily into the Recovery Assistant to Activate the Mac. It’ll restart again in about 60 seconds if the end user takes no action. Again, during this process, the Mac is using the cryptographic key stored in the Secure Enclave to verify the integrity of the installed macOS and, if necessary, returning its security level to Full Security.

If the end user sees “Hello” appear in multiple languages after about 4-5 minutes, the computer has effectively been restored to out-of-the-box settings with Full Security enabled. If instead they see a message that macOS must be reinstalled, the current system was found corrupt. They can proceed through the Recovery Assistant to download and install a pristine macOS system.

But what happens if an MDM administrator sends an EraseDevice command while the computer is signed in with an iCloud account?

First, to send the EraseDevice command to just one computer from Jamf Pro, navigate to the computer record and click Management > Management Commands > Wipe Computer. If the computer supports Erase All Content and Settings (see the criteria listed earlier), it’ll proceed with erasing just user data and settings. But be careful. The same button will erase everything (operating system, user data and settings) on computers that don’t support Erase All Content and Settings.

Wipe Computer command in Jamf Pro

Sending the command may require two things: enabling the Clear Activation Lock instruction and providing a Remote Wipe Passcode.

Clearing Activation Lock effectively disconnects the computer from an iCloud account and providing a Remote Wipe Passcode is only effective if the computer has Remote Lock enabled. If Remote Lock isn’t enabled, any arbitrary six-digit number will work. After clicking Wipe Computer, the administrator must confirm one more time they wish to proceed.

Jamf Pro dialog box for removing activation lock from macOS

Note that if a computer isn’t connected to iCloud, or it was enrolled using a Jamf Pro PreStage Enrollment that prevented Activation Lock, then the option to disable Activation Lock doesn’t apply. The administrator may receive a message that Activation Lock couldn’t be cleared. They can just proceed anyway by clicking OK.

Message box reading Activation lock could not be cleared. 404-device not found or activation lock bypass is invalid. Click OK to wipe the computer without clearing Activation Lock.

Sending the EraseDevice command to multiple computers is only possible today using the Jamf Pro Classic API. It’s not supported using the Action button at the bottom of an advanced computer search or smart computer group. It’s also not supported yet using the newer Jamf Pro API.

The basic script syntax for sending the EraseDevice command to a computer using the Classic API looks something like:

/usr/bin/curl \
--header "Authorization: Bearer tokenStringHere \
--header "Content-Type: text/xml" \
--request POST \
--silent \
--url "https://talkingmoose.jamfcloud.com/JSSResource/computercommands/command/EraseDevice/passcode/123456/id/1,5,18,24"

The “123456” string in the last line represents the six-digit passcode required to remove the computer from Device Lock and the “1,5,18,24” string represents a list of computers by their Jamf IDs. The Classic API only supports identifying computers by their IDs.

For a more complete script, see this GitHub gist.

Using the Classic API to send the EraseDevice command to multiple Macs is especially beneficial to administrators of school lab Macs that need refreshing between quarters or semesters. This along with the PreStage Enrollment option to automatically advance through the Setup Assistant has the potential to make the entire refresh hands-free.

When we may still need to completely erase and install

Is the startosinstall command with the --eraseinstall option dead?

Not quite yet. The two macOS systems that support Erase All Content and Settings, Monterey and Ventura, still run on a handful of older computer models that don’t have T2 security chips. Until Apple ships an operating system that only runs on computers with T2 or Apple Silicon chips, the startosinstall command still has its place in the administrator’s toolbox.

We can foresee a time a few years from now when Apple releases a macOS version that requires a Secure Enclave. Like iOS and iPadOS today, the need to reinstall a clean macOS will likely be limited to certain developers who work at low levels of the operating system between the kernel and the hardware. The average and not-so-average device administrator will likely never work at that level.

Then what? Erase All Content and Settings is just one feature in a long journey of Apple development that will likely drive both macOS and iOS closer and closer until one day there’s just one OS for all devices. It’s a slow process, but it’s also easy to see Apple has been aggressive in making it happen.

For now, take away that Erase All Content and Settings is the replacement for startosinstall. And it’s a secure method for deleting user data as well as restoring a computer to out-of-the-box settings.

Let Jamf Pro streamline your redeployment process.

Request Trial

Using Microsoft, Google and other identity providers with Jamf School

Using Microsoft, Google and other identity providers with Jamf School

From the Bett 2022 conference in London, Anthony Darlow delivers a presentation explaining how to work with your identity provider of school to import, authenticate and sychronize user and device data to Jamf School

“Microsoft, Google & Co: making the most of your identity provider” from the Bett 2022 conference in London tackles the issue of getting Jamf School to work optimally with your identity provider of choice, such as Google or Microsoft Azure. Identity impacts various actions that you can perform within Jamf School, including enrolling devices, assigning users and creating Smart Groups and classes. But there can be challenges that arise from having to authenticate and synchronize data that has been imported from multiple sources – CSV files, Apple School Manager and an LDAP server, for instance.

In this talk, Jamf education consulting engineer Anthony Darlow explains how to create configurations to get a single directory of identities ready for use in zero-touch deployments, device management and classroom tools such as Apple Classroom and Jamf Teacher.

Import, authenticate, synchronize

One use case that Darlow addresses is when a school has a fleet of both 1:1 and shared devices. The 1:1 devices are paired to user data stored in an LDAP server, but it makes the most sense to import the shared devices directly into Jamf School. By taking advantage of Apple School Manager and its federated authentication functionality with Microsoft Azure, you can create a configuration that authenticates, synchronizes and matches all identities imported from various sources.

Darlow walks viewers through several configuration approaches, noting their advantages and shortcomings based on what a given school needs. He outlines some alternatives for viewers who may have different needs; for example, you can bypass the LDAP server entirely if you would rather feed identities directly into Jamf School via its built-in Import functionality. The talk culminates with a configuration that performs the following functions in order:

  1. Synchronizes with an LDAP server to import users and groups
  2. Imports additional users and groups from CSV files
  3. Syncs with Apple School Manager (using federated authentication with Microsoft Azure) and matches with the users imported from LDAP
  4. Creates device Smart Groups for use in automation scripting or zero-touch workflows
  5. Authenticates all identities using Microsoft Azure

It can be a headache to make sure that all your identity data is properly combined and ready to use when it originates from different sources. This talk can help you to understand how to best work with your identity provider and optimize the power of its relationship with Jamf School.

Read more BETT Apple at School content:


A holistic approach to security: Identity and Access Management

Share me

A holistic approach to security: Identity and Access Management

Identity and Access Management (IAM) extends far beyond the simple notion of authenticating users. While that is certainly a central point, modern work environments require changes to IT infrastructure for users to remain safe while being productive from any device, over any network while physically being anywhere. That’s where the modernized IAM workflows coupled with first- and third-party integrations are critical to extending access through greater flexibility while enhancing security for all stakeholders.

Author: Jamf
Date: 17 November 2022

When you think of identity and access, usually, the first example that pops into many an IT admin’s minds is authentication. Digging a little deeper down the rabbit hole, we come to provisioning user accounts. This leads us to the ever-present 800lbs gorilla in the room – passwords.

It’s a simple workflow and one that has served as the cornerstone of securing access to resources from unauthorized users. A combination of eight to twelve characters and numbers – maybe a few more if your organization wants to make the password a bit tougher to crack – is all that stands between a bad actor and critical organizational data or sensitive personal and user privacy data.

But…is that enough? Before you answer that, ponder the following statistic and continue to read on why exactly IAM matters when establishing identity and access workflows within your organization.

“One-third (29%) of organizations had at least one user fall for a phishing attack in 2021.” – Jamf Threat Labs

Why IAM matters

Effectively protecting resources from the modern-day threat landscape means more than just a strong password. While that’s still important no doubt, as the statistic above points out nearly a third of organizations will experience at least one authorized user falling victim to a phishing attack. This means that regardless of the relative strength of the affected user’s password or which password policies are implemented to limit password weakness – neither of these practices will do anything to prevent unauthorized access if the user simply hands over their credentials.

To address this in addition to other security challenges affecting access management and user authentication, IAM solutions must work with security. After all, it makes sense that management and security workflows – both working toward keeping organizational resources secured – should draft off the same infrastructure, doesn’t it?

Jamf Connect is a perfect example of how this interconnectivity between IAM and security works to not only secure authentication, but also continually access resources securely by ensuring that workflows are consistent and in alignment with everything else a user interacts with, regardless of the device.

Modern authentication

Identity is firmly engrained in securing everything from devices and user accounts to organizational resources, it is already something organizations are investing in and relying upon to drive the employee experience. By pairing this with cloud identity providers, such as Google, Microsoft and Okta, alongside many others, IT can enable zero-touch deployment and streamline account provisioning based on user cloud identity attributes and management that extend far beyond the physical walls of the office.

This not only ensures that a user-friendly IAM solution authenticates corporate apps on all devices, including mobile, but extends to all organizational resources – on-premises and cloud-based – securely managing access regardless of device type, ownership level or where the user may be working from.

Policy enforcement

Access policies built-in to IAM solutions help fortify security in a number of ways. One such way is by incorporating policy-based device risk assessments, IT and Security teams ensure that the device’s risk posture is considered. Let’s revisit the example above where a user’s password was provided to a bad actor during a phishing attack. A policy that is tied to conditional access, by integrating with Microsoft or Google, would result in a workflow that automatically limits user access permissions tied to the compromised credentials, effectively restricting access to organizational resources.

Another example leverages Zero Trust Network Access or ZTNA which we’ll cover a bit later. By utilizing ZTNA – a central component of Jamf Private Access – an authorized user is required to allow access to critical business apps. Additionally, an authorized device policy restricts access only to devices in your fleet that are allowed by IT and Security teams.

Modern threat landscape

Just as the modern computing landscape has vastly changed work environments through the adoption of mobile devices and organizations migrating to remote/hybrid work environments, the modern threat landscape has evolved much to our chagrin, challenging bad actors to develop clever, yet novel ways to continue targeting your devices and users in their quest to obtain organizational data.

Effective IAM solutions require adaptive and flexible security controls that extend far beyond the office’s network perimeter. One such practice continuously evaluates a device’s risk posture as we mentioned previously but continues to do so throughout the duration of the session. After all, making sure a device isn’t compromised before permitting access is one thing, but what happens if drops out of compliance during the session? The end result would still be the same – unauthorized access.

To mitigate this risk, continuous risk assessment through ZTNA or conditional access leverage context-aware policies that grant or deny access to sensitive data, apps and resources while the cloud-based nature offers IT effective, scalable network protections to meet the demands of their unique needs. All without needing to manage security appliances, complex software configurations or expensive support contracts.

More than just connecting users to resources

We keep stressing the word modern because it’s important to discern from merely providing an authentication mechanism and the myriad protections afforded beyond authentications that are provided by a true identity and access management solution.

Think of IAM as a puzzle piece. While it is a solution in its own right, capable of operating independently, it’s far more potent when paired with other solutions as part of a larger defense-in-depth strategy. Not unlike the puzzle piece that is an image unto itself, the entire picture isn’t revealed unless all the pieces fall into the correct placement.

Some of the security benefits are inherent while others are made possible by integrating with first- and third-party solutions, such as:

One password to rule them all

Unifying identity management across all enterprise apps and organizational resources is something we touched upon earlier. Standardizing protections across your entire infrastructure, particularly the various managed and unmanaged devices that access it made possible by enabling Single Sign-On (SSO). Not only does this streamline access management for IT, but the simplified workflow sees users needing to remember only one password – not juggling multiple credentials that may (or may not) be out of compliance with company policies.

Furthermore, SSO eases the burden of managing multiple services, each with its own set of credentials by synchronizing passwords between corporate resources and your Mac endpoints in the background, delivering IdP that works for all stakeholders.

Two’s better than one

Passwords are a mixed bag when it comes to security. While it is an accepted aspect of securing access to resources, it isn’t without its headaches – both from an administrator’s perspective and the user’s. Add to that what we stated previously about password security and how, despite best efforts, a phishing attack can rather easily side-step all but the strongest of controls and we find ourselves wishing for something better, and more effective when protecting resources.

Multi-Factor Authentication (MFA) provides just that by requiring users to attest that they are whom they claim to be using a combination of factors:

  • Something you know
  • Something you have
  • Something you are

Enabling this functionality within Jamf Connect and your IDP ensures that it’s the right user on the right device requesting access to organizational resources, minimizing the risk of sensitive data getting into the wrong hands.

Never trust – always verify

We mentioned ZTNA earlier and in this section, we’re going to discuss a few of the benefits to security that organizations can gain by extending IAM with ZTNA.

First, microtunnels. The concept of tunneling data is not new in the security world. VPN has been doing so for decades, after all. But remember, we’re discussing modern solutions – not legacy ones – and legacy VPN certainly has several security challenges that only ZTNA can and does resolvewhen set against the backdrop of the modern threat landscape.

Microtunnels are one of these solutions, with each protected resource requiring its own unique microtunnel when users request access. Instead of granting access to the entire network like legacy VPNs, ZTNA utilizes independent microtunnels to secure access to each resource. This is done to ensure traffic is segmented from one another to prevent lateral network attacks, but also ensures that if an app becomes compromised, access need only be denied to the affected app – leaving users to remain productive on unaffected apps/resources while IT resolves the issue.

Another challenge ZTNA addresses are network bandwidth utilization issues since it operates each microtunnel on-device and in-network without requiring traffic to be backhauled through VPN hardware. An additional benefit to performing so efficiently is the use of split-tunneling technology that automatically identifies business traffic, securing it through a microtunnel while non-business traffic is routed directly to the internet —both preserving user privacy and securing organizational data without compromising either.

The best of all worlds

Expanding capabilities to take advantage of first- and third-party solutions is a powerful ability in a modern IAM. One that should not be overlooked when considering that security, much like technology evolves at such an incredible pace. Perhaps in the past, your organization only required an on-premises IdP and MDM solution to holistically manage your Apple fleet. But today, the organization relies on its employees working remotely and as such, today’s needs require cloud-based IdP, MFA and MDM solutions just to get the device and identity management portion of your infrastructure operating.

Fast forward and perhaps that requirement expands to include mobile threat defense and greater access management capability, such as ZTNA. A flexible IAM solution will make all the difference in the world when addressing the current and future needs of your organization.

Consider passwords once again. What if we told you there is a way to implement an MFA solution to provide an additional layer of security to access requests while eliminating passwords altogether? Is passwordless Mac authentication even possible or secure?

Yes, and absolutely yes! (Dare we say, even more secure.)

Enter Jamf Unlock, the passwordless workflow made possible when integrating Jamf Connect + Jamf Pro and an iOS-based device running version 14.0 or later. Because passwords themselves can create security holes, including those stemming from exposure due to data breaches, loss from phishing attacks or merely being too weak or easy to guess, a passwordless authentication workflow can bypass these security issues entirely. All while keeping your workforce secure and data protected while providing a seamless end-user experience.

Key Takeaways:

  • Identity and Access Management is a critical step to meet the needs of the modern “work anywhere” workplace
  • An integral component in an effective defense-in-depth strategy of layered security solutions that work together to mitigate threats
  • Enable zero-touch deployments and streamline account provisioning workflows leveraging cloud IdP
  • Policy-based IAM aligns account management with organizational policies, standardizing and extending them across all devices in the infrastructure
  • Enable simplified authentication workflows that leverage SSO and MFA to both enhance and secure the user experience
  • Expand capabilities by integrating with first- and third-party solutions to meet your needs today – while providing the foundation to meet future needs
  • Bypass password-based security issues entirely by seamlessly implementing a passwordless authentication workflow with Jamf Unlock

Are you still relying on strong and complex yet easily forgotten or lost passwords to keep organizational resources safe?

Get out of the past! Live in the passwordless future with a modern identity and access management solution.

Request Trial

ZecOps acquisition expands Jamf’s mobile security capabilities

Share me

ZecOps acquisition expands Jamf’s mobile security capabilities

What does Jamf’s purchase of ZecOps mean for Jamf solutions? And how can IT administrators take advantage of these advanced mobile security features?

Author: Jamf
Date: 17 November 2022

Jamf completed its acquisition of ZecOps, and many are wondering what this means for our solutions— and how to take advantage of these exciting new mobile detection and response features.

This acquisition helps IT and security teams strengthen their organization’s mobile security posture and accelerate mobile security investigations from weeks to minutes. It also uses known indicators of compromise (IOC) to detect intrusion attempts or other malicious activities at scale and helps identify sophisticated 0- or 1-click attacks on a much deeper level.

And this added security arsenal for any organization couldn’t have come at a better time. Mobile devices now account for 59% of global website traffic, and according to the 2022 Verizon Mobile Security Index, close to half (45%) of surveyed companies have suffered a compromise involving a mobile device in the past 12 months.

Jamf already offers robust management and mobile security capabilities for iOS devices. However, access to deeper insights into potential security exploits is technically challenging and requires physical access to the device— difficult in a remote work environment. The ZecOps acquisition will provide a deeper layer of insight and assurance for security-conscious customers who must protect company data as well as mobile users with access to sensitive information.

ZecOps will offer customers unprecedented detection capabilities to identify mobile exploits similar to the rich telemetry offered by Jamf Protect for Mac.

Test these iOS Security features for yourself.

Request Trial

A holistic approach to security: Endpoint Protection

Share me

A holistic approach to security: Endpoint Protection

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple endpoints and mobile devices. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple at work without compromising data security, user privacy or end-user productivity.

Author: Jamf
Date: 15 November 2022

Picture it: Earth, 1999. While its global citizens awaited the turn of a new century, there were many that were fearful of this new millennium. Scared that, at the stroke of midnight, society’s computing systems would break, fail, turn on humankind or worse, take over as our robot overlords.

Ok, maybe not that last part so much, but suffice it to say many were worried that the “Y2K bug” was going to be far worse than what actually occurred.

TL;DR the world ushered in the year 2000 while listening to Prince’s 1999 with nary a hiccup. The next business day, it was business as usual. IT admins and users updated the antivirus software on their computers and continued working like it was just another Monday morning. That was not only the extent of the infamous Y2K problem but the solution – patch your computers and keep your antivirus updated – was the endpoint security of the time.

A little over two decades later and the modern threat landscape has changed to meet the changes to modern computing. One that sees companies migrating to remote and hybrid work environments, adopting Apple in the enterprise and varying device ownership levels. All in service to permit users to work:

  • Where they feel most comfortable
  • On their preferred device
  • From anywhere and at any time

The days of merely installing antivirus on your computer are both wholly inadequate and asking for trouble, as threat actors have an entire arsenal at their disposal to compromise your fleet of devices, target all users and access critical or sensitive organizational data for their own nefarious purposes.

Protect against new and evolving threats

Alas, it’s a brave new world and that includes a whole slew of threats and attacks that impact the security of your endpoint– regardless of whether users are at the office or home, connected to any network, or on macOS, iOS, Android or Windows.

While malicious code is still very much a thing to be wary of. Here are some of the security challenges that have evolved that Jamf endpoint security solutions protect against in the modern threat landscape:

  • In-network attacks
    • Man in the Middle (MitM)
    • Zero-day phishing attacks
      • SMS
      • Email
      • Social media
      • Messaging
    • Lateral movement attacks
  • On-device attacks
    • Living off the land (LotL)
    • Malware
      • Spyware
      • Trojans
      • Ransomware
      • Cryptojacker
      • Potentially unwanted programs (PuP)
    • Unauthorized data exfiltration

And while some of these threats carry identifiable fingerprints that can tip IT and Security admins off to their whereabouts, an increasing number of bad actors are combining threats, employing the latest tactics to remain unknown, and therefore able to carry out attacks stealthily over time.

Jamf Threat Labs

You may be thinking, how can you possibly stop that which you cannot see? With Jamf Threat Labs, that’s how. Jamf’s team of cybersecurity experts and data scientists works tirelessly to assess macOS and iOS-based endpoints, performing threat hunting to successfully identify and prevent both novel and unknown threats from affecting your Apple fleet. Not only are they great at what they do, but their research feeds the threat intelligence engines that drive Jamf’s endpoint security solutions. By incorporating their findings, detecting unknown threats through advanced behavioral analytics and frequently updated YARA rules work in tandem to mitigate security threats that may be lurking within your fleet before they have a chance to escalate to something worse, like a data breach.

Monitor

In addition to the Jamf Threat Labs team constantly monitoring macOS and iOS-based operating systems across the expanding threat landscape to identify and thwart the latest threats facing organizations, Jamf’s endpoint security solutions actively surveil endpoints for known, unknown and suspected threats.

This minimizes risk from various Apple-focused and mobile device security threats while serving as one of the foundational components in the comprehensive, multi-prong endpoint security protections. Jamf solutions keep a watchful eye over your organizational devices and users by:

  • Consistently and actively monitoring endpoints 24/7/365
  • Gathering rich telemetry logging and reporting data
  • Providing insight into device health, aiding compliance auditing

Detect

Keeping vigil over endpoints is just one aspect of protection, the next is identifying threats. Whether known, unknown or suspected – IT and Security administrators will have visibility into device health, including real-time alerts that inform stakeholders of detected threats that affect their devices.

Further still, logging data is gathered for each endpoint, providing in-depth information about the security of your entire fleet. The rich telemetry data collected serves administrators well in not only identifying what risks impact their endpoints but also allows them to:

  • Perform threat hunting to identify potential threats
  • Leverage granular information to refine protections
  • Mitigate risky behaviors to mitigate potential attack vectors

Prevent

Every threat, like malware, is a potential risk to exposing user and/or company data, so it’s important that organizations choose an endpoint protection solution that specializes in detecting the unique and evolving threats that target users on Mac and mobile devices – inside and out.

The on-device and in-network protections provided by Jamf endpoint security solutions mean faster detection, notification and threat response to known and unknown threats thanks to our:

  • Advanced machine learning (ML) and threat intelligence engine – MI:RIAM
  • Customizable behavioral analytics mapped to the MITRE ATT&CK Framework
  • Data policy enforcement ensures data remains only on secured, compliant storage
  • Blocking of network threats, such as phishing, malicious downloads and command and control (C2) traffic, including risky domains

Remediate

Even with increased visibility and compliance, granular reporting, real-time alerts, advanced threat intelligence and protection against novel threats, the modern threat landscape evolves so frenetically that endpoints may be impacted or drop out of compliance. What then?

Once again, Jamf endpoint security solutions – with their multiple layers of protection – facilitate powerful remediation workflows to correct deviations from your OS hardening configurations, quickly bringing endpoints back into compliance.

Jamf solutions flexibly provision manual and automated incident response workflows, such as:

  • In-depth visibility into all macOS security tooling activity and system processes
  • Eradicating malicious, unwanted and potentially risky files, apps and downloads
  • Isolating devices found to be out of compliance or that pose a risk to data security
  • Aligning with CIS Benchmarks to develop, enforce and monitor secure device baselines

Multiple layers of security – one solution

Look at the fingers on your hand. They work independently to accomplish certain tasks, yet work in tandem when needed to perform larger-scale functions, do they not? A single, yet powerful security solution similarly relies on many individual layers that – while capable of performing independently in their own right – also work together to form a holistic, multithreaded net to monitor, detect, prevent and remediate against attacks from bad actors and the various security threats they employ to target your device, users and critical data.

Defense-in-depth

…loved by good, feared by evil.” – Voltron

In the show by the same name as the quote above, the first season saw a team of five pilots, each of whom commands a robot lion with unique strengths and abilities. In their quest to maintain peace and protect Earth from evil, the team of five would combine to form a larger, more powerful robot named Voltron, Defender of the Universe, to further aid them with their task.

Though it was a beloved cartoon from 1984, the premise of Voltron shares much with the strategy of defense-in-depth(DiD) to best secure assets, users and resources across the modern threat landscape. Specifically, the belief that a singular, “one size fits all” application will holistically keep organizations protected is a myth a best – and one that often leads to data breaches at worst.

The premise of DiD is simple, yet both efficient and effective. Layer security protections, just the layers of cake, so that they overlap their strengths while minimizing weakness, in the service of identifying, stopping and if it comes to it, remediating against a variety of security challenges that threaten the integrity of your endpoint, safety of your users and confidentiality of your data.

Simply put: should one layer fail, the next one exists to intercept it.

Integration

Jamf’s endpoint protection solutions, much like all of our solutions, are designed to work alongside numerous first- and third-party solutions to extend capabilities and establish features-rich workflows while ensuring data flows securely between solutions.

For example, Jamf Pro, our flagship mobile device management solution, is known for its seamless deployment and management capability. However, when integrated with Jamf Protect, not only is deploying endpoint security to your macOS devices possible with just a couple of clicks but secure endpoint health data is shared in real-time between both solutions.

What does this mean for your organization? We’ll tell you. Event information relating to incidents, such as phishing attacks and other network-based threats are automatically synced to inform the risk status of any individual device. This connection between management and security is critical to taking real-time action to protect your environment.

For example, organizations can leverage Smart Groups in Jamf Pro to dynamically update and respond when a device’s risk status changes in Jamf Protect. This trigger can automatically update a user’s access permissions via Jamf Pro’s conditional access integrations with Microsoft or Google’s solutions

Another example leverages the advanced reporting options found in Jamf endpoint security solutions to stream rich telemetry data to your preferred SIEM solution, like Azure Sentinel or Splunk, providing MacAdmins a single pane of glass view into the health of their Apple endpoints while further extending the capability to transform data using visualizations for added depth and granularity.

Purpose-built for Apple

Jamf’s purpose-built, Apple-first endpoint security solutions offer IT and Security teams several benefits that firmly establish its solutions as best-of-breed, for example:

  • Same-day support allows users to adopt the latest apple releases as soon as they’re available – upgrade on your schedule, not ours
  • Leverage Apple’s Endpoint Security API to embrace the latest security capabilities available within macOS
  • Low-performance impact means battery life isn’t affected, won’t slow down machines or get in the way of user productivity

Speaking of user productivity, being Apple-first (but not Apple-only) means Jamf designs and optimizes each of our endpoint security solutions to take advantage of the OS on which it operates on so that protecting your devices does not come at the expense of user experience nor compromise the user’s privacy.

Key takeaways

  • Protect endpoints from new and existing, known and unknown threats, risky apps and suspicious behaviors
  • Purpose-built for Apple to address the challenges of the modern threat landscape across macOS and iOS-based devices, but also designed and optimized for Android and Windows mobile devices
  • Stops threats that occur on-device, like malware while also preventing in-network attacks, like zero-day phishing and lateral movement
  • Supported by the Jamf Threat Labs team of cybersecurity experts and data scientists to research, identify and prevent novel threats
  • Advanced threat intelligence engine and machine learning (ML) aids in threat hunting to identify potential attacks before they can happen
  • Behavioral analytics mapped to MITRE ATT&CK Framework for powerful, customizable prevention of threats, tailored to the unique needs of your organization
  • Automated incident response and remediation workflows eradicate malicious, risky and unwanted files while isolating devices that pose a risk to data security
  • Develop, enforce and monitor secure device baselines aligned with CIS Benchmarks to drive compliance and aid in auditing compliance tasks
  • Defense-in-depth strategy layers multiple protections to monitor, identify, prevent and remediate a variety of security challenges – should one layer fail, the next one intercepts it
  • Extend services, features and capabilities by leveraging the Jamf Risk API, securely sharing pertinent device health data with first- and third-party solutions

Do you Trust Jamf to help you manage your Apple fleet effectively and efficiently?

Then you’ll Love the way Jamf endpoint protections keep your endpoints, users and data safe and secure!

Request Trial

Rapid security response

Rapid security response

The new macOS Ventura introduced Rapid Security Response as a method to keep devices patched—even without the latest OS.

What is Rapid Security Response?

Rapid Security Response aims to keep your devices more secure by providing software patches between standard OS updates. If enabled, these responses can happen automatically without requiring permission from the user, though responses that involved the operating system do require system restart and those relevant to Safari require the user to quit the application.

For personal devices, rapid security response can be enabled in System Settings > General > Automatic Updates. Users can remove responses if desired.

So how will Rapid Security Response work for supervised devices? There are a number of ways mobile device management (MDM) solutions can modify settings related to rapid security response:

  • The allowRapidSecurityResponseRemoval restriction key can block user removal of responses.
  • Setting CriticalUpdateInstall to true enables rapid security response in macOS.
  • Device Info and AvailableOSUpdate queries report the status of Rapid Security Response to your MDM.
  • The allowRapidSecurityResponseInstallation restriction key allows admins to disable Rapid Security Response, which is enabled by default.

Why are responses important?

A major update to a device’s OS can be disruptive to a user’s experience, leading to update delays. Responses occur between major updates and are based on the device’s minor OS version. These responses provide necessary patches to keep devices up to date and protected from security threats.

Keeping your devices updated with the latest patches is one of the most cost-effective ways to protect your devices. Rapid Security Response makes this simpler and less disruptive for both users and admins, making it easier to ensure vulnerabilities are patched and devices are secured.

Automate your security updates with Jamf Pro.

Request Trial