The Jamf 240 Course: Apple device management with Jamf School

K12 Education

Author: September 18, 2023 by John Greenash

Source: https://www.jamf.com/blog/jamf-240-course-introduction/

Jamf has a history of creating hands-on, practical training courses that date back to 2006. While historically focused on Jamf Pro — our flagship enterprise management tool — back in 2021 we introduced the Jamf 370 Course to the world, focusing on endpoint security with Jamf Protect. Since then, our products, certifications and tools to deliver training have continued to evolve, but the commitment to our customers’ success at managing and securing Apple devices in any environment hasn’t wavered. Enter the newest offering in the Jamf training portfolio — the Jamf 240 Course. This offering is solely dedicated to helping customers succeed with Jamf School, our education-focused management solution.

The Jamf 240 Course is a two-day remote instructor-led offering based on using Apple computers and devices in an education setting. It covers the following topics:

  • Introduction and configuration of Jamf School
  • Creating User Groups and Classes
  • Enrolling computers and mobile devices using Automated Device Enrollment
  • Organizing devices into groups and configuring Shared iPad
  • Managing devices with profiles and Quick Action Commands
  • Delivering apps and content to computers and mobile devices
  • Building and managing packages for deployment to computers
  • Creating incident types for internal device tracking
  • Configuring Jamf Teacher, Jamf Parent and Jamf Student

The course requires a basic understanding of macOS, iOS and iPadOS, and attendees should expect to finish the course with a broad understanding of Jamf School and a deeper understanding of Apple technologies used when managing devices.

As this is a 200-level course, there are no formal prerequisites for this offering. Furthermore, after attending the offering you will be ready to attempt the included certification exam. Upon passing the exam, you will receive Jamf Certified Tech for Jamf School certification.

Visit the Jamf 240 Course page to obtain more information on course requirements and a listing of what is included for each course attendee.

Finally, Jamf 240 Courses are now available for registration in a variety of time zones. Sign up today via Jamf Account!

We look forward to welcoming you to a class soon.

P.S. — If you want to learn about Jamf School, but cannot wait for a Jamf 240 Course — no problem, we have you covered! There are a number of self-paced modules in the Jamf Online Training Catalog to explore and some Jamf Shorts videos available too, both at no cost. Happy learning!

Get Certified!


StateRAMP for Jamf School and Jamf Pro

K12 Education

Author: September 12, 2023 by Mat Pullen

Source: https://www.jamf.com/blog/stateramp-cybersecurity-for-education-with-jamf/

What is StateRAMP?

StateRAMP was born in early 2020 from the clear need for a standardized approach to the cybersecurity risk management standards required by educational organizations and state and local governments. This critical cloud security assessment and authorization program is designed to ensure that products address the specific technology and compliance requirements of these public sector organizations.

With the increased focus on cybersecurity in the public sector, many education institutions and state and local governments are partnering with StateRAMP to streamline their cloud procurement processes.

What does this mean for education?

Cybersecurity in education is a large and ever-growing concern. Cybercriminals see education as a target due to the rapid deployment of devices over the last few years. With the fast pace of change, institutions need to trust that their cloud providers are appropriately managing their cybersecurity risk to protect their users and institutions. Learn more about Jamf’s commitment to education.

What has Jamf done to achieve this state?

In order to ensure our public sector customers are able to meet their various regulatory requirements, Jamf has gone through the rigorous process to achieve StateRAMP Ready status for Jamf School and Jamf Pro. Although this certification applies most specifically to public-sector customers in the US, this work helps Jamf to advance our overall security maturity and increase our safeguards— which benefits all Jamf School and Jamf Pro customers globally.

We will continue to move through the stages of StateRAMP in order to ensure our systems meet these standards to keep our customers compliant and, more importantly, to keep our customers safe.

For more details, read our press release.

See for yourself how Jamf can help with your institution’s StateRAMP requirements.


UNESCO report: has technology truly transformed education?

K12 Education

Author: September 7, 2023 by Mat Pullen

Source: https://www.jamf.com/blog/unesco-report-has-technology-truly-transformed-education/

Is technology meant to solve the most important challenges in education?

We would argue that it is not, and measuring the use of digital tech in schools through that lens will always make tech come up short. Digital tech can be a wonderful tool for solving important challenges and even transforming education based on educational models such as TEAL+ or Active Learning.

Has it transformed education? In some places, and with some models, it absolutely has. In others, it has helped them to implement their already-existing pedagogy and curricula in a more streamlined, user-friendly manner.

Let’s take their points and tackle each one, shall we?

Statement: evidence for tech improving education is thin.

“There is little robust evidence on digital technology’s added value in education,” says the report. “Technology evolves faster than it is possible to evaluate it: Education technology products change every 36 months, on average.”

Response: technology reviews can often focus on the wrong things.

In many cases, when an organization reviews technology’s impact on any field, it focuses on the technology and misses the people using the technology.

It is never easy to isolate the single cause of any intervention in a school; it can be an attitude change as much as the new tool or approach, and this is why technology impact surveys vary so much.

One thing that is clear is that educators’ knowledge, skills and confidence are key to any transformation. Technology can support outcomes in a number of factors, but will never be solely responsible for them.

In order for educational tools to support learning, those reviewing and using the tech should know:

  • How a specific technology can inspire educators and learners
  • How it can be used to reduce teacher and administrator workload
  • The potential of the tech for developing new assessment opportunities that enable student success

Statement: educational technology benefits only some.

“Technology offers an education lifeline for millions but excludes many more,” says UNESCO.

The report acknowledges that radio, television and mobile phones help to educate hard-to-reach populations. However, while also giving credit to distance learning that “stopped education from melting down during COVID-19 school closures,” it said that 31% of students worldwide and 72% of the poorest did not benefit from this technology.

The report also discussed how “The right to education is increasingly synonymous with the right to meaningful connectivity, yet access is unequal.” UNESCO pointed to the fact that globally, only 40% of primary, 50% of lower secondary and 65% of upper secondary schools are connected to the internet.

See how Jamf MATTER innovation hubs bring internet connections and cutting-edge learning models to countries with low connectivity. >>

UNESCO also acknowledged: “accessible technology and universal design have opened up opportunities for disabled learners.”

Response: accessible technology and universal design have opened up opportunities for everyone.

As is nearly always the case, meeting the needs of disabled students can open up access to everyone, especially in those schools focusing on Universal Design for Learning (UDL).

UDL is a change in approach that uses technology—technology cannot do more than support and enable this model of learning. UDL is bigger than a focus on needs. It can help educators see that designing for outcome over process supports many learners from all kinds of backgrounds and abilities to express understanding and knowledge of the material as well as foster cognitive thinking skills.

Want a more in-depth understanding of UDL? Learn how Jamf helps schools commit to UDL from our ebook: “Bringing Universal Design for Learning (UDL) To an Innovative Classroom With Technology.”>>

(Even if this tech and universal design approach really did open up opportunities exclusively for students with disabilities, disabled people make up 20% or more of the global population. That’s a lot of people.)

Statement: trying to keep up with tech strains school systems.

“The fast pace of change in technology is putting strain on education systems to adapt,” says the UNESCO report. While “countries are starting to define the digital skills they want to prioritize in curricula and assessment standards, often these have been defined by non-state, mostly commercial, actors.”

Response: it’s possible to use technology to lift strain from school systems.

Schools that use technology successfully understand that technology is a supporting tool: nothing more, nothing less.

For instance, a school district that uses an MDM such as Jamf School to manage and secure their entire fleet of Apple devices in multiple schools has streamlined and automated their IT, which means they need fewer IT personnel working fewer hours or spending their time working on educational innovations.

In most cases, the technology itself becomes just another tool —a digital pencil case— that supports flexible teaching styles, assessments, assignment planning and more. This can free up people who ordinarily struggle with classroom management or learner engagement to take a breath and think about what will best serve their district, schools and classrooms.

Often, students determine the way tech can support their educations and futures. Once they understand those initial foundational skills, this can develop into a key skill needed for future employment.

And when school districts and teachers learn that there are many ways to solve to a given problem, they can begin to move away from the one-size-fits-all approach of a more traditional classroom. They can truly engage students as they learn creative problem-solving and critical-thinking skills.

Statement: technology purchases can be shortsighted.

“Technology is often brought to plug a gap,” says the report, “with no view to the long-term costs.”

These costs are to:

  • National budgets: tech and internet connection subsidies
  • The environment: CO2 emissions from laptop manufacturing
  • Children’s well-being: online dangers and in-school surveillance

In fact, the report explained, the C02 emissions that could be saved by extending the lifespan of all laptops in the European Union by a year would be equivalent to taking almost one million cars off the road.

Response: it is possible to lower costs and raise protections.

Budgets

Investing in tech with a low TCO, longer lifespan and responsible security systems that protect student privacy can make an enormous difference.

Cheap devices may seem initially appealing, but better tools for students —such as Apple technology— not only cost less in the long run but also protect students and schools more powerfully. All while making a true investment in their education.

And it’s not just a financial investment. Tech in education does a lot more than simply offering access to the internet or software for writing a CV. Tech, well integrated into a student-centered classroom with a sound pedagogical framework, supports learning and teaching processes like:

  • Feedback
  • Assessment
  • Communication
  • Collaboration
  • Critical thinking
  • Student-led engagement

The devices themselves may have an initial cost, but if they impact learning, then the total impact of investment should be considered, beyond simple ROI.

Environmental

There are other budgetary and environmental costs to consider: is the use of tech for classroom planning and handouts lowering photocopying electricity, toner and paper costs? How about the ability for students to turn in assignments digitally? Does that save paper as well?

But we have good news on that front: Apple devices simply have a lower TCO. Part of that lower cost of ownership is that they are well-made machines that last longer. This helps the environment, too.

Children’s well-being

There is absolutely tech available out there like Jamf Safe Internet that offers not only state-of-the-art protection from phishing, unsafe or unsuitable sites, malware and more. And using a security product like Jamf Safe Internet with Apple devices ensures iron-clad student privacy protection.

Statement: schools and nations must take cybersecurity seriously.

“Data Protection Legislation is only nascent; safety risks cannot be dismissed.”

UNESCO found that children’s online safety, schools’ data and protection from cybercriminals is very much lacking globally.

“Only 16% of countries guarantee data privacy in education with a law,” says the report. Unfortunately, UNESCO also found that in ten of these countries, “despite this legislation, children’s rights were still not protected.”

“Education is increasingly targeted by cyberattacks,” says the report. “In the United States, the number of schools hit by cyberattacks in 45 districts nearly doubled between 2021 and 2022.”

Response: schools can enact powerful cybersecurity protections right now.

It can be a scary prospect: children gaining access to damaging websites, hackers breaching networks and stealing sensitive and lucrative data, and student privacy rights being trampled by overjealous security protocols.

But it doesn’t have to be, and schools don’t have to wait for governmental mandates.

If schools and districts take responsibility for securing all data, safety and privacy on their own, they can avoid costly breaches, student danger and malware.

And they can save money, as well— not only in the costs of breaches, but also the costs of state-of-the-art security systems with powerful content filters, behavior-based security and more if they take advantage of school discounts and use the same vendor for their MDM and endpoint protection.

Technology is not the solution to education.

Instead, it is a tool used to support educators and institutions to cut workloads, find solutions to educational problems and maximize budgets.

There is no doubt that the world we live in is technology-rich, and digital skills are an important part of a learner’s journey through education. Using technology to maintain focus, support those with additional needs and enable modern educational models is essential.

But expecting technology to do the teaching is not the answer.

Technology is:

  • A way to deliver accessible and flexible learning opportunities
  • An important skill for future adults
  • A time-saving tool for educators in planning and assessment

Technology is not going to save the world. But the right technology can support you while you do it.

Try Jamf today!


Migrating to Jamf in 3 easy steps

K12 Education

Author: August 22, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/easy-migration-to-jamf/

Business, education and life all seem to run online. As newer technologies emerge that turn complex processes and practices into simpler workflows, users choose to rely more and more on their devices to make life easier.

This increased usage results in greater reliance on devices. With that comes, of course, additional challenges. When managing devices, admins must ensure that their configurations and baseline security requirements secure devices, users and data. Adding to the challenge is the rise in distributed workforces, the critical nature of upholding user privacy and the increased user demand for using personally-owned devices at work. With all of that, the waters are a whole lot murkier.

But they don’t have to be. After all, that’s the beauty of the MDM model — it allows organizations to effectively extend security and management to all endpoints that access enterprise resources. The key is finding the right device management solution that meets the unique requirements of your organization and grows to meet changing requirements and evolving technologies.

But what happens when your provider doesn’t offer the type of support you require? What options, if any, are available to migrate your existing fleet? And how will that impact your business?

Rest assured, I’ll answer all of these questions here.

Why would organizations change providers?

“Because one of these things is not like the others.” — Taylor Swift

Many companies use an MDM solution to manage their end-user devices. However, changing requirements and new technologies can trigger a change in providers. Another important reason for the change is support or lack thereof. Let’s take Apple for example. They design their devices to adhere to frameworks that govern security and privacy, among others. These frameworks act as blueprints for developers to let them know how to best implement security and privacy practices into the apps they create and run on Apple hardware. Doing so ensures that hardware, software, users and data are all protected from issues that might otherwise compromise security and privacy.

Apple integrates security and privacy into its overall design philosophy and, as such, prioritizes them within its frameworks for developers to adhere to. When Apple announces a new feature, it too is baked into its frameworks and made available to MDM providers. This allows them to support the newest security feature within their respective MDM solutions.

However, while a few provide true same-day support of Apple’s latest and greatest, some do not. This delay impacts any organizations that rely on the newest security and privacy protections to stay protected against ever-evolving threats. Because these MDMs don’t support these features yet, this prevents organizations from deploying these critical protections.

The result? Impacted organizations must make the difficult decision to delay the deployment of the latest patches —leaving devices and, by extension, their infrastructure— vulnerable to risk.

Another solution is to minimize risk factors by migrating to a solution that does meet your organizational needs. While there are challenges inherent to migrating from one solution to the other, organizations are best served when taking a risk assessment approach to determine if the challenges to migration exceed the risks of being unable to mitigate threats in a timely manner.

What challenges make migrations difficult?

First and foremost, one of if not the greatest challenges is the impact on productivity. Tied closely to the first is time. Both productivity and time are impacted directly by the downtime required to get each device migrated, multiplying that by the total number of devices to migrate. The larger the number, the greater the time that is displaced to complete the project.

Regarding downtime, typically devices enrolled in one MDM solution require these devices to be wiped and reenrolled within the new MDM solution. While the re-enrollment process itself isn’t terribly time-consuming, other factors such as:

  • the size of your IT staff
  • employee location: onsite vs remote
  • data backup and restoration
  • device reprovisioning
  • types of devices being migrated

all play a significant role in determining the level of impact that downtime affecting your users during the migration process. Consider these to be on a sliding scale of sorts. A large IT staff managing centralized, on-site employee devices that are the same model MacBook Pro laptop, without the need to physically back up or restore data, may be able to handle this. A large staff and identical devices will result in decidedly less of an impact on project time than if your organization has no dedicated IT staff or employees work remotely, for example. This will cause downtime to grow disproportionately.

While the hurdles for changing MDM providers have historically appeared to be high, they don’t have to be…

Migrations as easy as 1-2-3

Jamf has developed an elegant solution that solves migration challenges by streamlining the process to:

  • eliminate administrative headaches
  • minimize the impact on end users
  • automate migration workflows

What manner of wizardry do we speak of? Nay, ‘tis not wizardry, but merely a workflow that allows administrators to “work smarter — not harder.” This workflow performs the necessary commands on devices managed by another MDM provider that:

  • copies files necessary to automate migration
  • uninstalls the old management profile
  • installs the Jamf Pro management profile
  • renews encryption password (if FileVault is enabled)
  • performs clean-up processes

When executed as a management command, the workflow will query the device and determine what resources are needed. These will deploy from your origin MDM and, once downloaded, execute on-device. A wizard will display that runs through each step of the process, such as the removal of the old management profile.

Next, the Jamf Pro management profile will install. For devices with FileVault currently enabled, the next step will prompt the device to renew the encryption key so that it may be stored securely in Jamf Pro’s database (this also makes it a breeze to retrieve in the event that users lock themselves out of their Mac). It is recommended that users be logged onto their Macs, as they will be prompted to enter their credentials during this phase and granted access to unlock FileVault upon authenticating.

Last, the final step performs some basic housekeeping to remove any files and scripts used during the migration process.

The workflow can be started at a time that works best and completes in a few minutes. The best part? The migration process doesn’t require wiping devices or backing user data prior to re-enrollment. Just a few minutes per device —over any network connection— is all that’s required to seamlessly migrate from your previous MDM provider to Jamf Pro.

1. Simple configuration

Regardless of your existing MDM provider, a few minor configurations are necessary to prepare it to deploy the files that will kick off the migration process across your entire macOS fleet.

2. Jamf Migrate

The secret sauce, if you will. Jamf Migrate is a lightweight package that is configured and uploaded to your existing MDM provider. It is this package that then deploys to your devices and begins the migration process. It orchestrates each phase of migration, ensuring that the next process doesn’t execute until the previous one is complete.

3. There is no step #3.

That’s it! Once Jamf Migrate completes its workflow, your devices will have removed the previous management profile and been successfully enrolled into Jamf Pro. Congratulations, the migration project is now complete. Future management workflows can be found within the easy yet powerful Jamf Pro administrator’s console.

Ready to migrate to the best-of-breed Apple management solution?

Contact Jamf or your preferred reseller today to schedule support for your migration project.


How-to: On-Device Content Filtering with Jamf Safe Internet

K12 Education

Author: August 25, 2023 by Anthony Darlow

Source: https://www.jamf.com/blog/how-to-on-device-content-filtering-with-jamf-safe-internet/

Step into the cybersecurity of the future.

Jamf Safe Internet has recently added On-Device Content Filtering (ODCF).

Apple provides this technology as part of iOS and iPadOS. ODCF enables network filtering directly on the device, which makes it a much more comprehensive filter.

Secure students and devices with On-Device Content Filtering.

Newest Jamf Safe Internet release

With this release, ODCF has added the ability to filter IP addresses on top of domain names— which Jamf Safe Internet has always done. However, the scope for ODCF technology is much broader than this.

It’s now possible to filter full URLs, ports and identify traffic that originates from specific apps. ODCF is also lower in the network stack than VPN, which means even if students install a VPN, their device will still filter content before going through the tunnel.

This technology is also very privacy-preserving. A huge amount of sensitive data is stripped from requests, and since ODCF evaluates the traffic data on-device, it doesn’t need to go to Jamf’s security cloud for evaluation.

This release didn’t just add the ODCF capabilities to Jamf Safe Internet. It also changed the default vectoring method to Apple’s “DNSSetting” payload, moving from a VPN-vectoring method. It’s this “DNS over HTTPS” (DoH) that enables Jamf Safe Internet to continue to provide web-based threat prevention.

It’s now done by making the most of Apple’s native frameworks.

New To Jamf Safe Internet?

This release has been optimized for devices running iOS and iPadOS 16+.

Jamf Pro

Where the guide says: “Download the relevant configuration files and complete the Jamf Pro instructions,” you will need to select the configuration profiles from the Jamf Safe Internet console under “iOS and iPadOS unsupervised (or supervised earlier than 16).”

Jamf Pro Managed deployment screen: Image outlines visually steps to take, which are laid out in the copy and links above.

Follow the rest of the guide, but be sure to scope this configuration profile only to devices with iOS or iPadOS earlier than iOS 16. You can do this using Smart Groups. For environments using both iOS and iPadOS 16+ as well as earlier, repeat the process but choose the configuration profile under “iOS and iPadOS supervised (16 or later).”

Jamf School

If you are using Jamf School to deploy Jamf Safe Internet and have devices running iOS or iPadOS earlier than 16, you will not be able to use Jamf School’s built-in single-click connection. Instead:

  1. Log into the Jamf Safe Internet console and select the default activation profile.
  2. Under “Select your UEM,” choose “Jamf School.”
  3. Under “Select your OS,” choose “iOS and iPadOS unsupervised (or supervised earlier than 16).”

Then, download the configuration profile from the console.

Jamf School Managed deployment screen: Image outlines visually the steps to take, which are laid out in the copy above.

Once you have this profile, upload it to School Jamf as a custom profile and scope it, along with the Jamf Trust app, only to devices with iOS or iPadOS earlier than iOS 16. You can do this with Smart Groups.

For environments using both iOS and iPadOS 16+ as well as earlier versions, use the built-in single-click connection for devices 16+, and use the above method for devices with an iOS or iPadOS earlier than 16.

Already have Jamf Safe Internet?

If you already have Jamf Safe Internet deployed to your devices prior to the release of ODCF, all of your devices will be using the legacy profile.

  • If you have devices that are running an iOS or iPadOS version earlier than iOS 16, you will not need to take any action. Jamf Safe Internet will continue to run in its legacy form (using a VPN vectoring method and without ODCF capabilities.).
  • If you have devices running iOS or iPadOS 16+ and would like to make use of the new DoH and ODCF capabilities, you will need to migrate your devices from the legacy deployment.

The migration has a number of steps and is a simple process. However, it’s extremely important that you follow all the steps as outlined here. Otherwise, there is the risk that your devices may not filter content in the expected way.

Step 1: Create an activation profile that has the new DoH and ODCF configuration populated.

  1. Log into your Jamf Safe Internet console and navigate to Devices → Activation Profiles → and select “Create Profile.”
  2. Name the profile according to your environment’s needs. I would suggest something that includes DoH and/or ODCF so that you know that this is the new profile and it’s using the new method over the older legacy profile you used before.
  3. Select “Save and Create.”
  4. In the next window, do not change any settings and select “Save.”
Jamf Safe Internet

Step 2: Create a Jamf Safe Internet profile in Jamf School.

  1. Log into your Jamf School console and navigate to Profiles → and select “Create Profile.”
  2. Create the profile by selecting “iOS” → “Device Enrollment.”
  3. Name the profile according to your environment’s needs. I would suggest something that includes DoH and/or ODCF so that you define the new profile when deploying.
  4. Select “Finish.”
  5. Scroll down to the “Safe Internet” payload and select “Configure.”
  6. From the dropdown menu, select the activation profile that you created.
  7. Select “Save.”
Activation profile screen from Jamf School showing a dropdown to select Jamf Safe Internet.

Step 3: Remove the legacy deployment from your devices.

Before deploying Jamf Safe Internet with the new DoH and ODCF capabilities, first:

  • Remove the legacy vectoring method from devices.
  • Remove the device record from Jamf Safe Internet. This is very important.

Here’s how to do it:

  1. In Jamf School, un-scope the current Jamf Safe Internet profile from the devices. This will be unique to each environment depending on how you configure groups and settings, but be sure to only un-scope the Jamf Safe Internet profile.
  2. Un-scope the Jamf Trust app from devices. This will be unique to each environment depending on how you configure groups and settings, but be sure to only un-scope Jamf Trust. At this point, please be aware that the devices are no longer filtered by Jamf Safe Internet.
  3. Move over to the Jamf Safe Internet console and navigate to Devices → Device groups.
  4. Select the devices or group of devices that you are migrating (ensuring that you’ve already removed the profile and Jamf Trust from them within Jamf School) by selecting the checkbox next to the devices.
  5. Click “More actions” and select “Delete devices.”
  6. In the next window, read the information and select “Delete.”
Jamf School screen visually showing the process outlined in above copy.
Jamf School screen visually showing the process outlined in above copy.
Screen showing

Step 4: Deploy Jamf Safe Internet using the new profile created in step two.

Now that your devices have fully been removed from the legacy deployment, you can re-deploy Jamf Safe Internet to the devices using ODCF.

  1. In Jamf School, scope the profile with the DoH and ODCF configuration created in step two to devices. Remember that DoH and ODCF are suitable for iOS and iPadOS 16+.
  2. Scope Jamf Trust to the devices (it doesn’t require a managed app config.)

At this point, devices are once again protected by Jamf Safe Internet and you will see devices start to appear in the Jamf Safe Internet console.

How to check that devices are using DoH and ODCF

Regardless of if your deployment is new or you have migrated from the legacy method, you can check on the device to ensure that it has a DoH and On-Device Content Filter payload.

  1. On a device, navigate to Settings → General.
  2. Find and select VPN, DNS and Device Management. This option will only say VPN and Device Management if a device does not have a DoH and ODCF payload.
  3. Under “Restrictions and Proxies,” you will see entries for “DNS” and “Content Filter.”

As a side note, unless you have also deployed a VPN, selecting “VPN” should show no configuration.

Screen of device settings with sections from above description highlighted.

What will my users see when ODCF or DoH blocks them?

Jamf Safe Internet keeps students and teachers safe in three ways:

  • It prevents students from accessing inappropriate content by blocking certain categories.
  • It can also enforce Google Safe Search so that only suitable search results and images appear.
  • It keeps students and teachers safe by protecting against web-based threats, such as phishing links or spam websites.

What the end user sees on the device will depend on what content is blocked. If blocked by a category, the user will see the OS block message that is standard for the ODCF protocol.

Block screen showing: Restricted Site. You cannot browse this page at

However, if the blocked content is a web-based threat prevention, such as a phishing site, the user will be presented with a Jamf-branded block page.

Block screen reads: [Jamf logo] Security Risk Identified The site you are attempting to view is insecure and has been blocked. For more information, please contact your administrator. Site classification: Phishing.

How do I block IP addresses?

First, you must add them to your policy as a custom rule.

  1. In the Jamf Safe Internet console, navigate to Policies → Content policies and ensure you are editing the policy at the correct level (OU) for your needs (Root, Lead or Group).
  2. Select “Custom Rules.”
  3. Enter the IP address(es) you wish to block into the “Add custom rules” box.
  4. Choose “Block.”
  5. Select “Add Custom Rules.”
  6. You will then see your custom rules in the list.
  7. Make sure to select “save and apply” so that these changes are delivered to devices.

Remember, IP address filtering is possible thanks to ODCF and is only available for devices with iOS and iPadOS 16+.

Jamf Safe Internet console showing the content policy screen.

What does On-Device Content Filtering do for my school?

This release of Jamf Safe Internet is super exciting as it brings more features in line with Apple’s native technologies; it is also more comprehensive and robust. While IP address blocking is great for those who need it, being lower in the network stack allows you to filter even with a VPN on the device. This is a much-needed addition; ODCF is bringing us the feature set of the future.

Yes, there’s a bit of work to migrate to make sure your devices are using DoH and ODCF. However, if clever students have bypassed filtering using IP addresses or VPNs, the benefits outweigh the work.

If you’ve never had this happen in your school, now would be a great time to move to DoH and ODCF before it does. This is the future of Jamf Safe Internet, so why wait?

Try Jamf Safe Internet for free.


Understanding Security Frameworks: Guide for IT Security Professionals

K12 Education

Author: August 9, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/security-frameworks-guide-for-infosec-pros/

The modern threat landscape is different today from what it looked like five years ago, ten years before that and twenty years prior. Cybersecurity, much like the technology that it seeks to protect is ever-evolving. Combined with the needs unique to your organization, as well as applicable compliance requirements, IT and Security teams have their work cut out for them when mitigating risks to the infrastructure while also maintaining a balance between data security and user privacy.

Thankfully, just like Maverick had Goose in Top Gun, organizations can leverage Security Frameworks to strengthen their security posture by:

  • streamlining procedures
  • minimizing risks
  • achieving compliance
  • enforcing best practices via policies

What is a Security Framework?

Webb cites Secureframe when answering the question above, “A security framework defines policies and procedures for establishing and maintaining security controls.”

Put simply: security frameworks act as a detailed guide that aids organizations in building and maintaining their security plan. Not unlike how blueprints help contractors build a home to specifications.

Importance of security frameworks in today’s digital landscape

As mentioned previously, security is constantly changing and the needs, tools, strategies, practices and procedures to continue protecting devices, users and data within your organization need to adapt to these changes or risk being susceptible to threat actors, including potential data breaches and the dire consequences that come with it.

The role of a security framework in an organization is an easy one to explain: security frameworks provide a systematic approach to securing your organization against myriad risk factors by determining which policies, procedures and controls should be implemented – including how they should be configured – to provide the greatest level of protection across the enterprise.

Webb also goes into greater detail explaining how security frameworks fall into several categories and that within each category there exist several different ones, each providing a specific level of protection to match the unique needs of your organization. Furthermore, while some frameworks may provide more generalized protections against threats, other frameworks are designed to specifically address the needs of specific industries, for example, HIPAA for healthcare or FINRA for financial institutions.

Why are Security Frameworks important?

Security frameworks play a significant role in mitigating cyber threats by making the path to implementing security controls, policies and procedures easier. It eliminates the “guesswork” by answering commonly asked questions, such as:

  • Which tools should we use?
  • Why should we use these tools?
  • What configurations should we use?
  • How can these tools be used to achieve compliance?

Cybersecurity poses a difficult challenge for many an organization. The fact that security is a path, not a destination, does nothing to lessen the challenge of keeping endpoints safeguarded nor organizations compliant. But frameworks greatly reduce the burden placed on organizations by making determinations as to what to prioritize their focus on by establishing a system of sorts that IT and Security teams can utilize throughout the entire endpoint lifecycle.

For example, let’s consider a financial institution that provides investment services to its clients. Because the finance sector is the highest-regulated industry, the importance of adhering to security frameworks for businesses that identify as financial centers cannot be underscored. As part of the regulatory requirements, governance over communications, including the cipher strengths used in communication platforms, what devices are restricted, which platforms can be used and by whom make up a small yet critical part of complying with financial regulations.

In the example scenario above, an employee utilizing their personal mobile device to communicate protected financial transaction data over an unsecured app can trigger an investigation into business processes, possibly resulting in steep fines of millions of dollars. While this may sound like perpetuating fear, uncertainty and doubt (FUD), the “imaginary scenario” above was actually the result of an industry-wide investigation last September, resulting in 16 fintech firms being fined $1.1 billion for failure to comply with federal securities laws in the U.S. This event is just one of the many case studies that exemplify the criticality for organizations to choose the right security framework and adhere to it to maintain business continuity without compromising endpoint security and privacy or be impacted by productivity.

Choosing the right security framework for your organization

Before an organization can begin working on adhering to security frameworks, it must first select one. More to the point, it must first select the right one. When choosing a security framework, some important factors to consider are:

  • Improving operational efficiency
  • Industry requirements for compliance
  • Mitigating security risks
  • Organization size may require more than one framework
  • System and data sensitivity needs

The process of implementing a security framework is not one that should be taken lightly. That said, the benefits of choosing the right framework(s) are multifold. From hardened security configurations to convergence between management, identity and security to form a holistic, comprehensive solution that is purpose-built for your supported ecosystem – all working together to protect against the latest security threats while enforcing compliance through standardized procedures, policies and practices.

Want to understand how security frameworks can help your organization?


What are the security risks of AI?

K12 Education

Author: August 3, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/security-risks-of-ai/

What is AI?

Artificial Intelligence, or AI for short, refers to the intelligence of software and computers to resolve problems and make decisions by leveraging the advanced data processing prowess made possible by computing devices. AI functions are not unlike human intelligence, only at levels that go far beyond human capabilities.

How does AI benefit businesses?

The promise of AI to revolutionize business functions is vast and nearly infinite. While the extent of what’s capable is not known, some of the possibilities that are available at the onset are helping industries, like supply chain, healthcare and finance sectors – among many others – from developing processes for getting products from point to point seamlessly to processing volumes of health data to identify patterns and anomalies in diagnosis and provide better treatment to more intelligently detect fraud and block fraudulent transactions to keep financial assets safe…and that’s just the tip of the iceberg.

Some examples of AI

AI acts as an umbrella term that includes variations of the technology, each providing a benefit to business and society et al. Examples of the different types of AI technology are:

Machine Learning (ML): Machines are able to discover their own algorithms, or models by being fed data to ‘learn’ about the problem they are trying to solve. The more data points they learn from the greater the potential of the results. Initially, the learning process may require human labelers to identify correct results, as time goes on the human element will be less necessary as more accurate results are produced.

Large Language Model (LLM): Based on deep learning, which is a broader subset of ML, LLMs are pre-trained and rely on neural networks made up of tens of millions of parameters that process large volumes of data in parallel. Whether operating in self-supervised or semi-supervised learning modes, their aim is to not only obtain knowledge but embody contextual facets of knowledge, such as syntax, semantics, and ontology pertaining to humans, such as the way we think and communicate.

Generative AI: A technology that is capable of generating media, such as text and images, in response to prompts by learning the structures of input training data. By receiving input data from users and applying ML techniques by processing the data via neural networks, the resulting media is generated by AI and can be used in multiple applications, such as creating inspired works of art, developing code used in software design or writing documentation, likes articles and reports, complete with cited text – and so much more.

Security risks associated with AI

For all the talk of benefits to organizations around the globe, AI poses an equal and significant risk to each industry. And while cybersecurity risks are nothing new per se, the impact that AI currently has on risk and how that will evolve as AI continues to push into businesses in novel ways certainly is.

This is not just a belief held by a few or the plot of a blockbuster film detailing how AI’s rise will lead to the demise of humanity. In fact, the general consensus among the majority of cybersecurity professionals is that not only will AI be weaponized to a scale and speed that is far beyond what we understand and know today, but in a twist of irony, AI-enabled defenses will be necessary for organizations “to fight these advanced attacks with advanced tactics that detect, interpret, and respond to the threat before it has a chance to make an impact.”

And what exactly are the AI-based risks that organizations are facing to keep resources safe?

Thanks to OWASP and their Top 10 for Large Language Model Applications project for 2023, a comprehensive report dedicated “to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs).” The listing includes:

  • the most critical vulnerabilities impacting AI
    • highlighting their potential impact
    • ease of exploitation
    • prevalence in real-world applications

LLM01: Prompt injection

For those familiar with SQL Injection attacks, prompt injection vulnerabilities in AI are a similar attack type. Inputs are crafted in a way to manipulate the model to cause unintended actions. Direct injections are capable of overwriting system responses while indirect injection attacks seek to manipulate inputs received from external sources.

And just like SQL injection attacks, security strategies to mitigate this vulnerability involve the implementation of both input validation and data sanitization practices for user-provided data. Additionally, formatting output encoding helps to filter responses while further reducing the vulnerability of prompt manipulation.

LLM02: Insecure output handling

Attackers often employ fuzzing tactics to determine how to best attack software. By examining the output responses to specially crafted input, critical information may be exposed that provides threat actors a clue as to vulnerabilities that can be exploited to compromise systems. When LLM output is not scrutinized, exposure to the underlying system can occur through Server-side Request Forgery (SSRF) vulnerabilities. To minimize this and further exploits that could allow effective bypassing of access controls and unauthorized access to sensitive data, a combination of input validation and sanitization is necessary to mitigate threats initiated by malicious requests. Additionally, frequent review of auditing data is recommended to ensure that resources remain protected from AI.

LLM03: Training data poisoning

If training data is the lifeblood of AI’s deep learning process, then it stands to reason that AI-generated output is only as good as its input. This precept is especially significant when considering that vulnerabilities may be introduced that could easily compromise data security, integrity and efficacy. This is why it’s so important for organizations to ensure that training data is obtained from trusted sources and that its integrity is verified to ensure that training data has not been poisoned or tampered with, nor that bias has been introduced that could impact the ethical behaviors of AI systems.

LLM04: Model denial of service (DoS)

Not unlike DoS attacks on networks, LLMs represent a valuable target for threat actors. The resource-heavy operations, when attacked, can lead to service interruptions and increased costs which are only further complicated by the reliance on AI-based tools for everything from business operations to cybersecurity. When coupled with the level of variance that comes from user inputs, the number of variables only grows exponentially. Despite having their work cut out for them, security pros should implement resource caps in order to limit excessive requests that would otherwise deplete resources. When paired with continuously monitoring resource utilization and strict input limits, administrators can take a proactive approach to prevent resource exhaustion while still providing users access to AI tooling.

LLM05: Supply Chain

2022 was a year that saw not one but several high-profile supply chain breaches. So impactful were these breaches in fact that guidance from analysts for 2023 foretold that supply chain attacks would continue to grow and proliferate as threat actors continued to set their sights on this large, opportunity-rich target. According to OWASP, “supply-chain vulnerabilities in LLM can affect the entire application lifecycle” – including everything from libraries, containerized instances, images and packages. This extends to cloud service providers that may be hosting models and/or providing services that interface with your LLM, like plugins (but more about them later as they have their own dedicated vulnerabilities that we touch upon). Protecting your AI models from supply chain threats requires a layered approach to your security plan. For starters, thoroughly vetting partners is tantamount to setting up a solid foundation. Performing regular auditing of sources is a key part of the solution to ensure security remains a priority. Implementing model and code signing best practices work best when paired with only working with trusted sources. Of course, active monitoring is a must to detect any vulnerabilities, out-of-scope components being used when they shouldn’t be or even to spot anomalies that could pose a risk to your LLMs security. Lastly, a current inventory of components that are being used in conjunction with Machine Learning Operations (MLOps) to ensure that models are deployed and managed reliably, efficiently and securely.

LLM06: Sensitive information disclosure

Another familiar cybersecurity concern that poses an exponentially unknown risk factor to data security is data leakage. While this too is nothing new to the security industry, the ramifications of AI-based risk cannot be quantified. Information shared with AI technology can (and has) inadvertently revealed confidential data in responses to users, such as it did in three recent issues of leaking proprietary data belonging to Samsung. ML applications particularly learn from all input data and as it builds its database, can and will rely on this data to resolve a query, leading to possible unauthorized data access, compliance and/or privacy violations and of course, possibly lead to a data breach. Hence why it’s critical for users to know and understand the potential consequences of their actions by implementing user training to establish awareness of what should not be shared with AI and whyit shouldn’t be shared. Additionally, organizations are well served by aligning user training to organizational policies to further support secure business practices.

LLM07: Insecure plugin design

Touched upon as part of the supply chain vulnerabilities, plugins and their design pose a critical risk to the data accessed and generated by AI due to the sheer nature of how plugins are designed to operate. In many cases, LLMs rely on plugins or APIs to work directly with input data and output data generated by AI models. Insecurely designed plugins may be prone to malicious requests that may result in but are not limited to data leakage, exposure of underlying systems or remote code execution. They may also lead to poisoning results, which will cause the model to generate output that has been compromised or provides sensitive system information that may be used to further an attacker’s aim. As a general precaution, it is advised that all input data be treated as unsafe and therefore, input validation (including parameterized input requirements) is recommended alongside explicit access controls to limit the risk of security issues. Additionally, plugins should be tested thoroughly to validate code and should adhere to best practices for developing secure code at each phase of the development pipeline.

LLM08: Excessive agency

The view and to some extent the marketing of AI, heralds thoughts of a personalized assistant that is always available to perform the “heavy lifting” for us, not unlike the JARVIS protocol used by Tony Stark/Iron Man to handle everything from curating playlists to performing scientific calculations on the fly when identifying an unknown element. And while AI certainly has been tapped to perform autonomous feats, like self-driving cars, the agency granted to the model (direct) or the automated actions that result from the data AI has processed and are executed by plugins or tools (indirect) all share a common trait: they are occurring without human input or authorization. This alone poses one of the more frightening concerns as LLMs or the plugins that rely on their data may perform functions that are not necessary or even intended to perform simply due to the agency or “permissions” given to them – even if the intended operation is one that humans wouldn’t want to be performed. Or as a core tenant of the European Union’s draft of the AI Act, “AI systems should be overseen by people, rather than by automation, to prevent harmful outcomes.”

How does one go about mitigating this risk type? Implementing a risk-based approach. Similar to a Zero Trust model, “LLMs should not be trusted to self-police or self-restrict.” To achieve this, look toward limiting access to plugins and tools to only the functions required. Also, avoid open-ended functions or any functions that are simply unnecessary to harden the attack surface (latter) while strengthening access controls to only interact with the data or perform the actions that are necessary to complete its process (former).

LLM09: Overreliance

If excessive agency is a frightening vulnerability, then overreliance is akin to it but from a more worrisome perspective. Let us explain. Many users have taken quite well to generative AI models, like ChatGPT, among others, to create content like writing articles, capturing captivating imagery or mashing up video content that is hyper-realistic, and yet all of it is completely produced by AI. While on the outset, the ability to generate media content is a capital feat in and of itself, as with many tools, the intent of the user is what drives whether it is used to build or to destroy. This may seem like overdramatization, but the risk posed by users relying on AI content as gospel truth could have disastrous consequences. Take for example the misinformation being generated in a technical paper due to a hallucination by the AI and how that could lead to any number of issues affecting major industries, such as healthcare and IT/IS. Or how relatively easy it is to produce audio recordings of individuals saying anything with only a few seconds’ worth of soundbites needed to digitally recreate their voice. Now how about taking that recording and broadcasting it online? Depending on the content of the words, it could be enough to ruin someone’s public reputation or instead, the “faked”recording could be used as part of a crime.

Simply put: we just don’t know how deep that rabbit hole goes in relation to the untold consequences of over-relying on AI. But there are tactics that can help aid discernment between what’s real and what’s generated by LLMs. Let’s begin with fact-checking output with trusted external sources as an additional layer of validation to determine the accuracy and validity of generated content. Similar to plugin development, establishing and adhering to secure coding practices helps to minimize the risk of introducing vulnerabilities into the development environment. In addition to the validation mechanisms and cross-verification of information, clearly and concisely communicating risks, known issues and limitations associated with using AI and AI-generated content is table stakes to ethical and transparency efforts between content creators and content users – not unlike FCC laws that govern truth-in-advertising.

LLM10: Model theft

This vulnerability is among the most straightforward, referring to the unauthorized access and exfiltration of data, in this case, the LLM itself by threat actors. It’s not unlike the data exfiltration threats in cybersecurity seen for years prior to AI where sensitive, private and confidential data is targeted and removed from devices or networks with the express purpose of leaking the information, stealing proprietary details or as part of espionage campaigns. AI model theft, like any piece of confidential data that is stolen, can range in severity from both an economic and a business continuity standpoint. The loss may present a loss of revenue or competitive advantage to unauthorized usage of the model up to and including using it as part of an adversarial attack against the organization the model was stolen from. The key is to secure your LLM using layered security strategies including strong access controls, limiting access to network resources through network segmentation and secure sandboxing, active monitoring of resources, as well as regularly performing audits of logs and activities tied to your LLM. Incident response alerted and deployed upon alerts of suspicious behaviors and to mitigate the detection of anomalous behaviors. In addition to access controls, quick mitigation of other vulnerabilities known to affect LLMs (such as those represented within this article) can help to reduce the risk of malicious actors pivoting or moving laterally from another threat to compromise your model.

Other AI-based security risks

Inadequate sandboxing

Sandboxing data is an excellent way to segment sensitive processes from the rest of a system. Doing so allows data to be effectively processed while it runs securely isolated from the underlying system, including being inaccessible by external threats or exposed to risks outside the sandbox environment. Because of AI’s relative nascency, a number of issues are at the heart of designing a universally accepted or regulated sandbox. However, organizations that wish to take advantage of AI technology today would benefit from sandboxing AI models, tools and systems to promote experimentation with products and services in a secure and ethical manner that minimizes risk while addressing challenges, such as lack of formal safeguards, unforeseen consequences or lack of fidelity across solutions.

AI misalignment

The term AI alignment refers to “research aims to steer AI systems towards humans’ intended goals, preferences, or ethical principles”, according to Wikipedia. If despite its competency, an AI system cannot advance the intended goals, then it is considered to be misaligned and its lack of alignment could lead to undesired behaviors, including actions and malfunctions that could further cause harm to businesses and worse still, impact human life. Consider for a moment an AI system used to generate code for a web service. While the aim of the developer is to create complex, secure code that will result in a service that can be used to simplify computer-related tasks, AI can also be subverted to generate powerful malicious code that may pose a threat to the web service mentioned previously or any web service for that matter. Hence why it’s critical to maintain a finger on the digital pulse of AI by identifying what works and refining what doesn’t to help make models safer to use. A key role in the alignment process is human oversight. Not just checking a box off when AI gets something right or wrong, but taking a more pragmatic and scientifically-based approach by documenting problems, performing continuous training, reviewing feedback, conducting evaluations of systems and doing so in a transparent fashion are just some of the key techniques to achieving better alignment.

Key takeaways:

  • Develop input validation and output sanitization practices to reduce sensitive data leaks and prompt injection vulnerabilities
  • Thoroughly vet supply chain partners to ensure compliance with security and ethical practices
  • Ensure that training sets maintain data integrity and have not been tampered with or compromised by working only with trusted sources
  • Audit all systems that are used for AI
  • Impose limitations on data sharing, especially private and confidential information
  • Implement data security and access controls according to industry best practices
  • Harden hardware and software with up-to-date patches, vulnerability management and next-generation security tools (including AI/ML-based tooling)
  • Provide adversarial training to respond to AI-based threats and improve the resiliency of models
  • Integrate regular training so staff understand how to detect and avoid risks stemming from AI-generated threats
  • Develop an incident response team for security issues detected and optimized for handling AI-related risks

Protect all your Apple devices with Jamf!


Education customers have their say about Jamf

K12 Education

Author: August 1, 2023 by Ivna O’Neil

Source: https://www.jamf.com/blog/improving-education-with-jamf-technology/

Education is at the heart of Jamf’s mission.

Earlier this year, Jamf was at Bett 2023, the world’s leading education technology show. Over the course of three days, we welcomed educators and IT professionals to our dedicated area to chat about how our solutions are empowering more than 42 million students globally.

Customers in different stages from many places

Among the visitors to our stand at Bett were customers in different stages of their digital classroom transformation with Apple and Jamf. We talked to them about how Jamf is helping their schools create the ideal technological environment to safeguard students, facilitate deployment of Apple devices and keep data protected.

Managing and configuring student iPads with Jamf School

For the Arthur Terry Learning Partnership, an education trust, Jamf has been an essential part of their deployment. With 20 schools to oversee, they are halfway through the first phase of implementing Jamf School.

“We are extremely happy with the quality of the product and the support and guidance from Jamf,” said Richard Anderton, Head of Digital Strategy at the trust.

Stéphane Thomassin, from Collège Saint-Joseph, explained how their journey with Jamf has developed since its inception four years ago. By attending a three-day training, staff at the school learned how to maximize Jamf’s MDM capabilities to manage and configure students’ tablets.

Expanding with Jamf Parent and Jamf Safe Internet

“As for today, we mainly have challenges to ensure security and manage the iPads at home,” said Thomassin.

To continue building on their success with Jamf, Collège Saint-Joseph began to test the Jamf Parent app and Jamf Safe Internet. “I’m pretty confident we will deploy them soon because the results and feedback are positive for iPad management at home by the parents,” said Thomassin.

Transforming iPads into fully-fledged learning and teaching tools with apps

Other customers were eager to share how they are moving from pure device management to solutions capable of simplifying teacher workload and making full use of Apple devices. By using apps such as Jamf Teacher, Jamf Student and Jamf Parent, schools can transform iPads into fully-fledged learning tools.

Damian Parker, Head of Faculty of Art Design & Technology at St Cyres School, was keen to discover the possibilities, so decided to get a Jamf certification. He learned so much getting the certification that it transformed his lesson planning and classroom management.

“I didn’t realize I could pre-plan my lessons and get all the apps in line for my day,” said Parker. “Now what I’m finding is when students arrive my lesson is ready: I press start and as soon as they open their iPads – bang! They’re straight into the apps I want them to use, no fuss, no wasting time and I’m just ready to teach as soon as they come in.”

Keeping students focused

Customers agreed that student focus was greatly improved after implementation of the apps. According to Matt Warne from RGS Worcester, a previous MDM tool could not deal with common issues like students messaging during class or spending time on games. Jamf has enabled the school to eradicate these problems, which allows their technology vision to come to life.

Learn more about Jamf’s education offerings.


The digital classroom

K12 Education

Author: July 28, 2023 by Mat Pullen

Source: https://www.jamf.com/blog/the-digital-classroom/

In schools around the globe, the traditional classroom is evolving to take advantage of the new digital tools available to meet the needs of today’s tech-savvy students.

Read on to learn more about how digital technology in the classroom enhances the learning experience, encourages student engagement and empowers educators.

What is a digital classroom?

The digital classroom incorporates electronic devices and software into the learning environment.

Key elements of a digital classroom include:

  • Devices: provide computers, laptops, tablets or smartphones to access digital resources, participate in interactive activities and complete assignments.
  • Internet connectivity: allow online access to materials, collaboration and virtual interaction.
  • Educational software and apps: create digital lessons, activities and assessments.
  • Digital content: make educational materials available digitally.
  • Collaboration and communication tools: enable seamless communications and interactions with online platforms and applications.

These tools can expand the potential for collaboration, extend access to resources and enable continued work outside of the physical classroom space.

Typical uses of digital tools in the classroom include teachers creating and sharing lessons via iPads, students completing assignments on shared or one-to-one devices and off-site access of resources and communication via internet connection.

Benefits of a digital classroom

The digital classroom transforms the learning experience for students by offering:

  • Enhanced engagement and interactivity
  • Personalized learning tailored for individual needs and abilities
  • Expansive access to digital resources and self-directed learning
  • Time and location flexibility, enabling students to learn at their own pace
  • Opportunities for global collaboration and exposure to diverse perspectives
  • Real-time feedback and assessment

To learn more about how this works in practice, read about how Apple and Jamf empowered students in Taiwan with world-class digital classrooms.

Challenges of a digital classroom

The digital classroom offers many advantages for students but there can be obstacles to successful implementation.

Common concerns include:

  • Technology access – limited or inconsistent access to devices and the internet
  • Digital literacy – varying levels of how much users understand digital tools
  • Privacy concerns – how to keep students safe online

While the importance of providing equivalent technology for every user is crucial for reaching every learner’s potential, effective teacher training is also important.

One of the advantages of using Apple devices such as iPads is the abundance of free training offered for educators: part of the initial device purchase investment includes free training from Apple Education Community, Jamf Educator and Apple Professional Learning.

And no less important: because this technology provides access to internet exploration, it requires a plan to keep students safe online. Jamf Teacher enhances the standard approach to content filtering by offering classroom-level controls, including providing specific web links to encourage exploration in a safe environment of specifically-allowed sites.

Digital classroom tools

Technology that is effectively used in modern classrooms includes:

Apple devices and software

Apple empowers student and educator success with powerful, intuitive tools that encourage creativity: including iPad, Mac and Apple TV devices.

As Apple devices have a lower long-term cost of ownership with higher resale value when compared with others, schools around the world are offering iPads to students.

When both teachers and students use the same devices, it supports good classroom management and a shared understanding of the device’s potential.

Google Classroom

Google Classroom is an all-in-one tool enabling educators and students to engage together in lessons and coursework. Google Classroom can be learned in minutes; it helps educators manage their instruction and grade more efficiently. It features seamless integrations with other Google Workspace for Education tools like Drive, Calendar and Meet as well as popular third-party EdTech tools. Google Classroom gives educators streamlined ways to create enriching student experiences that make each lesson more personal.

Jamf School

Behind every effective technology deployment is a system that makes management and security work.

Jamf School is a mobile device management (MDM) system for efficient classroom management enabling:

  • Set up and organization of classes
  • Connection with other teachers
  • Communication with students
  • Configuration for specific or shared users
  • Assignment of specific apps as well as content to devices

Jamf School enables teachers to set up specific content for the correct classes at the right times, which makes it possible to offer age- and subject-appropriate content when and where it is needed. The end result: teachers can focus on using the devices, not how to set them up.

Jamf Safe Internet

Jamf Safe Internet provides educators piece of mind for students working online. When students search online, educators can trust that learners are protected from accessing inappropriate content. Filtering tools are simple to set up, with options for predefined settings including not only gaming, gambling and adult search but also additional customization for needs based on the age or stage of the learner.

Jamf Safe Internet also goes beyond content filtering and into threat prevention. It protects users and networks from the risks of phishing attacks, malware and ransomware – dangers that can cause issues with wider implications for institutions beyond the classroom.

The role of teachers in a digital classroom

In the “traditional classroom,” a teacher’s role has been to provide content for learners and to help them understand context and application.

But in the digital classroom, technology gives educators an opportunity to become more of a guide— to encourage independent thought and discovery that can lead to a deeper understanding of what the content means for each individual learner.

Technology also offers opportunities to express an understanding of the content in new ways, from video to audio or other imagery. As educators use technology to encourage self-directed learning, students are empowered to take more responsibility for their learning.

Beyond the traditional classroom, technology also provides opportunities to offer new learning spaces, meeting students’ individual needs for where and when they learn best.

It’s essential for educators to have access to classroom management tools to empower students to use devices in and outside of the classroom.

By using the combination of Apple Classroom and Jamf Teacher, educators are empowered to provide simple and quick access to the resources that allow this type of learning while also monitoring student progress and support from a distance.

Training and support for educators

For classrooms to successfully evolve to a digital model, schools should also plan how to support and train their educators.

Teachers may need to not only learn new skills such as tech proficiency and online moderation but also how technology provides new ways to share content, assess understanding and promote new thinking.

The future of digital classrooms

The pandemic taught us that learning doesn’t have to be restricted by space and time. As the “traditional classroom” continues to evolve with increased investment in education technology, what can we expect future learning to look like?

We are seeing new schools that further blur the line between education and work. These innovators don’t simply replicate workplaces but also use technology in ways that enhance collaboration beyond borders. Learners can engage with experts from around the world and showcase learning that meets industry needs. In many cases, they can even inspire new thinking in the world around them.

When students receive the right tools, they can be real change-makers in the years to come.

Make the most of the digital revolution with Jamf

Jamf helps schools deliver a secure, active learning environment to everyone with iPad, Mac and Apple TV devices.

Manage and secure Apple in education with a free trial of Jamf School.