Jam9 mac os download
  1. Mac Os 9 App
  2. Jam9 Mac Os Update

This workflow covers how to defer macOS updates on an individual computer or group of computers by deploying a configuration profile with settings that restrict the macOS update. Computer configuration profiles are XML files (.mobileconfig) that provide an easy way to define settings and restrictions for macOS computers and users. You can use Jamf Pro to create computer configuration profiles and specify the computers and users to which the profile should be applied (called “scope”). You can use the smart computer group you created as the scope of the configuration profile.

‎Welcome to Animal Jam, where you will become your favorite animal, create a style to express the real you, and explore the beautiful 3D world of Jamaa! Animal Jam is the best online community for kids and a safe place to meet and chat with new friends — plus decorate your own den, play fun animal ga. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. To view just jamfAAD logs on a Mac for quick troubleshooting, run this command on the Mac to get the last 30 minutes of data: log show -predicate 'subsystem CONTAINS 'jamfAAD' -last 30m Here’s an example of a Company Portal log showing successful Intune registration.

Note: macOS can still be updated via an MDM command even if updates are deferred.

To defer a macOS update, you need the following:

  • Jamf Pro 10.3.0 or later

  • Computers with macOS 10.13 or later with a User Approved MDM status (For more information, see the Managing User Approved MDM with Jamf Pro Knowledge Base article.)

  • A valid push certificate in Jamf Pro

You can use a configuration profile to defer a macOS update. You can scope this configuration profile to a specific group of computers, including a smart computer group of managed, MDM-enabled computers not using the current macOS version.

  1. Log in to Jamf Pro.

  2. Click Computers at the top of the page.

  3. Click Configuration Profiles.

  4. Click New .

  5. On the General pane, enter a name for the profile and configure other settings on the pane as needed.

  6. To configure the Restrictions pane, do the following:

    1. Click Functionality.

    2. Select the Defer software updates for checkbox at the bottom of the pane, and then select the number of days to defer the update after it is released by Apple from the pop-up menu.

      Note: Computers with macOS 10.13.0–10.13.3 defer the update for 90 days (not configurable).

  7. Click the Scope tab and configure the scope of the profile. With scope, you can add targets, limitations, and exclusions for remote management tasks.
    If you want to update macOS before the deferral period is over, remove the computer from the scope or send a remote command to update macOS.

    1. On the Targets pane, choose “All Computers” or “Specific Computers” from the Target Computers pop-up menu.

    2. To narrow the restriction to a specific group of managed, MDM-enabled computers that are not using the current macOS version, select Computer Groups and click Add next to the smart computer group you created.

  8. Click Done.

  9. To deploy the configuration profile, click Save.

    Note: If a computer has two or more configuration profiles with restrictions, it will accept the most restrictive settings.


Now that we have configured the connection between EMS and Jamf Pro we need to make sure that the macOS devices can also be registered to Azure AD. To be able to complete the scenario we need to do the following;

  • configure compliance policies
  • deploy the company portal app with Jamf Pro
  • create a Jamf policy that users need to register their device with Azure AD.

Configuring compliance policies need to be done in Microsoft Intune, for macOS devices you are able to check compliance for the following options;

  1. Check if system integrity protection is enabled on the device.
  2. Minimum and maximum OS version
  3. check if a password is required to unlock the device
  4. check if complexity of the password is configured.
  5. check if encryption is enabled.

In this blog I will require encryption to be enabled and require that the minimum macOS version is 12. (a non-existing value)

The Intune Company Portal is not available in the App Store of Apple, so we need to download it from Microsoft and create a policy to deploy it to the macOS devices.

Mac
  1. First download the latest version of the Intune Company Portal for macOS.
  2. In the Jamf Pro admin console, go to Management Settings, Computer Management and click Packages.
  3. Click New, click Choose File and browse to the file called CompanyPortal-Installer.pkg.
  4. Click Save and wait until the file is uploaded.
  5. Click Computers and Policies.
  6. Click New, and supply a display name
  7. Enable the options Enrollment Complete and Recurring Check-in.
  8. Click Packages and Configure.
  9. Click Add next CompanyPortal-Installer.pkg.
  10. Leave the action to Install and set the correct scope (eg All Computers and/or All Users).
  11. Click Save.

The last part of the configuration is creating a policy that forces the users to register their device with Azure AD.

  1. Still in the Jamf Pro admin console, go to Computers, Policies and click New.
  2. Supply a Name and click on the Microsoft Intune Integration payload.
  3. Click Configure
  4. Enable the checkbox Register computers with Azure Active Directory and click Scope to scope the deployment of the policy.
  5. Click Self Service and enable Make the policy available in Self Service.
  6. Click Save.

Mac Os 9 App

In Microsoft Intune you will see the macOS device appearing and you will see that it is managed by Jamf. And in this case it is not compliant.

View more information about why the device is not compliant in the Microsoft Intune console.

In the Jamf Pro console you see the device with the Azure AD information.

After the device is remediated, it will be reported as compliant.

The end user needs to go through some manual steps to register the Jamf managed device with Azure AD, so that the inventory can be shared with Microsoft Intune.

Registering the device

Jam9 Mac Os Update

In the Self Service app from Jamf the user needs to start the Azure AD registration application to start the registration in Azure AD. The Intune Company Portal is automatically installed.
After starting the registration app, the Company Portal will automatically be started. Login with the user account you want to use to register the device.
Authenticate for the second time.
After the registration is done you will receive the message that the company access setup is completed.

Remediation of compliance issues

If a device is not compliant as shown below you can fix it via the Company Portal.
Click Fix It to see why the device is not compliant
Fix the issues and check the compliance state of the device again via Check Compliance.

After the fixing the issues the device is marked as compliant again.

While testing the solution the following notes were taken.

  • After enrolling the device in Jamf Pro, be sure that the inventory has ran before starting the registration via the Company Portal.
  • Don’t start the company portal manually for the registration, the company portal must automatically be started via the AD registration policy.
  • Initiate a Policy scan on a macOS device via “sudo jamf policy
  • Initiate an Inventory scan on a macOS device via “sudo jamf recon” (by default inventory runs weekly)
  • Only inventory from Jamf Pro is shared with Microsoft Intune
  • Only the object ID’s of the user and device in Azure AD are shared from Azure AD with the Jamf Pro cloud
  • Running the Test in Jamf Pro to test the connection is a good way to initiate a sync between the two cloud services.

Looking at this integration I think it is a great addition when you already manage your devices with Jamf Pro and you want to control access to Office 365 and/or Azure services via Conditional Access.

  • Jamf Pro and Microsoft EMS better together – macOS devices – part 3 (this blog)

Comments