This workflow covers how to defer macOS updates on an individual computer or group of computers by deploying a configuration profile with settings that restrict the macOS update. Computer configuration profiles are XML files (.mobileconfig) that provide an easy way to define settings and restrictions for macOS computers and users. You can use Jamf Pro to create computer configuration profiles and specify the computers and users to which the profile should be applied (called “scope”). You can use the smart computer group you created as the scope of the configuration profile.
Welcome to Animal Jam, where you will become your favorite animal, create a style to express the real you, and explore the beautiful 3D world of Jamaa! Animal Jam is the best online community for kids and a safe place to meet and chat with new friends — plus decorate your own den, play fun animal ga. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. To view just jamfAAD logs on a Mac for quick troubleshooting, run this command on the Mac to get the last 30 minutes of data: log show -predicate 'subsystem CONTAINS 'jamfAAD' -last 30m Here’s an example of a Company Portal log showing successful Intune registration.
Note: macOS can still be updated via an MDM command even if updates are deferred.
To defer a macOS update, you need the following:
Jamf Pro 10.3.0 or later
Computers with macOS 10.13 or later with a User Approved MDM status (For more information, see the Managing User Approved MDM with Jamf Pro Knowledge Base article.)
A valid push certificate in Jamf Pro
You can use a configuration profile to defer a macOS update. You can scope this configuration profile to a specific group of computers, including a smart computer group of managed, MDM-enabled computers not using the current macOS version.
Log in to Jamf Pro.
Click Computers at the top of the page.
Click Configuration Profiles.
Click New .
On the General pane, enter a name for the profile and configure other settings on the pane as needed.
To configure the Restrictions pane, do the following:
Click Functionality.
Select the Defer software updates for checkbox at the bottom of the pane, and then select the number of days to defer the update after it is released by Apple from the pop-up menu.
Note: Computers with macOS 10.13.0–10.13.3 defer the update for 90 days (not configurable).
Click the Scope tab and configure the scope of the profile. With scope, you can add targets, limitations, and exclusions for remote management tasks.
If you want to update macOS before the deferral period is over, remove the computer from the scope or send a remote command to update macOS.
On the Targets pane, choose “All Computers” or “Specific Computers” from the Target Computers pop-up menu.
To narrow the restriction to a specific group of managed, MDM-enabled computers that are not using the current macOS version, select Computer Groups and click Add next to the smart computer group you created.
Click Done.
To deploy the configuration profile, click Save.
Note: If a computer has two or more configuration profiles with restrictions, it will accept the most restrictive settings.
Now that we have configured the connection between EMS and Jamf Pro we need to make sure that the macOS devices can also be registered to Azure AD. To be able to complete the scenario we need to do the following;
Configuring compliance policies need to be done in Microsoft Intune, for macOS devices you are able to check compliance for the following options;
In this blog I will require encryption to be enabled and require that the minimum macOS version is 12. (a non-existing value)
The Intune Company Portal is not available in the App Store of Apple, so we need to download it from Microsoft and create a policy to deploy it to the macOS devices.
The last part of the configuration is creating a policy that forces the users to register their device with Azure AD.
In Microsoft Intune you will see the macOS device appearing and you will see that it is managed by Jamf. And in this case it is not compliant.
View more information about why the device is not compliant in the Microsoft Intune console.
In the Jamf Pro console you see the device with the Azure AD information.
After the device is remediated, it will be reported as compliant.
The end user needs to go through some manual steps to register the Jamf managed device with Azure AD, so that the inventory can be shared with Microsoft Intune.
In the Self Service app from Jamf the user needs to start the Azure AD registration application to start the registration in Azure AD. The Intune Company Portal is automatically installed.
After starting the registration app, the Company Portal will automatically be started. Login with the user account you want to use to register the device.
Authenticate for the second time.
After the registration is done you will receive the message that the company access setup is completed.
If a device is not compliant as shown below you can fix it via the Company Portal.
Click Fix It to see why the device is not compliant
Fix the issues and check the compliance state of the device again via Check Compliance.
After the fixing the issues the device is marked as compliant again.
While testing the solution the following notes were taken.
Looking at this integration I think it is a great addition when you already manage your devices with Jamf Pro and you want to control access to Office 365 and/or Azure services via Conditional Access.