Bash

October 16th, 2019 - University of Utah, MacAdmins Meeting The University of Utah, MacAdmins Meeting is held monthly at the Marriott Library on the 3rd Wednesday of each month at 11 AM Mountain Time. Presentations cover Apple technology and integration in a heterogeneous university enterprise environment. This month's meeting will...

July 17th, 2019 - University of Utah, MacAdmins Meeting The University of Utah, MacAdmins Meeting is held monthly at the Marriott Library on the 3rd Wednesday of each month at 11 AM Mountain Time. Presentations cover Apple technology and integration in a heterogeneous university enterprise environment. This month's meeting will...

Overview We have developed a methodology of managing enterprise and/or shared environment unfriendly applications that has evolved over the years at the Marriott Library or other locations on campus that we support. We affectionately call it the  “Crappy App” model which we use sanitize applications with exceptional requirements. These...

Overview We have implemented multiple forms of kiosk throughout the years at the Marriott Library or other locations on campus that we support. Initially, we implemented web kiosks that provided anonymous users at the Marriott Library quick access to limited library & campus resources like the...

Overview Jamf Pro server can be a funny and fickle beast. When testing different policies that are unique or upgrading to a new version of Jamf Pro, it's best not to try it on the production server first. Sometimes the process of testing a new release...

Overview This blog was created from the first multi-part of a presentation at the June 2017 University of Utah MacAdmin meeting which covers in-depth information on managing settings on Mac systems including property lists format, naming, preference search paths, file system locations and structure and parts....

Overview System Integrity Protection or "SIP" is a new security measure implemented in 10.11 "El Capitan". SIP protects access to system locations and restricting runtime attachment to system processes, this security policy guards against compromise — whether accidental or by malicious code. SIP protects file system locations...