September 2024 – MacAdmins Meeting

September 2024 – MacAdmins Meeting

September 18th, 2024 – University of Utah, MacAdmins Meeting


mac_mgrs_crowd

The University of Utah, MacAdmins Meeting is held monthly virtually on the 3rd Wednesday of each month at 11 AM Mountain Time. Presentations cover Apple technology and integration in a heterogeneous university enterprise environment. This month’s meeting will be held on Wed, September 18th, 2024 at 11 AM MT and we will provide live broadcasts and archives that will be made available 2-3 days after the meeting.

 

Apple Device Management with Intune – Arnab Biswas, Microsoft


In this presentation, Arnab will explore the latest updates and features in Intune for managing Macs, highlighting enhancements that simplify device management, security, and compliance. Additionally, I will provide an overview of our roadmap, detailing upcoming developments aimed at improving the user experience, expanding integration options, and introducing advanced management capabilities. We’ll also discuss how these changes align with current trends in enterprise Mac management and what they mean for MacAdmins and users.

About Arnab Biswas

Senior Product Manager at Intune leading Mac management strategy and product development. 

  • Video – To view the archived presentation video, click here.
  • Slides – To view the archived presentation slides, click here.

 

Jamf Pro Authentication with SMTP – William Smith, Jamf


This presentation will explore the enhanced email notification features within Jamf Pro, focusing on the transition from basic authentication to token-based authentication. With both Google and Microsoft having deprecated basic authentication methods, Jamf Pro now supports OAuth2 for Google and Modern Authentication for Microsoft services, ensuring more secure and compliant email delivery. William Smith from Jamf will not only discuss the security and operational benefits of these new authentication protocols but will also provide a step-by-step demonstration on how to configure OAuth2 for Google and Modern Auth for Microsoft, giving you the tools to implement these changes effectively.

About William Smith

Bill helps train and support internal Professional Services engineers as well as partners delivering services on behalf of Jamf. Occasionally, he’ll contribute to the Jamf Blog, present technical webinars for customers, and speak on his experiences helping customers at the Jamf Nation User Conference or other conferences. He’s been a customer, an Integrator, and an employee over the past 20 years.

  • Video – To view the archived presentation video, click here.
  • Slides – To view the archived presentation slides, click here.


BeyondTrust EPM Changes macOS Behavior – James Reynolds, University of Utah


The principle of least privilege means giving users only those privileges which are required to perform their duties. The principle of least privilege (PoLP) is a cybersecurity concept that ensures users and systems have only the minimum permissions necessary to perform their tasks, significantly reducing the attack surface and risk of malicious or accidental misuse. In this presentation, we will explore how BeyondTrust Endpoint Privilege Management (EPM) facilitates the application of PoLP on macOS devices, enabling administrators to effectively secure their environment.

This presentation will discuss some macOS security technologies like the Authorization Database, how BeyondTrust changes macOS to implement the principle of least privilege, how to wrap your mind around BeyondTrust’s default template, and some other topics like what else you should be doing to secure macOS. This presentation is information-dense and includes information for administrators who might not be familiar with macOS.

About James Reynolds

James received a BMus degree from the University of Utah in 1999. He immediately went into IT by managing Mac OS 9 and servers, first at the College of Fine Arts, then the Marriott Library, and now he is at the School of Biological Sciences doing macOS, Linux, and general IT.

  • Video – To view the archived presentation video, click here.
  • Slides – To view the archived presentation slides, click here.

Open Discussion


Questions, comments, problems, and fixes.

Directions


This meeting will not be held in person but will be done virtually using Zoom video communications architecture.

With Zoom we will implement the following security best practices:
 
  • Require a Password to Join This meeting will require a password to join the meeting. Information will be emailed via a campus internal list, but if you are external and want to attend the meeting, please use the Contact Us form to receive details. Else, the archive of the meeting will be available 2-3 days after the live meeting.

  • Waiting Room When joining the meeting you will be placed in the Waiting Room by default and the hosts will give you access to the live meeting.

  • Miscellaneous We will also implement other settings and safeguards to secure the meeting.

Archived Presentation(s)


  • Archives of the presentations will be available on this web page.
No Comments

Leave a Reply