У нас вы можете посмотреть бесплатно Hello Compliance Benchmarks, Ciao Jamf Compliance Editor или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Migrate from Jamf Compliance Editor to built-in Jamf Pro compliance benchmarks with confidence using lessons from SEEK's 6-week CIS Level 1 implementation. Martin Piron (Senior Systems Engineer, SEEK) and Stu McDonald (Enterprise Customer Success Manager, Jamf) demonstrate complete migration workflows managing 1,500 Macs and 850 iOS devices, revealing critical gotchas including declarative device management conflicts, P-list cleanup requirements, and FileVault profile preservation strategies during enforcement activation. See step-by-step wizard deployment creating hundreds of configuration profiles, extension attributes, policies, and smart groups automatically—then learn when manual intervention is required. Discover monitoring-only vs. enforcement mode strategies for gradual rollout, troubleshooting extension attribute failures when excluding rules, and handling macOS Tahoe updates in 5 minutes with automatic rule modification detection. Includes Splunk dashboard integration for compliance trend reporting and proactive identification of users actively fighting benchmark enforcement. What You'll Learn: ► macOS Security Compliance Project (mSCP) overview: open-source programmatic security guidance for multiple baselines ► SEEK case study: 6-week timeline from zero to CIS Level 1 enforcement across 1,500 Macs ► Customizing baselines: excluding Bluetooth menu bar requirements while enforcing AirDrop and firewall controls ► Documentation strategy: categorizing rules as enforce, tweak, or exclude for smoother migration ► Creating benchmarks in monitoring mode: aligning existing policies before enforcement to avoid conflicts ► Rule customization: searching by CIS reference numbers or keywords, adjusting screen saver timeouts ► Understanding generated objects: audit policies, remediation policies, extension attributes, and smart groups per OS version ► Extension attribute troubleshooting: deleting P-lists when excluding rules to reset audit policy population ► Declarative device management conflicts: software update and password policy false positives with DDM/blueprints ► Switching to enforcement mode: automatic configuration profile and remediation policy generation 0:00 Introduction: SEEK Environment (1,500 Macs, 850 iOS Devices, 50% Fleet) 2:28 Pre-State: Jamf Compliance Editor Implementation (6-Week Timeline) 3:46 Customizing CIS Level 1: Excluding Bluetooth Menu Bar, Allowing AirDrop 5:29 Documentation Strategy: Categorizing Rules as Enforce, Tweak, or Exclude 7:06 Compliance Benchmarks Overview: Platform Services and Template Availability 7:46 Creating Benchmark in Monitoring Mode: Wizard Walkthrough and Rule Selection 9:07 Customizing Rules: Adjusting Screen Saver Timeout and Excluding Unwanted Controls 10:04 Rule Report: Identifying Failing Devices and Blueprint/Declarative Conflicts 12:21 Declarative Device Management Conflicts: Software Update False Positives with DDM 14:34 Switching to Enforcement Mode: Automatic Configuration Profile Generation 16:20 Understanding Remediation Policies: Reset and Check-Fix Logic 17:55 Handling Benchmark Updates: macOS Tahoe Release Day (5-Minute Update) 20:05 Recent Feature Additions: Rule Editing, PDF/CSV/Excel Export, NIST Templates 21:03 Current Limitations: Declarative Support, Device Exemptions, Target OS Scoping 22:57 SSH Remediation Loops: Users with Local Admin Re-Enabling Daily 24:25 Migration Verdict: 100% Recommend for Ease of Maintenance and Collaboration 29:22 Troubleshooting Reporting Delays and FileVault Profile Strategy #compliancebenchmarks #JamfComplianceEditor #mSCP #NISTbaselines #macOScompliance #JamfPro Who This Video Is For: Jamf administrators currently using Jamf Compliance Editor seeking migration guidance Security teams implementing CIS or NIST baselines for the first time Organizations managing multi-OS fleets requiring per-version scoping Mac admins troubleshooting extension attribute failures and policy conflicts Teams evaluating compliance benchmarks vs. manual mSCP implementation Key Technologies Covered: Jamf Pro compliance benchmarks, Jamf Compliance Editor, macOS Security Compliance Project (mSCP), CIS Level 1 benchmarks, NIST baselines, extension attributes, audit policies, remediation policies, declarative device management (DDM), Jamf account SSO, Splunk compliance dashboards Related Topics: Migration strategies, monitoring vs. enforcement modes, FileVault profile preservation, declarative conflicts resolution, SSH remediation loops, compliance trend reporting, rule exclusion workflows, benchmark update management, PDF/CSV/Excel export