Atnaujinkite slapukų nuostatas

El. knyga: Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs

4.38/5 (13 ratings by Goodreads)
  • Formatas: PDF+DRM
  • Išleidimo metai: 21-Feb-2023
  • Leidėjas: APress
  • Kalba: eng
  • ISBN-13: 9781484291566
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Išleidimo metai: 21-Feb-2023
  • Leidėjas: APress
  • Kalba: eng
  • ISBN-13: 9781484291566
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away.

You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. 

With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort.  

This thoroughly revised and expanded Second Edition provides new coverage and updates on daemons and agents, declarative management, Gatekeeper, script options, SSO tools, Azure/Apple Business Essentials integrations and much more.

You will
  • Deploy profiles across devices effectively and securely
  • Install apps remotely both from the app store and through custom solutions
  • Work natively with Apple environments rather than retrofitting older IT solutions 
Who This Book Is For

Mac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.

About the Authors xv
About the Technical Reviewer xvii
Preface xix
Chapter 1 The Evolution of Apple Device Management
1(60)
The Classic Mac Operating Systems
3(1)
Network Protocols
4(3)
Early Device Management
7(3)
NeXT
10(3)
Mac + Unix = Mac OSX
13(4)
Server
17(7)
Apple Remote Desktop
24(2)
Ecosystem Coexistence
26(2)
IOS Device Management
28(2)
Mobile Device Management
30(3)
Apple Device Management Programs
33(2)
Enterprise Mobility
35(4)
IOS + Mac OSX = macOS
39(5)
One More Thing: tvOS
40(1)
Imaging Is Dead?
40(4)
Macos -- Unix = appleOS
44(3)
Moving Away from Active Directory
47(1)
The Apple Admin Community
48(8)
Conferences
49(5)
Online Communities
54(2)
User Groups
56(2)
Summary
58(3)
Chapter 2 Agent-Based Management
61(74)
Daemons and Agents
62(10)
Use Lingon to See and Change Daemons and Agents Easily
66(4)
Controlling LaunchDaemons with launchctl
70(2)
Deeper Inspection: What Does the App Have Access To?
72(1)
Third-Party Management Agents
73(49)
Addigy
73(5)
FileWave
78(2)
The Once Mighty Fleetsmith
80(4)
Jamf
84(5)
Munki
89(18)
Osquery
107(9)
Chef
116(3)
Edit a Recipe
119(2)
Puppet
121(1)
Use Git to Manage All the Things
122(5)
The Impact of UAMDM and Other Rootless Changes to macOS
127(2)
Rootless
129(1)
Frameworks
129(2)
Miscellaneous Automation Tools
131(1)
Summary
132(3)
Chapter 3 Profiles
135(72)
Manually Configure Settings on Devices
136(14)
Use Apple Configurator to Create a Profile
150(51)
View the Raw Contents of a Profile
162(4)
Install a Profile on macOS
166(4)
Install a Profile on iOS
170(6)
Install a Profile ontvOS
176(6)
View a Profile from macOS
182(3)
View a Profile from iOS
185(4)
View a Profile from tvOS
189(2)
Remove a Profile on macOS
191(2)
Remove a Profile on iOS
193(5)
Remove a Profile on tvOS
198(2)
Effects of Profile Removal
200(1)
Use the Profiles Command on macOS
201(5)
Using the Profiles Command
202(2)
MCX Profile Extensions
204(2)
Summary
206(1)
Chapter 4 MDM Internals
207(74)
WhatMDM Can Access
208(1)
Apple Business Manager and Apple School Manager
209(6)
Buy Apps to Distribute with MDM
215(4)
Apple Push Notifications
219(2)
Check-Ins: Device Enrollment
221(6)
MDM: Device Management
227(2)
MDM Commands
229(9)
Automated Enrollment, or DEP
238(4)
The Reseller DEP API
238(1)
The Cloud Service DEP API
239(3)
Mdmclient
242(2)
Device Supervision
244(1)
UAMDM
245(5)
Enrollment Commands
250(10)
The Impact of UAMDM
251(9)
Enable APNs Debug Logging
260(5)
App Deployment
265(5)
Gift and VPP Codes
266(1)
Volume Purchase Program
267(3)
Managed Open-In
270(1)
Host an .ipa on a Web Server
271(3)
Sign and Resign macOS Applications
274(4)
App Notarization
275(3)
Summary
278(3)
Chapter 5 IOS Provisioning
281(62)
IOS Provisioning
283(6)
Prepare an iOS Device Using Apple Configurator
284(1)
Install Apple Configurator
284(3)
Create Blueprints
287(2)
Manage Content
289(46)
Add Certificates for 802.1x with Profiles to Blueprints
289(6)
Install Apps with Apple Configurator
295(2)
Automate Enrollment with Apple Configurator
297(5)
Change Device Names Using Apple Configurator
302(2)
Change Device Wallpaper with Apple Configurator
304(3)
Prepare a Device
307(6)
Debugging Apple Configurator Logs
313(1)
Using an ipsw Operating System Bundle to Restore Devices
314(2)
Device Supervision Using Manual Configurations
316(5)
Automating iOS Actions
321(11)
Using AEiOS to Create Workflows
332(3)
Caching Services
335(6)
What's Cached?
335(1)
Caching Service Configuration
336(5)
Summary
341(2)
Chapter 6 Mac Provisioning
343(26)
Macos Startup Modifier Keys
344(2)
Macos Provisioning with ADE
346(3)
DEPNotify
349(1)
Octory
349(1)
Macos Provisioning Without ADE
349(10)
Installation
350(1)
Create a Workflow
350(9)
Imagr
359(1)
Upgrades and Installations
359(9)
Reprovisioning a Mac
362(5)
Virtual Machines
367(1)
Parallels
368(1)
UTM
368(1)
Summary
368(1)
Chapter 7 Endpoint Encryption
369(66)
IOS Encryption Overview
369(4)
Enabling Encryption on iOS
373(3)
Macos Encryption Overview
376(4)
Secure Token
380(1)
Bootstrap Token
381(53)
Enabling Encryption on macOS
382(4)
FileVault Recovery Keys
386(2)
FileVault 1 and the FileVaultMaster.keychain File
388(2)
Creating an Institutional Recovery Key
390(9)
Enabling FileVault 2 Encryption for One or Multiple Users
399(10)
Enabling FileVault 2 Encryption Using One or Multiple Recovery Keys
409(4)
Disabling FileVault 2 Encryption
413(4)
Listing Current FileVault 2 Users
417(1)
Managing Individual and Institutional Recovery Keys
418(4)
Removing Individual and Institutional Recovery Keys
422(4)
Recovery Key Reporting
426(4)
Reporting on FileVault 2 Encryption or Decryption Status
430(4)
Summary
434(1)
Chapter 8 Securing Your Fleet
435(78)
Securing the Platform
435(2)
Mac Security
437(9)
Signed System Volume
437(1)
System Integrity Protection
438(3)
SIP-Protected Directories
441(2)
View SIP Protections Interactively
443(1)
Runtime Protections
444(1)
Kernel Extension Protections
445(1)
Managing System Integrity Protection
446(11)
Signed System Volume and csrutil
450(1)
Running csrutil Outside of the Recovery Environment
451(2)
Custom System Integrity Protection Configuration Options
453(2)
System Integrity Protection and Resetting NVRAM
455(2)
User-Level Protections
457(3)
Detect Common Vulnerabilities
460(2)
Manage the macOS Firewall
462(2)
Combat Malware on macOS
464(4)
XProtect and Gatekeeper
465(3)
Isquarantine
468(13)
Using Isregister to Manipulate the Launch Services Database
470(3)
Changing File Handlers
473(1)
MRT
474(4)
Signing Applications
478(1)
ClamAV
479(2)
Threat Management on iOS
481(3)
Macos Binary Whitelisting
484(14)
Compliance
487(1)
Centralized Log Capture and Analysis
488(1)
Writing Logs
488(1)
Reading Logs
489(2)
Organization and Classification
491(1)
Comparisons and Searches
492(2)
OpenBSM
494(4)
Reverse Engineering
498(5)
Administrator Rights on macOS
503(7)
Summary
510(3)
Chapter 9 A Culture of Automation and Continuous Testing
513(74)
From Manual to Automated Testing
514(1)
Scripting and the Command Line
515(2)
Command-Line Basics
517(7)
Basic Shell Commands
519(5)
Shell Scripting
524(60)
Declaring Variables
526(4)
Expanding on Z Shell
530(3)
Altering Variables (Mangling)
533(4)
Standard Streams and Pipelines
537(3)
If and Case Statements
540(6)
For, While, and Until Statements
546(3)
Arrays
549(1)
Exit Codes
550(2)
More Advanced Shell Script Logic
552(8)
Manual Testing
560(4)
Automated Testing
564(6)
Posting Issues to Ticketing Systems
570(2)
Simulating iOS Environments with the Xcode Simulator
572(4)
API Orchestration
576(6)
Release Management
582(2)
Summary
584(3)
Chapter 10 Directory Services
587(32)
Manually Bind to Active Directory
589(8)
Bind the Easy Way
589(3)
Bind with the Directory Utility
592(5)
Test Your Connection with the id Command
597(2)
Use dscl to Browse the Directory
599(5)
Programmatically Binding to Active Directory
604(2)
Bind to Active Directory Using a Profile
606(8)
Beyond Active Directory
612(1)
All the Benefits of Binding Without the Bind
613(1)
Apple Enterprise Connect
614(1)
Apple Kerberos SSO Extension
614(4)
Summary
618(1)
Chapter 11 Customize the User Experience
619(18)
Getting iOS and iPadOS Devices in the Hands of Users
620(1)
Macos
621(1)
Planning the macOS User Experience
621(1)
Transparency Consent and Control Protections on User Home Folders
622(2)
Using Profiles to Manage User Settings
624(4)
Using Scripts to Manage User Settings
628(1)
Modifying the macOS Default User Template
629(2)
Customize the Desktop
630(1)
Customize the User Preferences
631(1)
Configure the iOS Home Screen
631(3)
Custom App Stores
634(1)
Test, Test, Test
635(1)
Summary
636(1)
Chapter 12 Identity and Device Trust
637(70)
Use IdPs for User Identities
638(1)
REST and Web Authentication
639(5)
JSON
640(1)
Use JWTs As Service Accounts
641(2)
Bearer Tokens
643(1)
OAuth
644(4)
WebAuthn
648(1)
OpenID Connect
649(4)
SAML
650(3)
Cookies
653(1)
ASWebAuthSession
654(10)
Work with Azure Active Directory
656(6)
View SAML Responses
662(2)
Use Jamf Connect to Authenticate to an IdP at the Login Window
664(7)
Configure Jamf Connect Login
666(5)
Alternatives to Jamf Connect
671(2)
Use Azure AD for Conditional Access
673(1)
Configure the Jamf Integration with Intune
674(5)
Beyond Authentication
679(1)
Multifactor Authentication
679(1)
Microsoft Authenticator
680(14)
Mobilelron Access
681(1)
Conditional Access for Google Workspace
682(3)
Enable the Necessary APIs
685(2)
Create a Service Account
687(2)
Create Your Google Cloud Function
689(5)
Duo Trusted Endpoints
694(1)
Managed Apple IDs Continued
695(1)
Managed Apple IDs in Schools
695(1)
Managed Apple IDs for Business
696(1)
Webhooks
696(4)
Working with the Keychain
700(4)
Summary
704(3)
Chapter 13 The Future of Apple Device Management
707(36)
Balanced Apple Scorecard
708(34)
The Tools
712(1)
The Near Future
713(2)
The Apple Product Lines
715(2)
Apps
717(12)
Getting Apps to Devices
729(3)
Manage Only What Is Necessary
732(1)
The Future of Agents
733(2)
Other Impacts to Sandboxing
735(1)
IOS, macOS, tvOS, and watchOS Will Remain Separate Operating Systems
736(1)
Will iOS Become Truly Multiuser?
737(1)
Changes in Chipsets
738(2)
You're Just Not an "Enterprise" Company
740(1)
Apple Is a Privacy Company
741(1)
Summary
742(1)
Appendix A The Apple Ecosystem 743(24)
Appendix B Common Apple Ports 767(16)
Appendix C Configure macOS Lab Virtual Machines with UTM 783(14)
Appendix D Conferences, Helpful Mac Admins, and User Groups 797(10)
Appendix E Set Up a Test Okta Account 807(8)
Index 815
Charles Edge is the Director of the Marketplace at Jamf. He holds 30 years of experience as a developer, administrator, network architect, product manager and CTO. He is the author of 20 books and more than 6,000 blog posts on technology, and has served as an editor and author for many publications. Charles also serves on the board of multiple companies and conferences, and frequently speaks at industry conferences around the world, including DefCon, BlackHat, LinuxWorld, the Apple Worldwide Developers Conference, and a number of Apple-focused conferences. Charles is also the author of krypted.com and a cohost of the MacAdmins Podcast. 





Rich Trouton has been doing Macintosh system and server administration for 20+ years and has supported Macs in a number of different environments, including university, government, medical research, advertising and enterprise software development. His current position is at SAP, where he works with the rest of the Apple CoE team to support SAP's Apple community.