Presentation is loading. Please wait.

Presentation is loading. Please wait.

Macintosh Configuration Management Will Jorgensen 1.

Similar presentations


Presentation on theme: "Macintosh Configuration Management Will Jorgensen 1."— Presentation transcript:

1 Macintosh Configuration Management Will Jorgensen 1

2 Overview 2

3 In the beginning… 3

4 Imaging is our Foundation Apple Software Restore Mac OS X Baseline Configuration Network Registration & MHP Setup 4 CIS Benchmark http://www.cisecurity.org/bench_osx.html Apple Security Configuration Guide http://images.apple.com/server/macosx/docs/Leopard_Security_Config_2nd_Ed.pdf

5 MHP Setup 5

6 User takes over Configure FileVault Install non-core applications Setup a backup strategy 6

7 FileVault Laptops and offsite computers Single encryption key /Library/Keychains/FileVaultMaster.keychain Tightly controlled decryption key 7

8 Installing Applications PNNL Installer Users still administrators Minimum required software Symantec AntiVirus PNNL Configuration Tool 8

9 Backup Policy “Make backup copies of software, application, and data files. The frequency of the backup is based on the matter’s value, the frequency and volume of changes, and ease of restoration from loss or corruption. For example, data files that continually change should be backed up more frequently than static files or less dynamic data. For sensitive systems, backup requirements are established in computer security plans. For information on workstation backup services, see Data Backup Options on InfoSource.”Data Backup Options on InfoSource. 9

10 Workstation Backup and Restore File Share & Tri-Backup Flexible Browse in Finder Time Machine Efficient Flexible 10

11 Configuration Management Apple Remote Desktop Workgroup Manager Active Directory MCM or the PNNL Configuration Tool 11

12 Golden Triangle Active Directory 2003 User Accounts Kerberos Mac OS X Server Preference Management Web Services 12

13 Apple Remote Desktop ARD 3 Help Desk Tool Back door 13

14 Macintosh Configuration Management (MCM) Server Side Web server Client Side Shell scripts and applications Checks in every 60 minutes 14

15 MCM Process Flow 15

16 Challenges Intermittent network connections Sometimes things just don’t work Audit and Enforcement Resource constraints 16

17 Enhancements Manage Firewall Settings Staff log in with user accounts Full disk encryption InstaDMG Connected Backup 17

18 Summary 18 Questions/Comments Will@pnl.gov


Download ppt "Macintosh Configuration Management Will Jorgensen 1."

Similar presentations


Ads by Google