Macintosh Configuration Management Will Jorgensen 1.

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

Sayed Ahmed BSc. Eng. in Computer Science and Eng., BUET, Bangladesh MSc. in Computer Science, U of Manitoba, Canada
Introducing FailSafeSolutions Online Backup Software.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
The System Center Family Microsoft. Mobile Device Manager 2008.
Objectives Overview Define an operating system
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Module 1: Installing Windows XP Professional
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Overview Basic functions Features Installation: Windows host and Linux host.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Netop Remote Control Trusted. Secure. Experienced.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Module 8: Implementing Administrative Templates and Audit Policy.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Normalized Endpoint Computing Research Team Results PSU Technology Solution Mat B. & Alice S.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Presented by: Eric Rosenberg – Student Manager Client Support Behzad Barzideh – Network Manager Stony Brook Remote Support For Students.
Explain the purpose of an operating system
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
Small Business Security Keith Slagle April 24, 2007.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
Apple Remote Desktop Hey! I got some new software for my school. For free. For what?
Sydney Region Servers. Windows 2003 Standard Configuration Able to be supported remotely Antivirus updates managed from server.
Backups When just having a system isn’t enough. 321 Rule of Thumb 3 generations 2 media 1 off-site at least.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Microsoft Installing & Configuring Windows Server Exam Questions Answers Powered By:
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Chapter 1 Introducing Windows Server 2012/R2
Introduction to Operating Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 27: System Security
Bethesda Cybersecurity Club
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Macintosh Configuration Management Will Jorgensen 1

Overview 2

In the beginning… 3

Imaging is our Foundation Apple Software Restore Mac OS X Baseline Configuration Network Registration & MHP Setup 4 CIS Benchmark Apple Security Configuration Guide

MHP Setup 5

User takes over Configure FileVault Install non-core applications Setup a backup strategy 6

FileVault Laptops and offsite computers Single encryption key /Library/Keychains/FileVaultMaster.keychain Tightly controlled decryption key 7

Installing Applications PNNL Installer Users still administrators Minimum required software Symantec AntiVirus PNNL Configuration Tool 8

Backup Policy “Make backup copies of software, application, and data files. The frequency of the backup is based on the matter’s value, the frequency and volume of changes, and ease of restoration from loss or corruption. For example, data files that continually change should be backed up more frequently than static files or less dynamic data. For sensitive systems, backup requirements are established in computer security plans. For information on workstation backup services, see Data Backup Options on InfoSource.”Data Backup Options on InfoSource. 9

Workstation Backup and Restore File Share & Tri-Backup Flexible Browse in Finder Time Machine Efficient Flexible 10

Configuration Management Apple Remote Desktop Workgroup Manager Active Directory MCM or the PNNL Configuration Tool 11

Golden Triangle Active Directory 2003 User Accounts Kerberos Mac OS X Server Preference Management Web Services 12

Apple Remote Desktop ARD 3 Help Desk Tool Back door 13

Macintosh Configuration Management (MCM) Server Side Web server Client Side Shell scripts and applications Checks in every 60 minutes 14

MCM Process Flow 15

Challenges Intermittent network connections Sometimes things just don’t work Audit and Enforcement Resource constraints 16

Enhancements Manage Firewall Settings Staff log in with user accounts Full disk encryption InstaDMG Connected Backup 17

Summary 18 Questions/Comments