Generating an SSH Key Pair Step 1 ssh-keygen -t rsa Step 2, you should find this .pem file in the root of your user folder openssl genrsa -out key.pem 2048…
Shift-Option-K — type' the Apple symbol Below are the Unicode hex numbers for the most common symbols used to represent Mac control keys. You can type these by finding…
This is a fantastic resource for How to create an LDAPS Configuration with Jamf Pro. Link: How to create an LDAPS Configuration with Jamf Pro. - Rubyraccoon https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority Configuring Jamf…
Using OpenSSL to Create a Certificate Keystore for Tomcat Link: https://docs.jamf.com/technical-articles/Using_OpenSSL_to_Create_a_Certificate_Keystore_for_Tomcat.html Step 1: Creating a Public Certificate for Your Jamf Pro Server To create and configure a public certificate for…
Jamf Threat Labs team created Aftermath, a Swift-based, open-source incident response framework tailor-made for macOS. After a security incident has occurred, rapid collection can take place with Aftermath running a…
Last updated on Sep 12, 2022 Find answers to commonly asked questions about Pantone Color books. Color system manufacturers like Pantone create standardized colors for relaying color information across apps…
Bob Gendler one of the macOS Security Compliance Project (mSCP) Authors has posted some (FANTASTIC) scripts that will help integrate your mSCP project into a jamf instance. This will help…
MySQL Windows distributions use an MSI installer with user-selectable options at various stages of the installation. The Logging Options page displays the log enabling and location defaults and also allows…
NAME cat - concatenate files and print on the standard output SYNOPSIS cat [OPTION]... [FILE]... Here Document: the here document syntax can be used with the cat command: cat >…
6.1. Enforce Multifactor Authentication for Login The system MUST be configured to enforce multifactor authentication. All users MUST go through multifactor authentication to prevent unauthenticated access and potential compromise to…