Jamf Blog
September 30, 2020 by Haddayr Copley-Woods

Protecting your Mac fleet with Jamf Protect

This session was for beginners wanting to learn more about how Jamf Protect can secure their Macs, as well as remediate threats. Kelly Watkins Conrad, a field sales engineer at Jamf, went through an overview of Jamf Protect, how to deploy it to your Mac fleet, how to can use threat prevention to automatically take care of unwanted processes, and finally, how it integrates with Jamf Pro to do customized remediation.

Kelly Watkins Conrad, a field sales engineer at Jamf, offered this beginner's look at what Jamf Protect is and how to use it.

What is Jamf Protect?

Jamf Protect is a Mac-focused rather than Windows-focused apple security solution dedicated to the detection, prevention and remediation of Mac-specific threats. This mac endpoint protection takes advantage of native frameworks and tools already built into macOS. We continually identify ways to enhance those native features to provide a comprehensive coverage.

Monitoring and compliance

Baseline mac security is great, and Apple does a great job. But there are layers to add on that will offer far more comprehensive understanding and coverage. First: visibility. With Jamf Protect, users get all of the event data. Users can also see important information such as the file path and hash information for a security event.

Our imbedded dashboard allows users to view all security events in all of the Mac's native tools. Protect collects insights allowing you to craft a tailored report specific to you and your security needs.

You can drill down into each for more detail to see which computers are and are not compliant.

Threat detection

Our analytics are rules that detect threats or unwanted behaviors on your Mac. You can choose which ones to be logged and which ones you want logged with an immediate alert.

In order to do a proper security analysis, you need as much contextual data as possible. That's why Jamf Protect offers unified logs. Without that, it's like a jigsaw puzzle with half of the pieces missing.

Unified logs combine user data, processes, etc. that was previously siloed on each Mac, giving you a complete picture of the events.

To analyze that data, most organizations use SIMs. Jamf Protect data is easily searchable and readable in most SIMS, and with filters, you can collect activity like login attempts, password changes or airdrops. While these may be unremarkable on one computer or once in a while, when visualized in a SIM for your whole fleet you have the ability to get the entire story instead of just the Cliff Notes.

Threat prevention

Jamf Protects built-in features detects, blocks, and quarantines malicious processes on the Mac. Jamf Protect detects, blocks, and quarantines known threats.

To address threats that are executions of known bad malware, Jamf Protect's mac malware protrecognizes signature matches and then blocks the process and removes the threat immediately. We collect a robust set of data for all of these processes. The binary, path, and patch information helps security teams to remediate and prevent.

Jamf Protect keeps you up-to-date on version changes in the database as well as your own custom blocking of processes.

Threat Remediation

Behavioral-based detection allows for preventing users from accidentally installing fake product installs with heuristic detection. Jamf Protect automatically pushes a policy from Jamf Pro, making user aware of what actions were taken to protect their computer or the network, such as quarantine. Data includes specifics such as what url this was downloaded from, etc. It allows you to make the best decisions for how to protect your Mac Fleet.

Deploying Jamf Protect

Watkins Conrad ran through a demonstration of how to deploy, which you can see by registering for JNUC 2020 and searching for the session.

These are the steps:

  1. Create an action: determine where the data will go and how you would like alerts and logs.
  2. Create a plan: decide what you want the Jamf Protect agent configuration and communication protocols with which analytics you want.
  3. Create a deployment: give the package a name, select the latest version of the Jamf Protect binary, select the plan, and choose the log level and error reporting you prefer.
  4. Download the package and then upload into Jamf Pro.
  5. Create a policy in Jamf Pro for deploying the Jamf Protect plan, configure it, scope it and deploy it.
  6. Download Jamf Protect PPPC Profile from GitHub and upload it into your config profiles. Find the Mac you want to deploy it to, and hit 'save.'

That's it! You're fully secured with Jamf Protect.

With the power of Jamf Protect in your hands, you have 100% confidence that your Mac fleet is secure while also allowing for the best end-user experience.

View the full Jamf Protect JNUC video to see the demonstration and learn more detail.

Photo of Haddayr Copley-Woods
Haddayr Copley-Woods
Jamf
Haddayr Copley-Woods is a senior copywriter at Jamf. She writes about tech, specializing in Apple and Jamf with a focus on education, accessibility and security.
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.