Download presentation
Presentation is loading. Please wait.
Published byCecil Berry Modified over 9 years ago
1
Macintosh Configuration Management Will Jorgensen 1
2
Overview 2
3
In the beginning… 3
4
Imaging is our Foundation Apple Software Restore Mac OS X Baseline Configuration Network Registration & MHP Setup 4 CIS Benchmark http://www.cisecurity.org/bench_osx.html Apple Security Configuration Guide http://images.apple.com/server/macosx/docs/Leopard_Security_Config_2nd_Ed.pdf
5
MHP Setup 5
6
User takes over Configure FileVault Install non-core applications Setup a backup strategy 6
7
FileVault Laptops and offsite computers Single encryption key /Library/Keychains/FileVaultMaster.keychain Tightly controlled decryption key 7
8
Installing Applications PNNL Installer Users still administrators Minimum required software Symantec AntiVirus PNNL Configuration Tool 8
9
Backup Policy “Make backup copies of software, application, and data files. The frequency of the backup is based on the matter’s value, the frequency and volume of changes, and ease of restoration from loss or corruption. For example, data files that continually change should be backed up more frequently than static files or less dynamic data. For sensitive systems, backup requirements are established in computer security plans. For information on workstation backup services, see Data Backup Options on InfoSource.”Data Backup Options on InfoSource. 9
10
Workstation Backup and Restore File Share & Tri-Backup Flexible Browse in Finder Time Machine Efficient Flexible 10
11
Configuration Management Apple Remote Desktop Workgroup Manager Active Directory MCM or the PNNL Configuration Tool 11
12
Golden Triangle Active Directory 2003 User Accounts Kerberos Mac OS X Server Preference Management Web Services 12
13
Apple Remote Desktop ARD 3 Help Desk Tool Back door 13
14
Macintosh Configuration Management (MCM) Server Side Web server Client Side Shell scripts and applications Checks in every 60 minutes 14
15
MCM Process Flow 15
16
Challenges Intermittent network connections Sometimes things just don’t work Audit and Enforcement Resource constraints 16
17
Enhancements Manage Firewall Settings Staff log in with user accounts Full disk encryption InstaDMG Connected Backup 17
18
Summary 18 Questions/Comments Will@pnl.gov
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.