Guide for Apple IT: Introduction to Mac Scripting

In this beginner-friendly guide, we’re going to walk you through the building blocks of Mac scripting, and then we’ll see how using scripts with your mobile device management (MDM) solution can help IT more effectively manage company owned devices. Here’s a quick overview of some of the topics we’ll cover: What are Scripts? Using Scripts with an MDM Solution Terminal Commands vs. Shell Scripts What are Shells: Bash vs. Zsh? Basics of Scripting with Bash What are Scripts? Scripts are …

Keep Reading

Introducing 120+ New Apple Device Restrictions

Today, Kandji admins have 120 new one-click configurations at their fingertips. This new set of Apple device configurations is based on Apple’s Restrictions profile, which restricts the ability for users to take certain actions on devices such as accessing a specific app, service, or function. Although the range of restrictions available is vast (for example, IT could do anything from deferring an OS software update to disallowing the use of Siri), the goal is to standardize device settings across your …

Keep Reading

Guide for Apple IT: Device Enrollment (UAMDM, TCC, and Device Supervision)

For any business that runs on Apple, choosing the right device enrollment method is essential to speed up onboarding and provide the right balance between privacy (for corporate and personal data) and management capabilities. In this guide, we’re going to take a look at three device enrollment methods that Apple offers, breaking down their strengths, weaknesses, and ideal use cases. We’ll also discuss how they relate to important privacy and policy topics like user approved MDM (UAMDM) status, “Transparency, Consent, …

Keep Reading

CIS Checklist for macOS

With so many business operations relying on computers, your organization’s cybersecurity practices are your only defense against digital threats. Thankfully, the Center for Internet Security (CIS) has created the go-to security framework for securing your macOS devices, and in this guide, we’re going to share a macOS CIS checklist so you can see what it takes to comply with their standards. By following these standards, your organization can rest assured that their devices are protected from cybersecurity threats and costly …

Keep Reading

Guide for Apple IT: App Deployment for macOS

In this Apple app deployment guide, we’ll cover everything Apple IT teams need to know about app purchasing and distribution for your organization. We’ll focus on four major topics: What are Apple VPP Apps (App Store Apps)? What are Third-Party Apps (Custom Apps)? How Do I Purchase Them? How Do I Deploy Them? With Volume Purchase Program (VPP) being replaced by Apple Business Manager, considerable changes are coming to how IT administrators purchase, manage, and deploy apps. We’ll start with …

Keep Reading

Introducing macOS Security and Compliance

Every company will at some point encounter the need to comply with a specific security or compliance framework, whether it’s to win a major customer, fulfill requirements to complete a round of funding or acquisition, or simply to prove that your company is secure, reliable, and worth doing business with. That’s why we were surprised to learn that, for Macs in the workplace, there was no straightforward solution to meeting any of the major security standards or compliance mandates. Many …

Keep Reading

Kandji Emerges from Two-Year Stealth with Funding from First Round Capital

This news was originally published on TechCrunch. This article is reposted from a PRWeb press release. The Kandji team is excited to publicly announce commercial availability of our Apple MDM solution and $3.4 million in seed funding after more than two (2) years in stealth mode, which consisted of heavy product development and investment in our growing customer base. Our seed round funding was led by First Round Capital with Josh Kopelman as lead partner. Maynard Webb’s investment firm, Webb …

Keep Reading