![]() ![]() Add the computer group that is designated for isolated endpoints.Confirm that the Exclusions section is highlighted, and then click + Add.Click Edit, add a Target Group of the smart computer group Red Canary – Network Isolation Enforced. ![]() Click Configure, and then click Add and select the isolation revert script created in Step 5.Step 8: Jamf Pro–Setup your isolation revert policy For more information see, Recurring Check-in Frequency. Note: This type of isolation will occur at the recurring check-in frequency configured in Jamf Pro as notated in the Jamf Pro console. Add the static computer group (created in step 1) that is designated for isolated endpoints.Confirm that the Targets section is highlighted, and then click + Add.Click Configure, and then click Add and select the isolation script created in Step 4.This will increase security by continually running this script to maintain isolation. (Optional) Set Execution Frequency to Ongoing.Select Enabled, and then select Recurring Check-in.From your Jamf Pro dashboard, click Policies.Step 7: Jamf Pro–Setup your isolation policy Create a smart computer group that looks for the value return of the extension attribute just added.Get the Extension Attribute from the Jamf Protect repo linked above and add it to Jamf Pro.Step 6: Jamf Pro–Setup your Extension Attribute Click Script, and then copy the contents of endpoint_network_isolation_revert.sh from Github into the Jamf Pro editor.To create your isolation revert script, click +New.Step 5: Jamf Pro–Setup your isolation revert script Click Script, and then copy the contents of endpoint_network_isolation_enforce.sh from GitHub into the Jamf Pro editor.To create your isolation script, click +New.Click Computer Management, and then click Scripts.From your Jamf Pro dashboard, click Management Settings.Step 4: Jamf Pro–Setup your isolation script Use this article to access the extension attribute from Jamf Protect and add to Jamf Pro. Step 3: Github–Access your Extension Attribute Use this article to access the correct isolation enforce and isolation revert scripts. Step 2: Github–Access your isolation enforce and isolation revert scripts ![]() Use this article to set up your static group in Jamf Pro. Step 1: Red Canary–Configure your isolation static group in Jamf Pro By implementing the scripting and recommendations outlined in this document, Jamf endpoints will be properly restricted while using Red Canary isolation functionality.įollow the procedure from beginning to end. This article leads you through the process of isolating Jamf endpoints with Security Orchestration, Automation, and Response (SOAR) scripts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |