Inventory Management For Mac Os X

-->

Mar 22, 2018  An alternative is to implement Mac OS X® Server on its own system; Apple Profile Manager can then be used to set Mac policies based on AD groups. This entails setting up an Apple Open Directory domain alongside the AD service, which can make management easier in the long term. Free download Inventoria Inventoria for Mac OS X. Inventoria is a business inventory management and stock control program that lets you manage and monitor your inventory with Inventoria to help streamline your operations and boost profits. Network Inventory Advisor for Mac is a full-featured Mac inventory solution built natively for OS X. It's free for up to 10 Macs to be scanned, fast and easy to setup and run. Dec 31, 2019  As Mac continues to grow in popularity around the world, you need to to deploy, connect, inventory and secure this influx of devices. Sure, there are many Mac management solutions to choose from. But most lack the functionality for full lifecycle management, connection and state-of. May 27, 2020  The Home Inventory installer is commonly called homeinventory.dmg or homeinventory.zip etc. This program was developed to work on Mac OS X 10.7.4 or later. This Mac download was scanned by our built-in antivirus and was rated as safe. This software for Mac OS X was originally produced by Binary Formations, LLC.

Applies to: Configuration Manager (current branch)

You can install the Configuration Manager client on Mac computers that run the Mac OS X operating system and use the following management capabilities:

Mac Os X Version History

Mac os x lion

Mac Os X Download

  • Hardware inventory

    You can use Configuration Manager hardware inventory to collect information about the hardware and installed applications on Mac computers. This information can then be viewed in Resource Explorer in the Configuration Manager console and used to create collections, queries and reports. For more information, see How to use Resource Explorer to view hardware inventory.

    Configuration Manager collects the following hardware information from Mac computers:

    • Processor

    • Computer System

    • Disk Drive

    • Disk Partition

    • Network Adapter

    • Operating System

    • Service

    • Process

    • Installed Software

    • Computer System Product

    • USB Controller

    • USB Device

    • CDROM Drive

    • Video Controller

    • Desktop Monitor

    • Portable Battery

    • Physical Memory

    • Printer

    Important

    You cannot extend the hardware information that is collected from Mac computers during hardware inventory.

  • Compliance settings

    You can use Configuration Manager compliance settings to view the compliance of and remediate Mac OS X preference (.plist) settings. For example, you could enforce settings for the home page in the Safari web browser or ensure that the Apple firewall is enabled. You can also use shell scripts to monitor and remediate settings in MAC OS X.

  • Application management

    Configuration Manager can deploy software to Mac computers. You can deploy the following software formats to Mac computers:

    • Apple Disk Image (.DMG) Download quicktime x.

    • Meta Package File (.MPKG)

    • Mac OS X Installer Package (.PKG)

    • Mac OS X Application (.APP)

    When you install the Configuration Manager client on Mac computers, you cannot use the following management capabilities that are supported by the Configuration Manager client on Windows-based computers:

  • Client push installation

  • Operating system deployment

  • Software updates

    Note

    You can use Configuration Manager application management to deploy required Mac OS X software updates to Mac computers. In addition, you can use compliance settings to make sure that computers have any required software updates.

  • Maintenance windows

  • Remote control

  • Power management

  • Client status client check and remediation

    For more information about how to install and configure the Configuration Manager Mac client, see How to deploy clients to Macs.

This article applies to: Endpoint Management Tools

This page is intended for IT support professionals. End users should contact local IT support.

With JSS you can execute four commands to help you manage the security of managed computers: Lock Computer, Remove MDM Profile, Wipe Computer, or Send Blank Push.

Inventory Management For Mac Os X 10 13 Download

Lock

If a computer that does not contain sensitive data becomes misplaced or stolen, you may elect to simply 'Lock' the computer, which renders the computer unusable to a would-be thief or someone who may encounter the computer during their travels. This command will execute the next time the computer shows up on a network with internet access. If the computer is recovered, you can simply 'Unlock' the computer with a passcode that you define.

Remove MDM Profile

If a computer no longer needs to be managed for whatever reason, you can choose to send an 'Unenroll' command. This command breaks the relationship between the JSS server and the computer you wish to unenroll; it will execute the next time the computer is on network with internet access. Users of that computer will no longer be able to access Self-Service software, and Admins will no longer be able to assign policies or other management tasks to the computer.

Download

Mac Os X Lion

Wipe

If a computer contains sensitive data and becomes misplaced or stolen (or you're unsure if it holds sensitive data), you may elect to send a 'Wipe' command to the computer. This command wipes the contents of the computers hard drive rendering it un-usable; it executes the next time the computers shows up on a network with internet access. If the computer is recovered later it will need to be unlocked and re-imaged.

Send Blank Push

Sends a blank push notification, prompting the computer to check in with Apple Push Notification service (APNs).

  • None of these four commands remove the computer from the JSS inventory.
  • The 'Wipe' and 'Lock' commands require that the machine has an OS X Recovery Partition. The OS X Recovery Partition is on all new Macs by default, and is created on older Macs when OS X 10.7+ is installed for the first time.
  1. Log into your JSS site at https://jssmgt.it.cornell.edu/<JSSInstance>
    replacing <JSSInstance> with your instance's name.
    For example, https://jssmgt.it.cornell.edu/limnology
  2. Click .
  3. If desired, enter a search string, then click .
  4. Find the computer you wish to run the remote command against.
  5. Click the name of the computer.
  6. Click the Management tab.
  7. Click the icon for the desired command.

Lock and Wipe will ask you to create a passcode, which you can use when the computer is recovered.

The next time the computer contacts the JSS, the command you specified will execute.

You can check the status of these remote commands on the computer's Details page, on the History panel. The Pending Commands tab allows you to cancel a remote command that has not yet run.