![]() ![]() ![]() How does Jamf work?Ī Jamf infrastructure is a cloud-based group of servers that communicate with Trinity Colleges’ infrastructure to provide a database of device and user information and data storage for programs, applications, and updates. The Library and Information Technology Division administers the system, but the configuration is coordinated closely with the Distributed Computing Specialists Team. Additionally, Jamf installs the Self Service application and Profiles in System Preferences. The agent runs in the background and will not interfere with the operation of your computer. Jamf installs the agent to your computer. Yes What changes does the installation of Jamf make to a Mac? Can I connect to Self Service when I am off-campus? Double-click any application to install it. To access Self Service, open your Applications folder and double click Self Service, and it will open in a new window. Self Service gives you the flexibility of choosing what to install and when to install it. Software purchased through Trinity’s Information Technology Services will also be available for download through Self Service. Self Service is similar to Apple’s App Store, but it provides college-approved software for college-owned Apple systems. Applications provided by the college will be provided through Jamf’s Self Service app, located in Applications (see below), while some software will be deployed as needed or requested. Most new software installations can be initiated by users just as they always have done. When programs are open, the alerts look like this: Microsoft apps are updated monthly and installed automatically if the programs are closed. App Store updates are installed daily around midnight, where 3rd party apps might have their schedule. Software updates are downloaded to your computer in the background at a speed that allows your computer tasks to proceed without interruption or delay. Jamf’s software updates and patching will usually be invisible to you. Recover Stolen Devices: Jamf can remotely lock a device and retrieve its location if reported to be lost or stolen.Consistency: Devices can all have standard settings, certificates, and other required Trinity settings automatically handled.Also, a remote wipe of a device can be requested and completed if a device is lost or stolen. Privacy & Confidentiality: User data and files remain confidential. ![]() Users can still order additional apps from Information Technology Services, placed in the Trinity company portal.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |