Enterprise Mac Administrator’s Guide, Second Edition

Book description

Charles Edge and Bill Smith provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications.

Now in its third edition, Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with organizations instituting device choice and switcher campaigns, where Windows and/or Linux environments are migrating to Mac OS X. There is a steep culture shock with many of these migrations. The products that are used are different, the nomenclature is different, and most importantly the best practices for dealing with the operating system and updates are very different.

Apple provides a number of tools to help automate and guide IT toward managing a large number of Mac OS X computers—it has since before Mac OS X was initially released. However, if you want to put together all of the pieces to tell a compelling story about how to run an IT department or a deployment of Macs, you need to compile information from a number of different sources. This book provides explanations of the technology required.

  • Provides complete solutions for the large- and medium-scale integration of directory services, imaging, and security
  • Complete guide for integrating Macs and Mac OS X into mixed environments with confidence and no down time
  • One-stop volume for IT professionals who need the technical details to get their job done as efficiently and effectively as possible
  • Table of contents

    1. Cover
    2. Title
    3. Copyright
    4. Dedication
    5. Contents at a Glance
    6. Contents
    7. About the Authors
    8. About the Technical Reviewer
    9. Acknowledgments
    10. Introduction
    11. Chapter 1 : Directory Services
      1. Local Accounts
        1. Creating Accounts
        2. Granting Administrative Privileges
        3. The Root Account
        4. How the Local Directory Service Works
        5. Create Additional Local Directory Nodes
      2. Open Directory
        1. LDAP
        2. Kerberos
        3. Configuring Open Directory
        4. Setting Up Open Directory from the Command Line
        5. Setting Up an Open Directory Replica
        6. Using Server to Create New Users
        7. Creating Open Directory Groups
        8. Backing Up Open Directory
      3. Troubleshooting Directory Services
        1. Verifying Authentication
        2. Directory Services Clients
    12. Chapter 2 : Directory Services Clients
      1. Access Directory Servers
        1. Troubleshoot Bonjour Browsing
        2. Verify Directory Services Connectivity
      2. Binding
        1. Binding Combinations
        2. Configuration Profile
        3. Deploying SSL Certificates
        4. Custom LDAP Settings
      3. NIS
      4. Kerberos
      5. Summary
    13. Chapter 3 : Active Directory
      1. Binding to Active Directory
        1. Directory Utility
        2. Home Directories and the Apple Active Directory Plug-in
      2. Binding Local and Domain Administrators to AD
        1. Naming Conventions and Scripting Automated Binding
        2. Map UID and GID
        3. Namespace Support Using dsconfigad
        4. Active Directory Packet Encryption Options
      3. Dual Directory
        1. Nesting
        2. MCX via Dual Directory
        3. MCX via Active Directory
        4. Configuring AD Admin Groups
        5. Nesting Administrators in the Local Admin Group
      4. Third-Party Solutions
        1. Centrify DirectControl
        2. PowerBroker
        3. Thursby ADmitMac
        4. Dell Privileged Access Suite
      5. Summary
    14. Chapter 4 : Storage
      1. Network Storage
        1. Network Connections
        2. File Sharing
      2. Cloud Storage
        1. Work Remotely
      3. Local Storage
        1. Types of Storage
        2. Disk Utility
        3. Disk Usage
        4. Securing Local Storage
      4. Managing Permissions
        1. POSIX-Based Permissions
        2. Access Control Lists
        3. Managing Permissions
      5. Summary
    15. Chapter 5 : Messaging and Groupware
      1. Exchange Integration
        1. Outlook
        2. Native Groupware Support
      2. Deploy Exchange Accounts Using Profiles
      3. Summary
      4. Further Reading
    16. Chapter 6 : Mass Deployment
      1. Planning Your Mass Deployment
        1. Monolithic vs. Package-Based Imaging
        2. Automation
      2. Image Delivery
        1. Creating an Image
        2. Creating an Image from the Command Line
        3. Operating System Packaging with Composer
        4. Bare-Metal Images
      3. Creating Installation Media
      4. Deploying Images
        1. Restoring with Disk Utility
        2. Using Apple Software Restore
        3. NetInstall
        4. Apple’s NetRestore
        5. DeployStudio
        6. Other Third-Party Solutions
        7. Munki
        8. Casper Suite
      5. Automation
        1. Types of Automations
        2. User Templates
        3. Migrating from Monolithic Images
        4. Custom Packages with Composer
        5. FileWave
        6. Making Packages
        7. Negative Packages
        8. Installing a Package
        9. Package Scripts
        10. Customizing OS X Preferences
        11. The defaults Command
        12. Modifying Property Lists
      6. Image Regression Testing
      7. Summary
    17. Chapter 7 : Client Management
      1. Profiles
        1. Create Profiles
        2. Installing Configurator
        3. Distribute Profiles
        4. Scripting Profile Installations
        5. Manage Profiles Using Open Source Tools
      2. Managed Preferences
        1. Preference Interactions
        2. Utilizing Tiered Management
      3. Managed Preferences in Action
        1. Preference Manifests and Custom Preferences
        2. Automated Client Setup
      4. Deploying Proxy Settings via a PAC File
        1. Troubleshooting and Testing
      5. User Home Folders
        1. Local Home Folders
        2. Network Home Folders
        3. Home Directory Syncing
      6. Password Policies
        1. Managing Keychains
      7. Apple Remote Desktop
        1. Scanning Networks with ARD
        2. Controlling Machines
        3. Sending Commands, Packages, and Scripts
      8. Login Hooks
      9. Software Update Server
    18. Chapter 8 : Automating Administrative Tasks
      1. The Basics
      2. Scripting the Bash Shell
        1. Declaring Variables
        2. Variable Mangling
        3. Standard Streams and Pipelines
        4. if and case Statements
        5. for, while, and until Statements
        6. Arrays
        7. Exit Codes
        8. Constructing a Shell Script
        9. Scheduling Automations
        10. Triggered Automations
        11. Self-destructing Scripts
      3. Automating User Creation from a Third-Party Database
      4. Logging
        1. Working with Date and Time
      5. Configuring Local Administrative Permissions
      6. Allowing Local Users to Manage Printers
        1. Home Folder Permission Maintenance
        2. Enabling the Software Firewall
      7. Managing Items in ARD
      8. Disk Utilization
      9. Network Setup
      10. Power Management
      11. Servers and Change Monitoring
      12. Troubleshooting
      13. Further Reading
    19. Chapter 9 : Virtualization
      1. Boot Camp
      2. Thin Clients
      3. VMware
        1. VMware Fusion in Monolithic Imaging
        2. VMware Fusion with a Package-Based Deployment
      4. Virtual Machines
        1. Preparing the Virtual Machine for Mass Deployment
        2. Virtual Machine Deployment
      5. Parallels
        1. Parallels Desktop on a Monolithic Image
        2. Virtual Machine Deployment
        3. Automating the Parallels Installation
        4. Automated Virtual Machine Deployment
      6. Managing Windows
        1. Sysprep
        2. Scripting Virtual Machine Automations in OS X
        3. Policies and Open Directory
      7. Managing VMs and Boot Camp Through GPOs
      8. Antivirus
    20. Chapter 10 : Free and Open Source Tools for Mac Admins
      1. Commercial vs. Free vs. Open Source Tools
        1. Commercial Software
        2. Open Source Software
        3. Free Software
      2. I’m Not a Lawyer, but I Play One in IT
        1. Open Source Licenses
      3. Where to Find Free and Open Source Tools
        1. AFP548
        2. Google
        3. Homebrew
        4. JAMF Nation
        5. MacEnterprise Mailing List
        6. MacPorts
        7. Puppet
        8. PSU MacAdmins
        9. University of Utah
      4. Listing of Free and Open Source Tools
        1. Management and Inventory
        2. Coding and Scripting
        3. Client Tools
        4. Packaging
        5. Imaging
        6. Security and Testing
    21. Chapter 11 : Apple Deployment Services
      1. The Apple ID
      2. iCloud
        1. The Mac App Store
        2. APNs
        3. DEP
        4. VPP
        5. Conclusion
    22. Index

    Product information

    • Title: Enterprise Mac Administrator’s Guide, Second Edition
    • Author(s):
    • Release date: November 2015
    • Publisher(s): Apress
    • ISBN: 9781484217061