Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mac Admins vs Shadow IT - Detecting Unauthorized Apps and SaaS Tools

Jamf via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to combat shadow IT in Mac environments without alienating users through practical detection and management strategies. Discover how to define shadow IT beyond unauthorized software to include Homebrew installations, OAuth SaaS signups, and BYOD risks while understanding the security, compliance, and operational implications. Master Jamf Pro extension attributes and smart groups to gain visibility into unauthorized software installations and track Homebrew cask deployments. Explore third-party tools like Polypane for monitoring OAuth SaaS signups and Google Workspace integrations. Address BYOD challenges by implementing Google MDM and Jamf Pro with account-driven enrollment strategies. Monitor browser activity including Chrome profile data, extensions, and personal account usage to identify compliance gaps. Prepare for the emerging threat of shadow AI tools like ChatGPT, Claude, and Gemini by implementing detection mechanisms. Build effective remediation policies that prioritize education over punishment while cross-referencing device inventory with approved software lists. Balance security compliance requirements with user productivity needs through strategic policy implementation and user engagement approaches.

Syllabus

0:05 Introduction: Mac Admins vs Shadow IT
3:18 Defining Shadow IT: Beyond Unauthorized Software
6:56 Why Shadow IT Matters: Security, Compliance, Operational Risk
8:00 Shadow IT in Mac Environments: Homebrew, OAuth SaaS, BYOD
10:33 Visibility with Jamf Pro: Extension Attributes as Your Glasses
12:03 Tracking Homebrew: Version, Casks, and Cross-Referencing with Polypane
13:11 Remediation: Education, Policies, and Restricted Software
14:44 BYOD Challenges: Personal Devices as Hidden Shadow IT
17:18 Get Well's BYOD Journey: Google MDM, Jamf Pro, and Account-Driven Enrollment
22:27 Third-Party Tools: Polypane for OAuth and SaaS Monitoring
28:28 Shadow AI: The New Frontier of Unauthorized Tools
32:10 Takeaways: Diligence, BYOD Strategy, Browser Management, and Shadow AI Preparedness

Taught by

Jamf

Reviews

Start your review of Mac Admins vs Shadow IT - Detecting Unauthorized Apps and SaaS Tools

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.