Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

SOAR with Jamf Protect - Automated Security Response Workflows for macOS

Jamf via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to build Security Orchestration, Automation, and Response (SOAR) workflows for macOS endpoints using Jamf Protect and Jamf Pro in this comprehensive conference presentation. Discover how to create automated incident response systems that detect malicious behavior, trigger remediation policies, and collect forensic evidence without manual intervention. Master the fundamentals of SOAR functionality and explore how Jamf Protect's analytics engine integrates with Jamf Pro's device management capabilities to create powerful security automation workflows. Follow along as experts demonstrate three critical real-world playbooks: network isolation for compromised endpoints using packet filter firewall rules, automated quarantined file acquisition with S3 bucket uploads, and comprehensive forensic data collection using the Aftermath framework. Gain practical experience configuring smart groups with extension attributes for threat detection, implementing custom triggers for remediation policies, and setting up user notifications during security incidents with IBM Notifier. Understand how to leverage Jamf's security portals including macOS Security and Jamf Security Cloud for comprehensive endpoint protection. Explore various remediation options including notifications, file removal, endpoint isolation, and custom script execution. Learn to analyze uploaded forensic reports and manage the complete incident response lifecycle from detection through resolution, making your macOS security operations more efficient and effective.

Syllabus

0:00 Introduction: Soaring with Jamf Protect
0:42 What is SOAR? Security, Orchestration, Automation, Response
2:32 Jamf Protect Security Portals: macOS Security and Jamf Security Cloud
3:34 Jamf Pro: Apple Device Management at Scale
4:26 Workflow Step-by-Step: Screenshot Detection Example
8:06 Configuring Remediation Policies with Custom Triggers
9:15 Workflow Recap: From Detection to Remediation
10:06 Remediation Options: Notifications, File Removal, Isolation, Scripts
11:04 Playbook 1: Network Isolation for Compromised Endpoints
20:41 Playbook 2: Quarantined File Acquisition and Removal
24:25 Playbook 3: Forensic Data Collection with Aftermath
28:43 Admin Workflow: Analyzing Uploaded Forensic Reports
29:02 Jamf Training Courses: Security Products 170, 270, 370
30:06 Q&A Session

Taught by

Jamf

Reviews

Start your review of SOAR with Jamf Protect - Automated Security Response Workflows for macOS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.