Mac Management Basics 10.9: Deploying and Managing Multiple Mac Computers
Mac Management Basics 10.9: Deploying and Managing Multiple Mac Computers
Basics 10.9
Deploying and Managing
Multiple Mac Computers
Apple Inc.
2014 Apple Inc. All rights reserved.
COPYRIGHT
Contents
Introduction
5
5
5
7
7
8
8
26
27
Deployment
28
28
32
36
37
38
39
40
43
46
48
Policy Management
49
49
50
52
76
76
77
77
78
83
83
Overview
Prerequisite knowledge
Hands-off deployment
Image types
Creating images with System Image Utility
Creating modular images
Additional resources
Local deployment
Deploying with NetInstall
Third-party deployment solutions
Additional resources
Enable remote management
Creating Apple Remote Desktop computer lists
Deploying software
Inventory tools
Additional resources
About Profile Manager
About configuration profiles
Setting up a Profile Manager server
Client management suites
Additional resources
Software update policy
Using the OS X Server Software Update service
Third-party software update service
Additional resources
84
84
85
87
88
Additional Resources
89
89
89
90
90
Requirements
Managing the Caching service
Comparing the Caching and Software Update services
Additional resources
Mac Management Basics Exam
OS X Training & Certification
Books
Support
Introduction
Overview
Configuring and adding a Mac to an organizations network is simple and
straightforward, but how do you handle the deployment of tens, hundreds, or even
thousands of Mac computers? And once theyre deployed, how do you configure and
manage them so that they can easily access resources and comply with IT policies?
The goal of this guide is to introduce you to the basic techniques for using Apples
tools for deploying and managing Mac computers. After reading this guide and
performing the outlined procedures, youll be familiar with the foundational Mac
management concepts.
The first portion of the guide covers deploying Mac computers, focusing on methods
for deploying software including creating installer packages, and using network disk
images for system software deployment. Next, the guide presents solutions for
managing OS X computers, including using Apple Remote Desktop and Profile
Manager. The guide wraps up by describing how to use the Software Update and
Caching services in OS X Server to assist with management and deployment of
updates and apps.
Prerequisite knowledge
This material assumes you have a basic understanding of OS X skills and terminology.
If youre new to Mac, you should review Mac Basics online at www.apple.com/support/
macbasics/.
You should also have a basic understanding of how to configure OS X, including how
to connect to a network and access network services such as file servers, network
printers, and directory servers. Some recommended resources for this knowledge
include:
Mac Integration Basics. An introduction to what you need to know to configure a
Mac to work in a cross-platform environment. The guide is available online at http://
training.apple.com/itpro/macinteg109 or on the iBooks Store.
OS X Support Essentials. Designed to give you a tour of the breadth of functionality of
OS X Mavericks and the best methods for effectively supporting users of OS X
Mavericks systems, the OS X Support Essentials 10.9 book is available from Peachpit
5
This chapter covers the basics of creating images that can be deployed using the
deployment methods covered in the next chapter.
While the focus is on using System Image Utility for image creation, Disk Utility could
be used to create an image of a system, but it requires more preparation of the
computer from which the image is being made. Also, when restoring an image, Disk
Utility doesnt create a recovery partition. As a result, Disk Utility is fine for creating an
archive of a volume on a computer, but System Image Utility is better for creating
images that will be deployed to multiple computers.
Hands-off deployment
Before you start creating system images, ask yourself: Do I really need to create,
manage, and deploy system images and software?
The traditional method for deploying computers is to create system images and copy
the images to every computer in the organization. While this creates consistency in
system configuration, it places a burden on an IT organization to maintain a set of
images, making sure they contain the latest OS updates and application versions.
Now, with the easy-to-use configuration assistant and the Mac App Store, you may find
that a hands-off approach to deploying new computers might be appropriate. Instead
of deploying an OS image, you can deliver new computers to the users and allow
them to perform the initial configuration by downloading the software that they need
either from an internal website or the Mac App Store. Users are familiar with this
approach because its what they do with their home computers.
If you decide that image deployment is appropriate, you should create images that
minimize the need for IT involvement:
Minimum customizations A deployment image should contain as few
customizations as possible to protect it from constant revisions and make it as
business-unit agnostic as it can be. Ideally, it contains only OS X, local settings, and
keystone applications. Keystone applications are software packages that are
installed on all the Mac computers in your organization.
Directory services By fully using directory services, you gain centralized control
over user identities and user data and provide for the delivery of a cohesive
7
management policy framework. You should build a script into your deployment
image that binds the Mac to your directory service.
Client management Using a client management system completes the minimaltouch deployment, and you should build this client management agent into your
deployment image. On initial startup, the Mac contacts the client management suite
and uploads its inventory information. At this point, any unit-specific software is
provisioned, along with any update deltas that exist for the current deployment
image. With most client management suites, optional applications are delivered to
users Mac computers via self-service software tools.
For more information about hands-off deployment, refer to the Apple technical white
paper Supporting Mac Users: The Self-Support Model available at http://
training.apple.com/pdf/wp_self_support.pdf.
Image types
The two primary methods for creating deployable system images are duplicating a
preconfigured Mac or building an image by combining an existing disk image or
installer and installer packages.
A disk image (.dmg file) is a file that looks and acts like a mountable disk or volume.
Disk Utility is the tool most frequently used to create disk images.
A network disk image, also called network boot image, is an image from which a client
computer can start up long enough to install software contained within the image.
The client can then start up from its own hard disk. The primary tool for creating
installation images is System Image Utility. Usually network disk images are deployed
across a network using the NetInstall service in OS X Server, but in the next chapter
youll learn a method for creating a local startup volume, such as a USB flash drive or a
partition on a disk drive, from a network disk image.
Boot images and installation images are disk images. The main difference is that
a .dmg file is a proper disk image and a network disk image is an .nbi folder containing
files, including a .dmg disk file, to allow a computer use the folder to boot across the
network.
With System Image Utility, you can create and customize three types of network disk
images:
NetBoot Boots a client computer to an operating system located on a server. This is
done in a completely diskless boot environment or by leveraging a disk in the client
to cache the operating system.
NetInstall Creates a customized operating system installer that runs on a network
allowing users to install Mavericks without erasing the target volume. You may
define customizations to the installation process with easy-to-use Automator actions
that perform tasks before or after the OS X installation process. In an environment
where customizations have been used, NetInstall users are presented with the same
user interface they would see if they were using the OS X Installer on the local drive.
Examples of customizations include repartitioning hard drives, using predefined
operating system installation choices, binding systems to directory services,
renaming client systems, and installing additional software packages.
NetRestore Images clients using a prebuilt image (referred to in this guide as a
prepared disk) with block-copy Apple Software Restore (ASR). You have several
options to create NetRestore sets including imaging an existing OS X computer,
creating an image programmatically with a custom package set, and allowing for
the arbitrary sourcing of ASR imagesthat is, choosing an image located on a web
server or Apple file server, or using multicast ASR. With NetRestore, a single boot
image can be prepopulated with predefined choices, or clients can browse for
multicast ASR streams using Apples Bonjour browsing technology.
Although System Image Utility was designed to create images that are restored over
the network (as youll see in the Deployment chapter), network disk images can be
used to restore systems locally as well.
Image sources
To create an image, you must have valid OS X image sources or volumes and be
logged in as an administrator user. If you download and install OS X from the Mac App
Store, a valid OS X image source appears in the source pop-up menu.
You cant create an image of the startup disk youre running on, you must start up
from a volume other than the one youre using as the image source. For example, you
could start up from an external FireWire hard disk or a second partition on the client
computer's hard disk. You cant create the image on a volume over the network.
6. Click Continue.
7. In the Network Disk field, enter a name for your image.
This name identifies the image in the Startup Disk preferences pane on client
computers.
10
8. (Optional) In the Description field, enter notes or other information to help you
characterize the image.
Clients cant see the description information.
9. If the image will be served from more than one server, select the checkbox below the
description field.
This assigns an index ID to the image for NetInstall service load balancing.
10. Click Create.
11. Read the Software Licensing Agreement and click Agree.
12. In the Save As dialog, choose where to save the image.
If you dont want to use the image name you entered earlier, enter a new name in the
Save As field.
If youre creating the image on the same server that will serve it, choose a volume
from the Serve from NetInstall share point on pop-up menu.
11
For this option to appear in the pop-up menu, NetInstall service must be configured
on a network port and the Server app must be set to serve images from a volume.
Choose a location from the Where pop-up menu or click the triangle next to the Save
As field and navigate to a folder.
12
6. Click Continue.
7. In the Network Disk field, enter a name for your image.
This name identifies the image in the Startup Disk preferences pane on client
computers.
8. (Optional) In the Description field, enter notes or other information to help you
characterize the image.
Clients cant see the description information.
13
9. Enter the names and password that will be used to create the administrator account
on the system once it has been restored:
Name: Enter the full administrator account name.
Short Name: Enter the short name for the administrator account.
Password and Verify: Enter and verify the password for the administrator account.
14
6. Click Continue.
7. In the Network Disk field, enter a name for your image.
This name identifies the image in the Startup Disk preferences pane on client
computers.
16
8. (Optional) In the Description field, enter notes or other information to help you
characterize the image.
Clients cant see the description information.
If the image will be served from more than one server, select the checkbox below the
description field.
This assigns an index ID to the image for NetInstall service load balancing.
9. Click Create.
10. Read the Software License Agreement and click Agree.
17
To assemble a workflow from a set of actions, drag and drop the actions from the
Automator Library into the workflow sequence you want them to run. Each action in
the workflow corresponds to a step you would usually perform manually.
Each action has options and settings that you can configure. System Image Utility
connects these action components with the types of data that are flowing from one
action to another.
You can save your assembled workflows to reuse later.
1.
2.
3.
4.
5.
19
The Define Image Source action is the first component in the workflow and is required
at the beginning of all image workflows.
6. In the Define Image Source action for your image, choose the image that you want to
use as source for your workflow. This can be the Install OS X Mavericks Installer, a
prepared image, or a preinstalled volume.
7. From Automator Library, choose additional actions that your customized image
requires and drag them into the Workflow pane between the Define Image Source
action and the Create Image action.
When you add a new action it should connect to the actions above it and below it.
Note that if an action doesnt connect with the item above it or below it, the workflow
will fail.
8. Assemble the actions in the order you like, configuring each action as you go.
20
Any actions that configure the network disk image must be placed between the
Define Image Source action and the Create Image action
9. If your workflow doesnt contain a Create Image action, select the Create Image action
in the Automator Library and drag it to the end of your workflow.
10. If you're creating a NetBoot or NetRestore image, enter a name in the Installed Volume
field.
The volume that your image is installed on is renamed with this name.
11. Select the Include Recovery Partition checkbox to include the OS X recovery partition
in your image.
This option is available only with NetRestore images.
12. From the Save To pop-up menu, choose where to save the image.
13. In the Image Named field, enter the name of the image file as you would like it stored
on the computer.
14. In the Network Disk field, enter a name for your image.
This name identifies the image in the Startup Disk preferences pane on client
computers.
15. (Optional) In the Description field, enter notes or other information to help you
characterize the image.
Clients cant see the description information.
16. In the Image Index field, enter an Image ID:
To create an image that is unique to this server, enter an ID in the range 14095.
To create one of several identical images to be stored on different servers for load
balancing, enter an ID in the range 409665535.
Multiple images of the same type with the same ID in this range are listed as a single
image in a clients Startup Disk preferences pane.
17. Click Save, then enter the name of your workflow in the Save As field. Choose where to
save the workflow by choosing a location from the Where pop-up menu or clicking
the triangle next to the Save As field and navigating to a folder.
18. Click Save.
19. To start the workflow, click Run, then authenticate if prompted.
Important: Do not attempt to edit content in the image destination folder while the
image is being created.
21
To restrict which computer models may start up using the network disk image:
The Filter Computer Models action limits which computer models can start up using
the network disk image. If your image contains software that has specific hardware
requirements, you can restrict the image to computer models that meet those
requirements.
1. From the Automator Library, drag the Filter Computer Models action into the workflow
pane between the Define Image Source and Create Image actions.
2. Select the Enable checkbox for each computer model that you want to be able to start
up using your defined image source.
In this example, only computers that are compatible with Mavericks have been
enabled.
1.
2.
3.
4.
22
With the Partition Disk action, you can partition a computers drive before the images
software is installed. For example, you could create separate system and data
partitions.
From the Automator Library, drag the Partition Disk action into the workflow.
From the partitions pop-up menu, choose the number of partitions and enter a name
for each.
Select the Partition the disk containing volume checkbox to limit which disks will be
repartitioned. This feature helps reduce the dangers associated with repartitioning a
drive, like overwriting external drives, jump drives, or computers that arent ready to be
imaged.
The checkbox labeled Display confirmation dialog before partitioning is another
feature that helps decrease the risk of erasing user data. However, note that both this
and the previous step can stop the imaging process, which may be an issue if youre
trying to install hundreds or thousands of systems. Use both partitioning options as
needed.
Choose the format for the drives. In most cases, the default settingMac OS Extended
(Journaled)is fine.
5. Choose the minimum size for each partition. This is a sanity check so that the tool
doesnt try to image 40GB to a 10GB drive and partition a chunk away for other tasks.
Its better if the imaging process fails early because it keeps troubleshooting imaging
issues to a minimum allowing mass deployment staff to move on to imaging the next
host.
3. To create multiple accounts, drag a new Add User Account item into the workflow.
23
Or you can pull the information from a file by selecting the Apply Computer Name
and Local Hostname settings from a file checkbox.
If the computer running System Image Utility has been bound to a directory service
like Open Directory, Active Directory, eDirectory, or some other directory service, select
the Connect computers to directory servers checkbox. This feature adds the imaged
system to the directory service as a postinstallation task.
Note: Most directory services require unique entries for each computer, so the binding
state before imaging wont carry through to the image unless this option is selected or
a custom script is used to bind.
For prepared images, select the Change ByHost preferences to match client after
install checkbox.
24
Note: When you add multiple packages and scripts to a workflow, they install or run in
the order listed in the Add Packages and Post-Install Scripts workflow item.
To add a configuration profile to a System Image Utility workflow:
With System Image Utility, you can add configuration profiles to your NetInstall and
NetRestore workflows. By adding profiles, you can preconfigure the Mac for a number
of settings and services.
You can then create configuration profiles with the OS X Server Profile Manager
service (described later in the Policy Management chapter of this guide).
1. From the Automator Library, drag the Add Configuration Profiles action into your
workflow.
2. Drag and drop, or use the Add (+) button, to add your configuration profiles to the
action.
25
Note: If your workflow has packages and scripts that rely on a certificate thats installed
by a configuration profile, make sure the configuration profiles are installed in the
workflow before the packages and scripts.
To configure the Enable Automated Installation workflow action:
Use the Enable Automated Installation action to set the options for automated
(unattended) client installations. This action is valid only when creating NetInstall or
NetRestore images.
1. From the Automator Library, drag the Enable Automated Installation action into your
workflow.
2. If the image is to be installed on a specifically named volume, select Install to the
volume and enter the name of the target volume.
3. To erase the target volume before the image is installed, select the Erase before
installing checkbox.
Warning: Using the Erase option removes all data from the target volume. Back up all
data before using this option.
4. From the Main Language pop-up menu, choose the image language.
If you need to create installer packages to add software to an image workflow, there
are a number of third-party products available to do so:
Composer, from JAMF software http://www.jamfsoftware.com
With Composer, you can inspect a computer and create a package of each
application that has been installed on that system, offering a smooth transition from
monolithic imaging environments to package-based imaging environments.
InstallEase, from Absolute Software http://www.absolute.com
With InstallEase, a simple snapshot-based package generation tool for OS X, you can
create installer packages with minimal effort.
Iceberg and Packages http://s.sudre.free.fr/Software.html
Iceberg and Packages (under the BSD license) provide interface options for the
implementation of preflight and postflight scripts, as well as features specifically
used for metapackage management.
Additional resources
Supporting Mac Users: The Self-Support Modelhttp://training.apple.com/pdf/
wp_self_support.pdf
Imaging the MacBook Air: Leveraging Thunderbolthttp://images.apple.com/
education/docs/Apple-ThunderboltWhitePaper.pdf
Leveraging NetInstall, OS X Server Essentials 10.9: Using and Supporting OS X Server on
Mavericks, Peachpit Press
27
Deployment
After youve generated images and customized the automations to go into those
images, the next step is to deploy them. The simplest form of deployment is to locally
apply an image from one Mac to another via USB or FireWire. This process can be
cumbersome, so additional techniques are introduced here to help streamline the
process toward enabling a one- or zero-touch deployment.
Local deployment
Local image deployment is the simplest form of deployment for Mac computers. By
taking advantage of native tools such as Apple Software Restore, Disk Utility, and
target disk mode, administrators can quickly and easily test deployment images using
direct connections between computers without the need to move images to
production or test servers.
Local imaging techniques, however, dont scale well and arent suitable for deploying a
large number of Mac computers in most environments. Local deployment is typically
most suitable for test environments when working out details about how the larger
scale deployment process will work.
You may need to adjust the path to the OS X Installer app in the above command.
Note: createinstallmedia is intended to be used only with the version of OS X
Installer app that it came with.
29
30
In addition, you need to specify the external drive for the Save As value in the Create
Image action.
To start up a computer with a volume containing a network disk image:
1.
2.
3.
4.
Startup Manager allows you to choose the startup volume on the fly simply by
holding down the Option key while the computer is starting up.
Turn on, or restart, your Mac.
Immediately press and hold the Option key.
After a few seconds, the Startup Manager should appear. The Startup Manager scans
for available available volumes.
Use the Left Arrow and Right Arrow keys on the keyboard to select the network disk
image.
Press the Return key on your keyboard to start up the computer from the disk image.
31
NetInstall considerations
All systems supported by OS X Mavericks can use NetBoot to start from an OS X
Mavericks network disk image.
Note: For a list of computers compatible with Mavericks, visit http://
support.apple.com/kb/ht5842.
You must install the latest firmware updates on all client computers. Firmware updates
are available from the Apple Support website: www.apple.com/support/.
NetInstall is supported only over physical Ethernet connections. Using Wi-Fi to boot
clients using a network disk image isnt supported by Apple and is discouraged.
32
33
7. In the entry for the volume on which you want to store the NetInstall images and
client data, choose Images & Client Data from the pop-up menu.
8. Click OK.
9. Place the network disk images you created earlier in the
/Library/NetBoot/NetBootSP0 directory of the volume you just selected.
10. In Server app, press Command-R to refresh the window.
The Images list will contain the name of the network disk image you copied to
NetBootSP0.
34
14. Choose the protocol over which you want to make the image available.
18. To test booting a system to the image, start up the client while holding down the N
key, or use the Startup Disk System Preferences on the client to select an image from
the NetBoot server you just set up.
When you use the N key to boot using the default NetInstall image, your computer
remembers what server and image were used. The next time you hold down the N key
at startup, your computer attempts to use the same server and image, even if that
image is no longer specified as the default image. Holding Option-N during startup
causes the computer to boot using the current default image.
To boot using a specific network disk image:
If your NetInstall server is hosting multiple images or you have set up multiple servers,
you can use the Startup Disk in System Preferences to select a specific boot image to
use.
1. Choose System Preferences from the Apple menu.
2. Click Startup Disk.
3. Click the name of the network disk image created for NetRestore.
4. Click Restart.
The computer is booted into the NetRestore environment, where youll see the icon for
System Image Utility.
5. Click the image you want to restore, then click Continue. Or you can type the path to
the image in the field provided (if that option was selected when you created the
NetBoot set).
36
Additional resources
Manage updates and installation: Install OS X over the network section, OS X
Server: Advanced Administrationhttps://help.apple.com/advancedserveradmin/
mac/3.0/
OS X Education Deployment Guidehttp://www.apple.com/education/mac/
resources/
Leveraging NetInstall, OS X Server Essentials 10.9: Using and Supporting OS X Server on
Mavericks, Peachpit Press
37
Managing Computers
with Apple Remote Desktop
38
The following lists the remote management options in the Sharing pane and the
Remote Desktop features that they correspond to (for example, if you want a certain
administrator to be able to change computer file sharing names, you need to grant
that administrator the privilege by selecting Change settings):
Observe: Control Use these Interact menu commands: Control, Share Screen, Lock
Screen, and Unlock Screen. This checkbox must be enabled to use the Upgrade
Client Software and Change Client Settings features.
Observe: Show when being observed Automatically change the status icon to
notify the user when the computer is being observed or controlled.
39
Generate reports Create hardware and software reports using the Report menu;
use Spotlight search.
Open and quit applications Use these Manage menu commands: Open
Application, Open Items, Send UNIX Command, and Log Out Current User.
Change settings Use these Manage menu commands: Rename Computer, Send
UNIX Command, and Set Startup Disk.
Delete and replace items Use these Manage menu commands: Copy Items, Install
Packages, Send UNIX Command, and Empty Trash. Also delete items from report
windows. This checkbox must be enabled to use the Upgrade Client Software
feature.
Start text chat or send messages Use these Interact menu commands: Send
Message and Chat.
Restart and shut down Use these Manage menu commands: Sleep, Wake Up,
Restart, Send UNIX Command, and Shut Down. This checkbox must be enabled to
use the Upgrade Client Software feature.
Copy items Use these Manage menu and Server menu commands: Copy Items,
Send UNIX Command, and Install Packages. This checkbox must be enabled to use
the Upgrade Client Software and Change Client Settings features.
To automatically select all access checkboxes, hold down the Option key and click any
checkbox.
5. Click OK.
6. Click Computer Settings, and select options for the computer that will be shared.
To add computers to the All Computers list with Apple Remote Desktop:
1. Open Remote Desktop (located in /Applications).
2. From the list on the left, click Scanner to see the computers you need to manage.
Now you can search for systems and add them to the All Computers list and a list you
create.
With File Import, you can also add ranges of IP addresses by expressing the range in
the following format: xxx.xxx.xxx.xxx-yyy.yyy.yyy.yyy. For example, using a text file with
192.168.0.2-192.168.2.200 scans all IP addresses in that address range.
Task Server When you view the Task Server scanner, you see all client computers
that registered with the Task Server. This list includes client computers that other
Remote Desktop administrators have added.
Directory Server When you view the Directory Server scanner, you see all client
computers that are registered with the Task Server and are in computer groups in
directory servers youre bound to.
3. After the scan is complete, select one or more computers. To add multiple computers,
Shift-click to select the first system in the range you want to add, then the last.
4. Drag the computers to the All Computers list.
5. Authenticate by providing a user name and password for a Remote Desktop
administrator account on the computer being added.
6. Click Add.
The computer appears in the All Computers list.
1.
2.
3.
4.
42
Listing all systems in Apple Remote Desktop helps improve IT efficiency. Support
personnel can control computers remotely from their desk, so they can continue
providing support to other users.
Deploying software
You can use Apple Remote Desktop to install software and software updates on one or
more client computers without user interaction or interruptionthey dont even need
to be logged in. The only computer you actually have to touch is yours.
When deploying applications, consider:
Which applications are already on systems in the environment, and what conflicts
may occur due to deployment.
Which applications can runregardless of whether theyre actually loaded into the
computer.
Whether applications require custom packages to be deployed without prompting
for serial numbers and other user choices.
You can use Apple Remote Desktop to review which applications are running on Mac
computers in your network. Apple Remote Desktop can also run a report that lists
applications and their versions. To see a list, open Remote Desktop, select the
computers you want to review, and choose Software Version from the Report menu.
9. Select the Network usage checkbox to limit bandwidth, if necessary, and enter the
maximum network bandwidth youd like the installation to use.
10. In the lower left, click Schedule to schedule installation for a later time, or click Install
for immediate installation.
6. Click Copy.
The software is copied to the indicated location. If the copy operation is unsuccessful,
an error message appears in the task feedback window.
45
Inventory tools
With Apple Remote Desktop, you can capture data describing the attributes of client
computers in the Apple Remote Desktop database, then generate reports based on
the data.
You specify how often you want to capture data, the data you want to capture, and the
computers you want to profile. You can collect data just before generating a report if
you need up-to-the-minute information. Or you can schedule data to be collected by
Remote Desktop at regular intervals and stored in its built-in Structured Query
Language (SQL) database for use on an as-needed basis.
You can also specify where you want the database to reside: On the local administrator
computer or on a server where the Remote Desktop administrator software is
installed, so data can be captured on an ongoing basis.
46
System Overview Report The System Overview report makes visible a wide variety
of client computer characteristics. Using this report, you can review information
about a clients Wi-Fi setup, computer and display characteristics, devices, network
settings, system preferences, printer lists, and key software attributes. There are
numerous uses for this report, such as identifying problems or verifying system
configurations before installing new software, or determining how many devices of
a particular type (such as scanners) are in a particular lab.
particular client computers from the administrator computer, you may find you have
a bad connection to the computers. Using this information can help you isolate the
problem to a particular cable or hub.
User History Report Use the User History report to show who has logged in to a
client, how the user logged in, and for how long.
Exporting reports
After Remote Desktop generates reports, you can export them into a commadelimited or tab-delimited text file. The file includes all columns of information in the
report window, and exports the report rows in the order theyre sorted. You can feed
exported reports into a database, spreadsheet, or other tool for further analysis.
1.
2.
3.
4.
5.
6.
7.
To export a report:
Select the rows of the report you want to export.
Choose File > Export Window.
In the Save dialog, name the file and choose where you want to save it.
Choose the type of text encoding the destination application uses.
Choose the field separator that the destination application will use to parse the data.
Choose what to export. If you need to export only a portion of the report, choose
Export Selected Items Only.
Click Save.
Additional resources
Remote Desktop Helphttps://help.apple.com/remotedesktop/mac/3.7/
Apple Remote Desktophttp://www.apple.com/remotedesktop/
48
Policy Management
enrolled with Profile Manager, you can update its configuration over the network
without user interaction, as well as execute tasks such as reporting and locking or
wiping the device.
Note: Mobile device management is supported on Mac computers with OS X
Mountain Lion v10.8 or later installed. However, to take advantage of all the Profile
Manager features, you should update all client computers to OS X Mavericks v10.9 or
later.
50
access to email but also enforces restrictions or passcode settings. To have access to
messages, users must also accept your security policies.
You can distribute configuration profiles by email, on your own webpage, or by using
an MDM. When users open the email attachment or download the profile using Safari
on their device, theyre prompted to begin installation. You can also use Profile
Manager as an MDM server to send new and updated profiles to users after they enroll
their devices.
Except for passwords, users generally cant change settings in a configuration profile.
Accounts configured by a profile can be removed only by deleting the profile.
Each user, device, and group have default configuration profiles so you can quickly
provide a base level of settings, then you can further assign additional configuration
profiles to customize the settings to meet your organizational requirements. For
example, to enforce restrictions and configure users devices to use your VPN, create a
configuration profile with a restrictions payload and a VPN payload. Because both
payloads are in the same profile, the users must install both. If they remove the
configuration profile to avoid the restrictions, their VPN access is also removed.
51
1.
2.
3.
4.
5.
To set up Profile Manager, install OS X Server from the Mac App Store. Then, when you
turn on the Profile Manager service and click Configure, the Server app guides you
through the steps to set up the service, including configuring the server as an Open
Directory Master.
In the Profile Manager pane, click On.
Wait a moment while Profile Manager service starts.
Click Configure (next to Device Management).
To use Mobile Device Management, the server must be an Open Directory Master and
have valid certificates for SSL and Apple Push Notification. For information about
Mobile Device Management, click Open Profile Manager and choose Help from the
User menu. The Configure Device Management assistant will open to guide you
through the steps needed to configure these services.
In Configure Device Management, click Next.
In Configure Network Users and Groups, click Next.
In the Directory Administrator dialog, enter the account information for the
administrative user of the new Open Directory instance youre creating.
6. Click Next.
52
8. Click Next.
9. In Confirm Settings, review the settings to create the new Open Directory master.
10. If the settings are correct, click Set Up. If you need to make changes, click Back.
11. In Organization Information, enter any contact information that you wish to provide
users, then click Next.
53
12. In Configure an SSL Certificate, choose your code-signing certificate from the
Certificate pop-up menu.
If you havent installed a code-signing certificate from a trusted authority, youll get a
warning. You can still use the servers self-signed certificate, but those users with
devices that you wish to manage will need to take an extra step to explicitly trust your
server.
13. Click Next.
To push profile changes to devices, you must configure a server to use Apple Push
Notification service (APNs). This requires getting certificates for the service from Apple.
14. In Get an Apple Push Notification Service certificate, enter your organizations Apple
ID and password. If your organization doesnt have an Apple ID, click Create one now.
15. Click Next.
16. In Confirm Settings, click Finish.
At this point, you can start using Profile Manager to manage devices, but you can still
make some service configurations.
17. To assign apps and books purchased through VPP, select Assign apps and books from
the Volume Purchase Program.
For information about how to assign apps and books purchased through the VPP to
users or groups, click Open Profile Manager and choose Help from the User menu.
18. To sign profiles using a certificate, select Sign configuration profiles, then choose a
certificate from the Certificate pop-up menu.
If the certificate isnt available in the menu, select Import from the Certificates pop-up
menu and import a certificate.
19. To include configurations for services on your server in your default configuration
profile, select Include configuration for services.
You can change the name of the configuration profile by clicking Edit next to Name.
54
20. To send the URL of the Profile Manager server to users so they can log in and
download the configuration profiles you assigned, click the arrow next to Visit User
Portal, then copy the URL from the browser window that opens.
For information about how users interact with Profile Manager, click Open Profile
Manager and choose Help from the User menu.
21. To specify settings and assign them to users, devices, and groups, and to manage
enrolled devices, click Open Profile Manager.
When Profile Manager opens in your web browser, log in with your administrator
name and password.
Configuring users
Before users can access most services on an OS X Server, you need to create accounts
for them on the server. These accounts can reside in a directory service or locally on
the server.
If your server is bound to a directory service, such as Microsoft Active Directory, no
further work is needed. If not, create users before setting up profiles in Profile Manager.
To add users to your OS X Server once its running Open Directory, use the Server app.
This section covers creating users in the Server app.
Note: If the server is bound to another directory service (for example, Active
Directory), manage users there rather than from OS X Server.
1.
2.
3.
4.
5.
55
Only users created in the Server app after its promoted to an Open Directory master
can be added to that Open Directory domain. Because local and Open Directory
accounts have different user IDs, promote any systems that need shared accounts to
an Open Directory master before creating users.
General settings
The General settings payload is the only required payload in a configuration profile.
This payload sets the name and identifier of the configuration profile. You should use
consistent naming conventions and clear descriptions with version numbers and dates
56
to keep configuration profiles organized. Its important that you specify a unique
identifier field for each configuration profile because any subsequent profile created
with an identical identifier replaces the original. A good profile description is especially
important for signed and encrypted profiles, as they rely on the certificate keys of the
tool that was used to create the profile.
The General settings payload is also used to specify whether end users can remove the
profile after its installed.
To edit configuration profiles:
1. Open a web browser and navigate to https://yourserver/profilemanager (where
yourserver is the name or IP address of your server running the Profile Manager
service).
2. Authenticate as needed with administrative credentials.
3. Select the user, group, device, or device group you want to edit.
57
8. Click OK.
9. Click Save to update the profile settings.
10. Click Save when asked to confirm saving the settings.
Note: When you update settings for an automatic push profile, devices receive Apple
push notifications.
58
59
4. Click Add (+) under the groups list to create a new device group.
5. Enter a name for the new device group.
6. Click Settings.
61
6. Click the Add button for each device that you want to add to the group.
If you want to remove a device that was added to the group, click the devices Remove
button.
7. Click Done when youre finished adding devices.
The device group updates to reflect the changes you made.
8. Click Save when youre finished.
62
5. In the Add Device dialog, choose iOS/OS X from the Device Type pop-up menu.
6. Enter a name for the device.
7. Choose a Serial Number from the Identifier Type pop-up menu and enter the serial
number for the device that youll enroll later.
8. Click Add.
A placeholder is added to the Devices list.
Example
DeviceName
OurPhone
SerialNumber
23432AABCZ5
IMEI
U8938932ae89ui8989eaooi78
MEID
1312aiu3io2o243234oo23
UDID
ab458782ui3972342
The file can be a mix of any number or type of identifiers for each device name. The
DeviceName column is required for each row.
1. From the Library list on the left, select Devices.
2. Click Add (+) on the right and choose Import Placeholders.
3. Select the CSV text file, then import.
63
64
5. Click Enroll.
The profile downloads to the browser. The Profile pane of System Preferences
automatically opens and displays information about the profile being installed.
6. Click Continue.
Youll be asked to confirm that you want to install the Device Enrollment profile.
65
66
When you lock an OS X computer, it immediately reboots to a PIN pad. Only the PIN
you created in the user portal can unlock it.
67
Note that the device entry is now a placeholder. If the device is ever reenrolled, it will
automatically match up to the devices Profile Manager entry.
3. From the Library list on the left, select Devices or Device Groups.
4. Select the device or device group you want to lock.
5. Click the Action menu (gear icon) in the device or device group pane.
6. Choose Lock.
7. Enter a lock PIN code that can be used to unlock the device.
8. Click Lock.
When you lock an OS Xbased computer, it immediately reboots to a PIN pad. Only the
PIN entered in Profile Manager can unlock the device.
69
9. To make sure the device has been locked, go to the Completed Tasks section of Profile
Manager.
5. Click the Action menu (gear icon) in the device or device group pane.
70
6. Choose Wipe.
71
The Devices pane shows the OS X and iOS devices youve enrolled.
3. Click the Remove link in the upper right of the device entry.
4. Click OK to confirm that you want to remove the device.
The device record is removed from Profile Manager and the device is no longer
considered managed.
72
6. Click Unenroll to confirm that you want to remove the device from Profile Manager.
Although the device is removed from Profile Manager, a placeholder is left behind. If
the device is ever reenrolled, it will be matched to the placeholder, and any profiles
associated with the placeholder will be downloaded to the device.
7. Confirm that the device no longer appears in the Devices section of Profile Manager.
73
To remove a profile:
1. Open System Preferences.
2. Click Profiles.
3. Select the device profile you want to remove.
7. Configure the other settings that should be deployed with the profile.
8. Click OK to close the settings pane.
9. Click Save to update the profile settings.
75
Additional resources
Manage devices with Profile Manager section, OS X Server: Advanced Administration
https://help.apple.com/advancedserveradmin/mac/3.0/
Apple Technical White Paper: Managing OS X with Configuration Profileshttp://
training.apple.com/pdf/wp_osx_configuration_profiles_ml.pdf
Managing Devices with Configuration Profiles, OS X Server Essentials 10.9: Using and
Supporting OS X Server on Mavericks, Peachpit Press
76
The Software Update service offers ways to manage Mac software updates from Apple
on your network. In an unsupervised environment, users might connect to Apple
Software Update servers at any time and update their computers with software that
isnt approved by your IT group.
Using local Software Update servers, your client computers access only the software
updates you permit from software lists that you control, improving your ability to
manage the updates. For example, you can:
Download software updates from Apple Software Update servers to a local server
for sharing with local network clients and reduce the amount of bandwidth used
outside your network.
Direct users, groups, and computers to specific local Software Update servers using
configuration profiles.
Manage the software update packages that users can access by enabling and
disabling packages at the local server.
Mirror updates between Apple Software Update servers and your server to make
sure you have the most current updates.
wide range of operational tasks and can give effective feedback. Deploying to a pilot
group helps ensure that production wont be affected if problems with the update
arise.
Phase 3 After the pilot phase is complete, the update can be delivered to all
workstations and integrated into the master deployment image.
If issues arise during any phase, your policy should call for a restart of that phase. For
example, if Apple releases a security update and revises it five days later, a new sevenday cooling-off period should begin.
The three-phase policy cycle minimizes the risks of widely deploying problematic
updates.
78
5. Click the On/Off button to turn on the Software Update service and begin caching the
patches from Apple.
Note: If you dont immediately see the updates, dont be concerned. In some cases, it
can take a number of hours for them to appear.
79
1.
2.
3.
4.
5.
80
You can enable or disable software updates on your Software Update server using the
Server app. When you enable updates, you make them available to your clients for
downloading and installing from your Software Update server. If you disable updates,
the updates might be downloaded to your server but wont be available to your
clients to install.
In the Software Update pane, click the Settings tab.
To manage available updates, the Software Update service must be set to Manual
mode.
Select Manual.
Click the Updates tab.
From the list of updates, select the update or updates that you want to enable or
disable.
From the Action menu (gear icon), choose Enable or Disable.
4. Click Configure.
81
6. Click OK.
7. Click Save, then click Save again to confirm saving the updated profile.
To manually configure clients to use a Software Update server:
If your client systems arent managed, or if you want to test the functionality of the
Software Update service without using a policy, use the following command to
augment the default software update settings (replacing server.pretendco.com
with the actual IP address or DNS name of the host running the Software Update
service):
defaults write /Library/Preferences/com.apple.SoftwareUpdate
CatalogURL "http://server.pretendco.com:8088/index.sucatalog"
You can reset the Software Update settings to factory defaults by deleting the
/Library/Preferences/com.apple.SoftwareUpdate.plist file and allowing the system to
generate a new preferences file based on the default settings.
To point the client computer back to the Apple Software Update server, use the
following command:
defaults delete /Library/Preferences/com.apple.SoftwareUpdate
CatalogURL
82
Additional resources
Manage updates and installation: Host software updates, OS X Server: Advanced
Administrationhttps://help.apple.com/advancedserveradmin/mac/3.0/
Implementing Software Update Service, OS X Server Essentials 10.9: Using and
Supporting OS X Server on Mavericks, Peachpit Press
83
Requirements
The Caching server supports clients with OS X v10.8.2 or later and iOS 7 or later, and
requires that clients share the same public IP address behind a NAT.
The following figure is an example of a single subnet with a Caching server:
84
If your network has multiple subnets that share the same public IP address, the
subnets can take advantage of the Caching server. For example, the following figure
shows a network with two subnets sharing a single Caching server:
You can get the best performance from your Caching server by connecting it to your
network using Ethernet. The Caching server can serve hundreds of clients at once,
saturating a Gigabit Ethernet port. Therefore, in most small- to medium-scale
deployments, the performance bottleneck is usually the bandwidth of your local
network. To determine if your server hardware is your performance bottleneck when a
large number of clients are accessing the server at the same time, check the Processor
Usage graph in the Stats pane of Server app. If the processor usage is constantly at or
near the maximum, you may want to add Caching servers to distribute your clients
caching requests across multiple servers. Also, if your server is in an environment
where clients download a wide variety of large amounts of content, be sure to set the
cache size limit high enough. This prevents the Caching server from deleting cached
data frequently, which may cause the redownloading of the same content at the
expense of more Internet bandwidth consumption.
85
At this point and without any additional configuration, the Caching service starts to
cache Mac App Store and iTunes downloads.
To select a volume for caching:
1. In the Caching pane, click Edit.
2. Select a storage volume.
3. Click Choose.
86
Client configuration
To access your Software Update server, you need to configure the Software Update
preferences on your client computers to direct them to the server. You can manage
preferences in Workgroup Manager or configuration profiles, or you can modify the
preferences directly.
No client configuration on your part is required with the Caching service. On a regular
basis, a Caching server registers itself and its public IP address with Apples software
servers. When client devices attempt to access Apples servers, the devices are
automatically directed to the Caching server associated with your public IP address.
87
Download management
With the Software Update service, you can select which updates are available to the
client computers. This is useful for organizations that want to restrict access to new
software until it has been tested for compatibility.
The Caching service doesnt provide any control over software availability.
Note that client computers that are configured to use your Software Update server
dont access a Caching server for software updates. They do, however, still use the
Caching server for other downloads, such as app purchases.
Software cached
Both services cache Apple-provided software updates. but the Caching service also
caches other content downloaded using iTunes, the App Store, iBooks, or the Mac App
Store, such as apps and books.
Additional resources
Manage updates and installation: Provide update Caching service, OS X Server:
Advanced Administrationhttps://help.apple.com/advancedserveradmin/mac/3.0/
Caching Content from Apple, OS X Server Essentials 10.9: Using and Supporting OS X
Server on Mavericks, Peachpit Press
88
Additional Resources
OS X Courses
Courses are taught by Apple Certified Trainers through a worldwide network of Apple
Authorized Training Centers (AATCs).
OS X Support Essentials 10.9: Provides an intensive and in-depth exploration of
troubleshooting on OS X, touring the breadth of functionality of OS X systems.
OS X Server Essentials 10.9: Gives technical coordinators and entry-level system
administrators the knowledge to implement an OS X Serverbased system.
OS X Certifications
Apples OS X Certifications are designed for IT professionals who:
Support OS X users in a business, education institution, or school district
Manage networks of OS X systems in an organizationfor example, a teacher or a
technology specialist who manages classroom networks or computer labs
Manage complex, multiplatform networks that include OS X systems
Apple Certified Associate - Mac Integration certification verifies an understanding of
the different ways to integrate a Mac within a Windows or other standards-based
network.
89
Books
The Apple Training Series books constitute a key part of Apples official curriculum,
covering OS X and OS X Server. These books offer an independent approach to
training and certification, guiding students step by step through real-world projects.
The books are also excellent references for performing specific tasks and technologies.
There are two titles in the Apple Training Series, written for IT support and system
administration personnel:
OS X Support Essentials 10.9
OS X Server Essentials 10.9
For more information about the books, visit Peachpit Press at www.peachpit.com/
appleprotraining.
Support
In addition to the AppleCare Protection Plan, Apple provides online support at
www.apple.com/support, where you can access technical articles, download manuals,
and join discussion forums.
The Apple Support site also provides some online training materials for those who are
new to OS X at www.apple.com/support/macbasics/.
90