Jamf Protect - Remote lock computer with Jamf Pro

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This Playbook can be used manually or in a Automation Rule to send an remote MDM command with Jamf Pro to lock the computer with an randomised 6 digit passcode.

Attribute Value
Type Playbook
Solution Jamf Protect
Source View on GitHub

Additional Documentation

📄 Source: JamfProtect_LockComputer_with_JamfPro/readme.md

JamfProtect_LockComputer_with_JamfPro

## Summary This Playbook can be used manually or in a Automation Rule to send an remote MDM command with Jamf Pro to lock the computer with an randomised 6 digit passcode.

JamfProtect_LockComputer_with_JamfPro

Prerequisites

  1. Generate API Client in Jamf Pro and take note of the CLientID and Secret. learn how.
  2. Use the ClientID and Password during the deployment of this Playbook.

Deployment instructions

  1. Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.
  2. Fill in the required parameters:

    • jamfProURL: Enter the Jamf Pro instance URL.
    • jamfProClientID: Enter the ClientID of Jamf Pro API Client.
    • jamfProSecret: Enter the ClientSecret of Jamf Pro API Client.
    • Playbook_Name: Enter the playbook name here (Ex:JamfProtect_LockComputer_with_JamfPro).

Deploy to Azure Deploy to Azure

Playbook steps explained

Microsoft Sentinel Incident

When an Incident is being created and we have an Automation Rule in place to rule this trigger we can use the Incident details.

Generate Access Token using API Client

This HTTP Action will generate an Access Token using the defined parameters.

Parse JSON Response from Access Token

This action parses the response from the previous HTTP action in a format so we can use it further in the Playbook.

Set accessToken as variable

This action parses the response from the previous HTTP action in a format so we can use it further in the Playbook.

Parse JSON Entities from the Incident

This actions parses the Host Entity array from the incident.

Filter array for the entity kind Host

This action filters the array Hosts from the incident so we can use it in the Playbook.

For each host send DeviceLock Command

Runs a set of actions for each host

### Get JSSID for given computer in Jamf Pro
This HTTP action will get the JSSID for the given Host.

### Parse JSON response for given computer
This action parses the response from the previous HTTP action in a format so we can use it further in the Playbook.

### Get managementID for given computer in Jam Pro
This HTTP action will get the managementID for a given host based up on it's JSSID.

### Parse JSON for given computer based on managementiD
This action parses the response from the previous HTTP action in a format so we can use it further in the Playbook.

### Generate a randomised 6 digit value
This action will generated a randomised 6 digit integer value

### Send DeviceLock command to given computers JSSID
This HTTP action will send a DeviceLock command to the stored JSSID and using the randomised 6 digit integer value as passcode.

### Add comment to incident (V3)
This action will generate a comment to the Incident and stores the host including the passcode we have been sending a command to.

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Jamf Protect