Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Loss Prevention Using Prey

Jamf
October 24, 2018

Loss Prevention Using Prey

Presentation from JNUC 2018, the world's largest rally of Apple IT administrators.

Session:
Loss Prevention Using Prey

Presented by:
Michael Sanchez, Westside Community Schools

View all session slides, recordings and more at https://www.jamf.com/events/jamf-nation-user-conference/2018/.

Jamf

October 24, 2018
Tweet

More Decks by Jamf

Other Decks in Technology

Transcript

  1. Your logo here 275 x 100 max © JAMF Software,

    LLC Michael Sanchez IT Manager Westside Community Schools 275x275 head shot
  2. Your logo here 275 x 100 max © JAMF Software,

    LLC Westside • Westside has been 1:1 for 15 years • Currently have 8,000 managed devices • One of the first 3 schools in US 1:1 A few key points:
  3. Your logo here 275 x 100 max © JAMF Software,

    LLC Loss Prevention Using Prey Presentation agenda: Go over legal issues with tracking in K-12 Go over recovery issues in a K-12 environment How Westside sets up & installs Prey Making the perfect configuration profile to help Prey
  4. Your logo here 275 x 100 max © JAMF Software,

    LLC What is Prey? What can it do? • Give precise GPS coordinates • Give details about surrounding wifi’s • Take pictures of the desktop • Take pictures using the webcam** Prey is an asset recovery program that can:
  5. Your logo here 275 x 100 max © JAMF Software,

    LLC Objective 1: Legal issues in K-12 • Powerful tracking software is frowned upon • Talk with an admin before deploying • Have a police report before you activate Lets get the boring stuff out of the way first
  6. Your logo here 275 x 100 max © JAMF Software,

    LLC How Westside handles the legal issues • The prey.pkg is copied to every computer • Anyone with Jamf access can activate Prey • Only 3 people have access to reports
  7. Your logo here 275 x 100 max © JAMF Software,

    LLC Objective 2: Recovery issues • Non-theft computer losses • Network connectivity • Stolen recovery issues
  8. Your logo here 275 x 100 max © JAMF Software,

    LLC Non-theft recovery issues • Student lost computer somewhere • Student refusing to turn in ≠ theft in many states
  9. Your logo here 275 x 100 max © JAMF Software,

    LLC Max image dimensions No Internet connection No internet connection means no Prey, so if the computer was stolen it has to connect to a network to activate.
  10. Your logo here 275 x 100 max © JAMF Software,

    LLC Stolen computer recovery issues One of the biggest issues we see at Westside, once we have the location of the computer, is getting the police to act.
  11. Your logo here 275 x 100 max © JAMF Software,

    LLC Stolen computer recovery tips • Have SRO (School Resource Officer) handle it • If no SRO, verify who has jurisdiction (police, sheriff, state patrol etc…) • If no SRO, talk with police beforehand
  12. Your logo here 275 x 100 max © JAMF Software,

    LLC Objective 3: How we set up Prey Now onto the fun part! Over the next few slides, I will be showing you how Westside has set up Prey, as well as how to configure the best profile to go with the program.
  13. Your logo here 275 x 100 max © JAMF Software,

    LLC How to build a config profile around Prey • First, make a smart group for stolen computers and add it to the exclusions for your normal configuration profile • Restrict apps from running • Restrict utilities from running (terminal) • Allow the use of camera for Prey • Set password required to 8 hours
  14. Your logo here 275 x 100 max © JAMF Software,

    LLC Change the pre-stage The last thing Westside does is change the pre- stage enrollment for DEP