topics for event mac tech

Sessions and Topics

    • Apple’s Lockdown: SIP, Read Only System, GateKeeper and XProtect
      Even the most basic security concerns have exploded — and Apple wants to have the most secure operating systems on the planet. As an IT professional or consultant, you deal with Apple’s choices and the ever more protected nature of that ecosystem every day. Where in days past, you could deploy a copy of a “perfect” system, now that “imaging” has all but gone away and Apple has moved toward a more and more protected space for its users, your job could be to fight against features and new lockdowns, a never ending battle, or you can embrace where Apple is going with processes that cooperate with the new approach. In this session, learn the recent past, the current climate and features, and then where Apple is likely headed with their lockdown of macOS, and most importantly, how you as an IT professional can meet that challenge with your processes and systems. You will learn how systems including System Integrity Protection, Read Only Systems, GateKeeper and XProtect impact your users and the administration of their systems.
    • Storage Strategy in 2020: NAS, Cloud, Hybrid, Secure
      As an Apple professional, your users’ and clients’ needs are potentially different from the needs of other OSes. The average macOS user has bigger file stores, and throughput needs. But, at the same time, Apple users have to access Windows servers. With all demands today for access, services, cloud, and even backups and sync, you need to have a storage strategy. What do you need to consider? What Windows server solutions can you use to support macOS? What disk formats do you need to support? And, how does public cloud, private cloud, and hybrid cloud take part of your strategy? Finally, but far from least important, what about uptime demands, security, encryption, regulatory compliance, and more. Come learn about a modern storage strategy using cloud and NAS and how you can make it work for those you support.
    • Security Best Practices: VPNs, Human Hardening, Trust, and More
      In today’s hyper-connected, digital world, it’s never been more important to help users and clients protect and secure their data. While some regions have passed laws that make it easier for consumers to control at least some of their data — and who gets to use it — most people live at the whim of the corporations that collect their data. And everyone lives with the very real threat of wrongdoers. Every technologist and consultant should know that only some of this work is technical in nature. Much of it, frankly, is employing common sense approaches to how and when we use our technology. Small technical and behavioral changes can result in massive security and privacy changes… either for better or worse. In this session, we’ll talk about real world VPN solutions, human hardening, the importance of who your systems trust, and do’s and don’ts. In the end, you’ll walk away with methodologies and solutions you can act on, or at least consider, for those that you support.
    • plists: The ins, the outs, the dangers
      Almost all ways one manages devices, whether directly or via an MDM or other management tool, is done in part at least via controlling and configuring the preferences and settings of a system’s plists. Preferences exist on all OS platforms and on macOS they have a .plist extension. In this session, we’ll learn about how plists are organized, how they behave, and how the multi domain system is traversed to read the different available plist files. We’ll talk about several tools which you can use to work with plist files. And, we’ll learn about the right way to see preferences and modify them. You’ll learn how a pro interacts with a system to understand the preferences assigned to a given application. We’ll explore how plist reading and interpretation can be incredibly useful for troubleshooting, configuration and reporting on systems as an administrator — including how to create customized systems.
    • Modern Command Line: zsh, Swift & Best practices.
      Apple has made it clear that bash is no longer its preference with zsh and Swift being the future. Starting with macOS Catalina, the standard is now zsh — Z Shell. At some point in the future, bash will not be installed by default on macOS. In this session, we’ll talk about the similarities and differences of zsh and bash. We’ll cover how you can install bash on a system that doesn’t have it installed, but more importantly, we’ll highlight the new features that zsh brings to the table. We’ll also talk about best practices in zsh, and the rich community resources available. We’ll also cover Apple’s updates to Swift, and its clear direction in the future for all Apple professionals. Come learn about the modern macOS command line, and the changes that will impact those supporting others.
    • Kernel and System Extensions: What you need to know.
      macOS is changing from the inside out and it’s critical that those supporting Apple understand how the operating system works now, and how it is likely to work in the future. Knowing exactly when something fails can help you to know what process is failing, especially during start up. Apple has been warning strongly for years to stay away from writing kernel extensions — Kernel Extensions are going away, replaced by System Extensions and other system modification methods. Learn what makes a kernel extension a danger to the performance of your computer hardware (fans off, processor to full speed ahead!). Apple decided a while ago to deprecate network kernel extensions making them unsupported in Catalina, but that effort took years to accomplish. Learn what kinds of services were handled by network kernel extensions in previous versions of macOS, and how that landscape is shifting. Most importantly, learn the troubleshooting methods that give you the best chance of correcting unwanted behaviors caused by kernel extensions, system extensions, and other operating system modification tools installed by 3rd parties. As part of this exploration you will learn the practical differences between system extensions and kernel extensions and how those differences will affect how you do your work.
    • macOS Troubleshooting Tools and Tricks
      With the changes and evolution of macOS, technologists need to keep up with not only the changes but the tools for managing and troubleshooting those changes. In this session, we’ll learn about the troubleshooting and other tools that should be in your toolbox, as well as some of the best tricks and methodologies for troubleshooting and supporting systems that have gone awry.
  • After Event Bonus: Convergence – What’s Coming? What should you be Prepared for?
    If one thing is clear, technology is converging — and areas of responsibility including telecom, connectivity, IoT, and evening lighting are becoming more and more technology based. That means that they are either about to be the responsibility of IT, if not already, or will need to integrate with IT. In this talk, we’ll talk about this convergence, the possible dangers, and the opportunities for consultants, admins and IT Pros.

Addigy Accreditation for Apple Device Management

Addigy Accreditation for Apple Device Management is coming to a city near you for 2020. Come join us for a one-day event to gain valuable insights:

  • Learn best practices for managing your fleet of Apple Devices
  • Deep dive into macOS and MDM (Mobile Device Management)
  • Leverage Automated Device Enrollment for out-of-the-box zero touch provisioning (aka DEP)
  • Implement the best security practices for your organization
  • Ensure happy and productive end-users
  • Exam and Accreditation for Apple Device Management with Addigy

Course outline Introduction to Addigy and Addigy Device Management at a Glance Explore Addigy company overview, platform navigation and instructions on how to create users and update account settings. Leveraging and contributing to the Addigy Community. Apple, Addigy and ecosystem terminology and acronyms. Enrolling Apple Devices in Addigy Understand the Addigy device enrollment process and Apple enrollment methods – including Apple User Approved MDM requirements, Apple Automated Device Enrollment (previously DEP) through Apple Business Manager/Apple School Manager, Apple Supervised Mode, implications of Device Supervision and related Apple and Addigy workflows allowed via Addigy’s agent and MDM. (LAB) Building Scalable Policies & Assessing Device States Define device states, create policies, policy inheritance, policy catalog, and best practices of policy layouts. Enforcement of MDM configuration profiles. (LAB) Defining Device States, Software Deployment and Patching Configure installs of custom software packages and public software from the Addigy policy catalog. (LAB) Deploying App Store content with Apps & Books (previously VPP) Explore how to configure Apple Apps & Books integration with Addigy, how to deploy App Store apps via Addigy policies, and viewing Apple Apps & Books assets in Addigy. Defining Device States with MDM Configuration Learn about Addigy’s Apple MDM configurations, custom MDM profiles, Apple privacy controls, requirements and limitations. Monitoring Device Compliance with Alerts and Remediation Review Addigy Facts and Alerts, creating & customizing Monitoring items, resolving & remediating Alerts, and optional ticketing integration with alerts. 3 Advanced Software Deployment, Custom Facts, and Scripts Understand best practices and a deeper discussion on condition scripting in Custom Software, removal scripting in Custom Software, building Custom Facts, and remediation scripting within Addigy Alerts.



To supervise an iPhone, iPad, or iPod touch, you can use Apple Business Manager or Apple School Manager. You can also configure your iOS device to be automatically enrolled in Mobile Device Management (MDM).

This article is intended for system administrators.

You can start using your supervised devices after your organization or educational institution is set up with Device Enrollment. If you need help adding your MDM server and assigning devices to it, use Apple Business Manager Help or Apple School Manager Help. For more information about how to configure MDM enrollment settings during activation, you might need to contact your MDM vendor or use Profile Manager Help.

Check network requirements