For those people using Jumpcloud and Wazuh, I created a bridge that writes the logs into JSONL. https://github.com/ChiefGyk3D/jumpcloud-wazuh-bridge
For those people using Jumpcloud and Wazuh, I created a bridge that writes the logs into JSONL. https://github.com/ChiefGyk3D/jumpcloud-wazuh-bridge
Block Gmail Attachment Downloads on iOS (JumpCloud MDM)
Stop users from downloading Gmail attachments on iOS using JumpCloud MDM. Step-by-step controls to reduce data leakage and improve mobile security.
#JumpCloud #MDM #iOSSecurity #EmailSecurity #ITAdmin
https://netnxt.com/knowledge-base/block-gmail-attachment-downloads-ios-jumpcloud-mdm?utm_source=Twitter&utm_medium=Referral&utm_campaign=SEO
🚨 JumpCloud Remote Assist flaw (CVE-2025-34352) lets local users hijack full control of company devices. Affects 180,000+ orgs. Update now to patch.
Read: https://hackread.com/jumpcloud-remote-assist-flaw-full-devices-control/
MDM Comparison Table
https://github.com/hkystar35/MDM/blob/main/Apple/MDM%20Comparison%20Table.md
I’ve merged the updated table format from the dev branch to main
Highlights:
- Key table added
- Broke out the old “Name” and “Category” columns into Feature, Category, and OS to make it easier to identify features and where they apply
- Updated many Names / Features
- Added a few Features
- Added #intune
#jamf #mosyle #meraki #kandji #jumpcloud #addigy #macos #mdm
Hey all. I’ve been wanting to update this MDM comparison table, as well as add Intune (I haven’t gone through Intune’s features yet) to it
Please check out the dev branch table and offer up any feedback in the form of a PR
https://github.com/hkystar35/MDM/blob/dev/Apple/MDM%20Comparison%20Table.md
(From my old blog post https://sysmansquad.com/2022/05/03/2022-05-03-evaluating-apple-mdm-products/)
#mdm #mac #macos #apple #jamf #kandji #mosyle #addigy #jumpcloud #intune #meraki
SentinelOne researchers attribute the recent supply chain attacks on JumpCloud to North Korea-linked threat actors. JumpCloud is a cloud-based directory service platform designed to manage user identities, devices, and applications in a seamless and secure manner. It allows IT administrators to centralize and simplify their identity and access management tasks across various systems and applications. […]