← Back to all integrations
Monitor your managed devices and check security settings
Install

Integration Details

Integrating with JAMF enables you to keep track of your devices, their security, and take action when there are changes.

Jamf automatically associates devices to the workforce member that uses it as well as checks that devices have disk encryption and automatic updates enabled.

Automatically update your Asset Inventory

By integrating with JAMF, you'll quickly create an inventory of all your JAMF-managed devices (laptops, phones, etc.)

Automatically trigger activities when devices change

Additionally, you can leverage Ticket Templates to automatically trigger processes when devices are added or removed from JAMF

Automatic associations to people

We use the email on the Jamf device to automatically associate it to the workforce member that uses it if they're tracked in your asset inventory.

Automatically Check Device Security Settings

When syncing your devices, we automatically check them for secure settings. See the Checks section below for more details.

Automatically Check Disk Encryption

Every month, Comply will scan your devices to check them for disk encryption settings. See the Checks section below for more details.

Automatically Check for Automatic Updates

Every month, Comply will scan your devices to check them for automatic updates settings. See the Checks section below for more details.

How to use Aptible and Jamf

  • Automatically delegate onboarding and offboarding tasks to relevant asset owners as device statuses change in Jamf.
  • Keep your asset inventory up to date with real-time updates as you add devices to Jamf
  • Get notifications when changes in security settings, update settings, and disk encryption settings on your devices put them at odds with your policies.

Assets synced
  • Devices
Controls Automated
  • Mobile Device Management
EVIDENCE CHECKS PERFORMED
Device Carried

We help you make sure all devices are properly onboarded and distributed by alerting you when a device has no associated employee.

Device Managed

Devices enrolled in the MDM are referred to as managed. We alert you when devices are non-compliant, so you have the evidence to back up your Device Security Policy.

Integration scopes
  • Level: Service Account
  • Permissions: Read Only