Section 5: Computer Management Flashcards
If an administrator wants to change the default search syntax, where in Jamf Pro is that setting located?
User Account > Account Preferences > Search Preferences
What three formats can search results be exported in?
.csv, .txv, and XML
Where are the settings to customize the presentation of search results located?
Settings > Computer Management > Inventory Display
Can a computer belong to more than one building at a time?
No, a computer can only belong to a single building at a time.
What can be used to group sets of matching criteria when building advanced searches
Parentheses can be used to group sets of matching criteria.
What is required to set up email reporting for an advanced search?
Jamf Pro must be integrated with an SMTP sever.
Which category contains the make and model of an enrolled computer?
To locate the make and model of an enrolled computer in Jamf Pro, navigate to the Hardware category.
What service does Jamf Pro leverage to deploy a remote command?
What must be entered on a computer in order to regain access after a Lock Computer remote command has been deployed?
In order to regain access, a firmware-level passcode (set by an IT admin in Jamf Pro) must be entered on the computer.
What type of group is required in order for membership to be dynamically updated?
A smart computer group must be created for dynamic updates.
How are computers assigned to static groups?
Computers are manually added to static groups by administrators in Computers > Static Computer Groups > [group name]
How can members of smart computer groups be monitored from the Jamf Pro Dashboard?
Select the checkbox for Show in Jamf Pro Dashboard.
What are the three components of scope?
The three components of scope are targets, limitations, and exclusions.
Of the three components of scope, which needs to be included as a minimum requirement for deployment?
At a minimum, every management task needs only a target to be deployed. Both limitations and exclusions require targets in order to function properly.
If a computer is included as both a target and exclusion for a management task, what happens?
The computer will not receive the management task; the exclusion removes that computer from the target pool in the management task’s scope. Exclusions always override targets and limitations.