Prisma Access Browser
Deploy Prisma Access Browser Using Jamf
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
-
- Use the Prisma Access Browser Dashboards
- Digest Prisma Access Browser Home Screen Highlights
- Account Protection for the Prisma Access Browser
- Manage Prisma Access Browser Users
- Manage Prisma Access Browser Applications
- Manage Prisma Access Browser Extensions
- Manage Prisma Access Browser Sign-in Rules
- Manage Prisma Access Browser Requests to Bypass Policy Rules
- Manage Rollback Control for the Prisma Access Browser
- Prisma Access Browser Remote Connections
- Location-based Policy
-
- Integrate Prisma Access Browser with Microsoft 365
- Integrate Prisma Access Browser with Microsoft Information Protection
- Windows Account Based SSO Authentication
- Integrate Prisma Access Browser with Google Workspace
- Integrate Prisma Access Browser with Votiro
- Integrate Prisma Access Browser with CrowdStrike Falcon Intelligence
- Integrate Prisma Access Browser with OPSWAT MetaDefender
- Integrate Prisma Access Browser with YazamTech SelectorIT
- Integrate Prisma Access Browser with Symantec DLP
- IP Based Enforcement
- Certificate-Based Enforcement
- How Is Synched Data Stored?
Deploy Prisma Access Browser Using Jamf
Jamf is a comprehensive management system for Apple macOS and iOS
devices. With Jamf, you can proactively manage the entire lifecycle of Apple
devices. This includes deploying and maintaining software, responding to
security threats, distributing settings, and analyzing inventory data.
Deploying the Prisma Access Browser using Jamf is easy - just follow these 2
steps.
- Open the Jamf Dashboard and select Settings.
- Select Computer ManagementScripts.
- On the Scripts page, select New.
- On the New Script page, on the General tab, enter the Display Name - a name for the script. Use any name that meets your organizational requirements.
- Select the Script tab.
- Download and edit the Installomator script.
- Locate the line: DEBUG=1, and change it to: DEBUG=0..
- Locate the label: prism9. Enter
the following script before this label:.pabrowser) name="Prisma Access Browser" type="dmg" if [[ $(arch) != "i386" ]]; then printlog "Architecture: arm64 (not i386)" downloadURL=$(curl -s https://bfe078e7921507bb.talon-sec.com/sparkle/PAB/stable-a64/appcast.xml | grep -Eo 'url="(.*)"' | cut -d '"' -f2 | tail -n1) appNewVersion=$(curl -s https://bfe078e7921507bb.talon-sec.com/sparkle/PAB/stable-a64/appcast.xml | grep -Eo 'sparkle:shortVersionString="(.*)"' | cut -d '"' -f2 | tail -n1) else printlog "Architecture: i386" downloadURL=$(curl -s https://bfe078e7921507bb.talon-sec.com/sparkle/PAB/stable/appcast.xml | grep -Eo 'url="(.*)"' | cut -d '"' -f2 | tail -n1) appNewVersion=$(curl -s https://bfe078e7921507bb.talon-sec.com/sparkle/PAB/stable/appcast.xml | grep -Eo 'sparkle:shortVersionString="(.*)"' | cut -d '"' -f2 | tail -n1) fi expectedTeamID="XZMH593AYG" ;;
- Click the Options tab. Under Parameter 4, enter the Application name. Select Save.
- The script is saved; you can now create a new Policy.
- Create the Policy.
- In the Jamf Dashboard, select ComputersPoliciesNew.
- On the Policies page, select New.
- On the New Policy page, enter the Display Name for the policy.
- Select Scripts.
- In the Configure Scripts field, click Configure.
- On the New Policy page, select the Script and click Add.
- In the Parameter Values section, select the Application Name field, and enter pabrowser.
- Save.The Script is added to the policy.