π Note
Hyperproof connects to many third-party systems that frequently change, including the system interface. Contact your System Administrator or the third-party provider for assistance in meeting the requirements to integrate with Hyperproof and collect the proof you need.
Hyperproof supports both Jamf Cloud and Jamf On Prem. If you are using Jamf On Prem, you must add the port number to the URL, e.g. https://hyperprooftest.jamfcloud.com:443
β
Hyperproof does not support Jamf authentication via SSO.
β
When you create a Hypersync between Hyperproof and Jamf, you can automatically collect the following proof types:
Jamf proof types and fields
Proof type | Fields | Testable |
All Computer Groups and Computer Groups by ID | Computer Group ID, Computer Group Name | Yes |
Configuration Policies | ID, Name, Enabled, Triggers, Execution Frequency, Target Drive | Yes |
Disk Encryption Policy Details | Name, Enabled, Triggers, Action Disk Encryption Configuration: Name, Key Type, Enabled FileVault2 User | No |
List of All Policies | ID, Name, Enabled, Triggers, Execution Frequency, Target Drive | Yes |
List of Computers | ID, Name, Managed, Username, Model, FileVault 2 Partition Encryption State, Operating System, OS Version Properties, Firewall Enabled | Yes |
List of Mobile Devices | ID, Name, Device Name, Managed, Model, Username | Yes |
List of Password Policies | Name, Required Passcode, Complex Passcode, Alphanumeric Values, Minimum Length, Complex Characters, Auto Lock | Yes |
OSX Configuration Policies | Profile ID, Profile Name | Yes |
Restricted Software | ID, Name, Process Name, Exact Match, Delete Executable, Send Notification, Kill Process, All Computers | Yes |
β
Additional documentation
π Note
You only need to connect Hyperproof to the app once, and then you can create as many Hypersyncs as you need.
β
Additionally, you can create multiple Hypersyncs for a single control or label.
Permissions
Below is a list of permissions needed for the Jamf Hypersync.
Proof type | Permission |
Computer Group |
|
Disk Encryption Policy Details |
|
List of Computer Groups |
|
List of Computers |
|
List of Mobile Devices |
|
List of Password Policies |
|
List of Policies |
|
List of OSX Configuration Profiles |
|
List of Restricted Software |
|
OSX Configuration Profile |
|
![Hyperproof.Io [Test] Help Center](https://downloads.intercomcdn.com/i/o/xgk1dxp2/757668/427b255f2659cc7e0853d6a00ec1/628914ae2617199b7d999ba797a5305a.png)