Vanta mass deployment

I recently encountered a client with the need to deploy the Vanta agent to multiple macOS devices. Surprisingly, there was no officially supported method for this, even after consulting with Vanta support. However, through some reverse engineering, I managed to devise a solution. Let's begin by outlining the prerequisites for making this script work effectively. 1. A paid Vanta subscription and an admin account. 2. Your  VANTA_KEY= from here:  Setup Instructions - Vanta   3. Region of Vanta instance 4. Method to get email of the user you want to assign this agent to (optional) Ok now that we have this info we can edit my script. These are the values we need to update: AGENT_KEY="" OWNER_EMAIL="" REGION="" Examples: AGENT_KEY="rtvgbh5rvcnn928h2ag5ten11148q3ucwfj3f8zkr2grdk696rt0" OWNER_EMAIL="" REGION="us" Here is the full script you can edit.

Azure AD (Microsoft Entra) Bulk Token Troubleshooting

 I had an issue with trying to create an AAD bulk token via the Windows Configuration Designer  . The error message I had: Checking the log located here: {Replace Kyle with your username} C:\Users\Kyle\Documents\Windows Imaging and Configuration Designer (WICD)\Project_Name\ICD.log 9/13/2023 3:37:53 PM Info Project 'New' created successfully and added to workspace 9/13/2023 3:37:53 PM Info Loading scenario ID: xxxxx-xxxxxxx-xxxxxx-xxxxxxx, URI: http://localhost:9098/Scenarios/xxxxxxx-xxxxxxx-xxxxxx-xxxxx/Index.html 9/13/2023 3:38:36 PM Error Bulk token retrieval failed: {"error":"server_error","error_description":"AADSTS90092: Non-retryable error has occurred.\r\nTrace ID: caxxxxxx-xxxxxxx-xxxxxx-xxxxxx\r\nCorrelation ID: xxxxxx-xxxxxx-xxxxxx-xxxxxxx\r\nTimestamp: 2023-09-13 20:38:36Z","error_codes":[90092],"timestamp":"2023-09-13 20:38:36Z","trace_id":"xxxxxx-xxxxxxx-xxxxxxx-xxxxxx","

Setup Device Compliance with Jamf and Intune

  Requirements: Azure user group created Jamf Pro Smartgroup created Global admin rights in Azure AD Admin account in Jamf Pro Steps to setup Device Compliance 1. Login to Jamf Pro and go to: Global-->Device Compliance-->Pick your Compliance Group (Jamf Pro Smartgroup)-->Pick your Applicable Group (Smart group containing all computers Jamf Pro uses to send a compliance status to Microsoft Intune.) 2. Enable the setting in Jamf Pro and you will be redirected to Azure permissions page. Click Accept on each one. 3. Click the Open Microsoft Endpoint Manager button 4. Click the Add compliance partner button 5. Pick Jamf Device Compliance 6. Click Add groups and add your user group you created in Azure AD. I created one called "All Users" 7. You should see a screen like this. 8. Click Confirm 9. Now wait for the activation to apply. 10. Now the connection is complete and you can start registering devices via Company Portal. 11. Important with the new workflow Macs only sho

Change Jamf Management Account

 There are times when you sometimes run across this message on a Jamf Instance. So to fix this doesn't seem to be an easy task. Thanks to Jamf API call I have a script which will do all the steps to change this over for you with the exception of one step we can easily use a policy for. This is what the script does: 1. Create a new local admin account. 2. Jamf API call to change the management account to this new local account 3. Send a Jamf recon at the end. Taking this script we can build a policy that looks like this: Scope this out to Macs and once this is done edit this setting in Jamf Pro to your local username.

Helpful Tools

 Here are some links to some tools I have made to help with Mac/Jamf Management I manage a lot of diffirent Jamf enviroments and need make a enrollment url for automation or for endusers to enroll their devices. I use the Enrollment Invitations in Jamf Pro. This is a simple tool to create a P12 file for Google LDAP and Google with Jamf Connect based on this info here:

Set Account Pictures via Jamf Connect

 This guide will walk you through setting the local macOS account pictures for endusers via Jamf Connect Requirements: Jamf Pro Jamf Connect Formatted ID Token Path setup in Jamf Connect Login Config ( /private/tmp/token) Azure Storage Blob Email addresses of users follow a pattern for all users (,, etc..) Tested with: Azure AD and Jamf Connect Test User: Steps: 1. First step is to get all of your user images. To make this easy on yourself name them the same as the user's email address. So for John Smith his email is I would name his image as and upload that image and all other user's images to an Azure Storage blob. Example: 2. Setup this script to run via Jamf Pro. I have mine setup to run via Jamf Connect Notify Note:  You will need to update this with your Azure Storage Blob url  curl -L "$EMAIL.png&


Hello my name is Kyle Ericson and I'm an Independent IT Contractor. I have created this site to share documentation with our IT admins.  If you would like to contact me click contact me from the left hand side panel.