{"id":2933,"date":"2018-12-05T10:16:01","date_gmt":"2018-12-05T10:16:01","guid":{"rendered":"http:\/\/blog.designed79.co.uk\/?p=2933"},"modified":"2018-12-05T10:16:01","modified_gmt":"2018-12-05T10:16:01","slug":"deploying-filevault-with-a-configuration-profile","status":"publish","type":"post","link":"https:\/\/blog.designed79.co.uk\/?p=2933","title":{"rendered":"Deploying FileVault with a Configuration Profile"},"content":{"rendered":"<div id=\"block-f75f93a51f9dba21a5e6\" class=\"sqs-block html-block sqs-block-html\" data-block-type=\"2\">\n<div class=\"sqs-block-content\">\n<p>This article will discuss deploying FileVault 2 via a Configuration Profile to managed Macs with Jamf Pro using either an Individual Recovery Key, an Institutional Recovery Key, or both together.<\/p>\n<h2><strong>Creating an Institutional Recovery Key<\/strong><\/h2>\n<p>Skip this section if you do not plan to deploy an Institutional Recovery Key.<\/p>\n<p>Jamf has <a href=\"https:\/\/www.jamf.com\/jamf-nation\/articles\/326\/creating-and-exporting-an-institutional-recovery-key\">excellent documentation<\/a> on how the Institutional Recovery Key is created. In order to wind up with a key we can upload to Jamf Pro, use the directions in the section titled \u201cCreating and Exporting an Institutional Recovery Key <strong>without<\/strong> the Private Key\u201d to wind up with a .cer file.<\/p>\n<h2><strong>Creating the Configuration Profile<\/strong><\/h2>\n<p>Begin by creating a new Configuration Profile, name it whatever you\u2019d like, and we can leave this as a Computer-Level profile.<\/p>\n<h3><strong>If Using an Institutional Recovery Key:<\/strong><\/h3>\n<\/div>\n<\/div>\n<div id=\"block-yui_3_17_2_1_1518647141357_26058\" class=\"sqs-block image-block sqs-block-image sqs-col-6 span-6 float float-right sqs-text-ready\" data-block-type=\"5\">\n<div id=\"yui_3_17_2_1_1544004713184_79\" class=\"sqs-block-content\">\n<div id=\"yui_3_17_2_1_1544004713184_78\" class=\"image-block-outer-wrapper layout-caption-hidden design-layout-inline    sqs-narrow-width\">\n<div id=\"yui_3_17_2_1_1544004713184_77\" class=\"intrinsic\">\n<div id=\"yui_3_17_2_1_1544004713184_76\" class=\"image-block-wrapper   has-aspect-ratio\" data-description=\"\"><img decoding=\"async\" class=\"thumb-image loaded\" src=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b92de4966b15dd8bf255\/1518647616623\/Cert.png?format=750w\" alt=\"Cert.png\" data-src=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b92de4966b15dd8bf255\/1518647616623\/Cert.png\" data-image=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b92de4966b15dd8bf255\/1518647616623\/Cert.png\" data-image-dimensions=\"678x532\" data-image-focal-point=\"0.5,0.5\" data-load=\"false\" data-image-id=\"5a84b92de4966b15dd8bf255\" data-type=\"image\" data-position-mode=\"standard\" data-image-resolution=\"750w\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"block-yui_3_17_2_1_1518647141357_30903\" class=\"sqs-block html-block sqs-block-html\" data-block-type=\"2\">\n<div class=\"sqs-block-content\">\n<ol>\n<li><strong>Configure<\/strong> the <strong>Certificates<\/strong> payload<\/li>\n<li><strong>Name<\/strong> this certificate \u201cInstitutional Recovery Key\u201d or something else that makes sense<\/li>\n<li>Change \u201cSelect Certificate Option\u201d to <strong>Upload<\/strong><\/li>\n<li>Choose the .cer file created in the previous section<\/li>\n<li>The Certificates payload should now look like the screenshot to the right<\/li>\n<li><strong>Save<\/strong> the entire Configuration Profile before moving on &#8211; <strong>Edit<\/strong> it again to proceed<\/li>\n<\/ol>\n<div id=\"block-yui_3_17_2_1_1518647141357_30903\" class=\"sqs-block html-block sqs-block-html\" data-block-type=\"2\">\n<div id=\"yui_3_17_2_1_1544004713184_202\" class=\"sqs-block-content\">\n<h3 id=\"yui_3_17_2_1_1544004713184_201\"><strong>Configuring FileVault Settings<\/strong><\/h3>\n<p>The FileVault settings are inside of the Security &amp; Privacy payload. With this payload, however, comes General (including Gatekeeper), Firewall, and Privacy. Make sure there\u2019s not already an existing Security &amp; Privacy payload scoped to the same machines that is managing those settings as we don\u2019t want duplicate payloads.<\/p>\n<ol>\n<li><strong>Check<\/strong> the box to \u201c<strong>Require FileVault 2\u201d<\/strong>\n<ul>\n<li>If using an Institutional Recovery Key, <strong>check<\/strong> the box to \u201c<strong>Use institutional recovery key<\/strong>\u201d\n<ul>\n<li><strong>Change<\/strong> the \u201c<strong>Certificate<\/strong>\u201d dropdown menu to reflect the <strong>Certificate Name<\/strong> we configured previously<\/li>\n<\/ul>\n<\/li>\n<li>If using an Individual Recovery Key, <strong>check<\/strong> the box to \u201c<strong>Create individual recovery key<\/strong>\u201d<\/li>\n<\/ul>\n<\/li>\n<li>Optionally <strong>check<\/strong> the box to \u201c<strong>Require user to unlock FileVault 2 after hibernation<\/strong>\u201d<\/li>\n<\/ol>\n<h2><strong>Enabling Escrow of the Personal Recovery Key<\/strong><\/h2>\n<p>If this Profile will be used to encrypt machines running <strong>macOS 10.13 or later<\/strong>, and we want to store the Individual Recovery Key (referred to in this setting as a \u201cPersonal Recovery Key\u201d) in Jamf Pro, then we need to <strong>check<\/strong> the box to \u201c<strong>Enable Escrow Personal Recovery Key<\/strong>\u201d<\/p>\n<ol>\n<li>The <strong>Escrow Location Description <\/strong>message must be configured, and it can be as simple as something like \u201cYour Recovery Key Will be Sent to IT for Safe-Keeping.\u201d<\/li>\n<li><strong>\u201cRecord Number\u201d Message<\/strong> is optional, but something like \u201cPlease Give IT This Number\u201d would make sense here.<\/li>\n<li>Leave <strong>Personal Recovery Key Encryption Method<\/strong> as \u201c<strong>Automatically encrypt and decrypt recovery key<\/strong>\u201d<\/li>\n<\/ol>\n<p>The FileVault tab should now look like this if we&#8217;re deploying both an Institutional and Individual Recovery Key:<\/p>\n<\/div>\n<\/div>\n<div id=\"block-yui_3_17_2_1_1518647141357_34328\" class=\"sqs-block image-block sqs-block-image sqs-text-ready\" data-block-type=\"5\">\n<div id=\"yui_3_17_2_1_1544004713184_102\" class=\"sqs-block-content\">\n<div id=\"yui_3_17_2_1_1544004713184_101\" class=\"image-block-outer-wrapper layout-caption-hidden design-layout-inline   \">\n<div id=\"yui_3_17_2_1_1544004713184_100\" class=\"intrinsic\">\n<div id=\"yui_3_17_2_1_1544004713184_99\" class=\"image-block-wrapper   has-aspect-ratio\" data-description=\"\"><img decoding=\"async\" class=\"thumb-image loaded\" src=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b9c1e2c4835ce8d9aa54\/1518647751326\/FV.png?format=1500w\" alt=\"FV.png\" data-src=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b9c1e2c4835ce8d9aa54\/1518647751326\/FV.png\" data-image=\"https:\/\/static1.squarespace.com\/static\/55e70fc6e4b09c71afa9a6e7\/t\/5a84b9c1e2c4835ce8d9aa54\/1518647751326\/FV.png\" data-image-dimensions=\"1232x667\" data-image-focal-point=\"0.5,0.5\" data-load=\"false\" data-image-id=\"5a84b9c1e2c4835ce8d9aa54\" data-type=\"image\" data-position-mode=\"standard\" data-image-resolution=\"1500w\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"block-yui_3_17_2_1_1518647141357_34608\" class=\"sqs-block html-block sqs-block-html\" data-block-type=\"2\">\n<div class=\"sqs-block-content\">\n<h2><strong>Redirecting Individual Recovery Keys to macOS 10.12 and Earlier<\/strong><\/h2>\n<p>The setting to <strong>Enable Escrow Personal Recovery Key<\/strong> is only applicable for macOS 10.13 and later. In order to redirect the Individual Recovery Key to Jamf Pro for macOS 10.12 or earlier, we need to use a completely separate payload. <strong><em>It is absolutely acceptable to put both payloads in the same profile &#8211; the operating system will just ignore the profile that it doesn\u2019t need.<\/em><\/strong><\/p>\n<ol>\n<li><strong>Configure<\/strong> the <strong>FileVault Recovery Key Redirection<\/strong> payload<\/li>\n<li><strong>Change<\/strong> the <strong>Recovery Key Redirection<\/strong> dropdown to \u201c<strong>Automatically redirect recovery keys to the Jamf Pro server<\/strong>\u201d<\/li>\n<\/ol>\n<h2><strong>A Final Note on the Certificates Payload<\/strong><\/h2>\n<p>Depending on which settings we enabled for escrowing or redirecting the Individual Recovery Key, we may see additional entries in the Certificates payload. <strong><em>This is normal, and required.<\/em><\/strong><\/p>\n<ul>\n<li>If we enabled escrow in the <strong>Security &amp; Privacy<\/strong> payload, there should be a certificate titled \u201c<strong>JSS FileVault Recovery Key Escrow Certificate<\/strong>.\u201d<\/li>\n<li>If we enabled redirection with the <strong>FileVault Recovery Key Redirection<\/strong> payload, there should be a certificate titled \u201c<strong>JSS FileVault Recovery Key Redirection Certificate<\/strong>\u201d<\/li>\n<\/ul>\n<p>That\u2019s it! We\u2019re ready to <strong>scope the Configuration Profile<\/strong> out to our managed Macs and kick off the encryption process! Once the Individual Recovery Key is sent back to Jamf Pro (if configured) we can see it in an individual <strong>Computer Inventory Record<\/strong> under the <strong>Management<\/strong> tab, and then under the <strong>FileVault 2<\/strong>subheading.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article will discuss deploying FileVault 2 via a Configuration Profile to managed Macs with Jamf Pro using either an Individual Recovery [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2933","post","type-post","status-publish","format-standard","hentry","category-info-on-tech"],"_links":{"self":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/2933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2933"}],"version-history":[{"count":0,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/2933\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}