Provide your users a “heads-up display” of critical computer compliance information via swiftDialog

Background
More than six years ago, William Smith published Build a Computer Information script for your Help Desk; we implemented a customized version in the fall of that same year.
Last week, during a conversation with one of our rock-star TSRs — whom I’ll refer to as “John” — we decided it was time for swiftDialog-ized reboot.
Features
The following compliance checks and information reporting are included in version 1.2.0
, which operates in “test” mode by default. (Change operationMode
to production
when ready to deploy in production.)
Compliance Checks
- macOS Version
- Available Updates (including deferred updates)
- System Integrity Protection
- Firewall
- FileVault Encryption
- Last Reboot
- Free Disk Space
- MDM Profile
- MDM Certificate Expiration
- Apple Push Notification service
- Jamf Pro Check-in
- Jamf Pro Inventory
- BeyondTrust Privilege Management*
- Cisco Umbrella*
- CrowdStrike Falcon*
- Palo Alto GlobalProtect*
- Network Quality Test
Information Reporting
- IT Support
- Telephone
- Website
- Knowledge Base Article
- User Information
- Full Name
- User Name
- User ID
- Location Services
- Microsoft OneDrive Sync Date
- Platform Single Sign-on Extension
- Computer Information
- macOS version (build)
- Computer Name
- Serial Number
- Wi-Fi SSID
- Wi-FI IP Address
- VPN IP Address
- Jamf Pro Information**
- Site
**Payload Variables for Configuration Profiles
Policy Log Reporting
- Deferred Software Updates
- Logged-In User Group Membership
- Kerberos SSOe
- SSH
- Time Machine
- Battery Cycle Count
- Network Time Server
- Jamf Pro ID
Configuration
Complete the following steps to add the Computer Compliance check for your users.
A. Customize the Computer Compliance with swiftDialog.zsh
script for your environment
- Review and adjust the Global Variables as required for your environment
scriptLog
(i.e., the location of your client-side logs)operationMode
(i.e., Change toproduction
when ready to deploy in production)
############################################################################################ # # Global Variables # ############################################################################################ export PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin/ # Script Version scriptVersion="1.2.0" # Client-side Log scriptLog="/var/log/org.churchofjesuschrist.log" # Elapsed Time SECONDS="0" # Operation Mode [ test | production ] operationMode="test"
- Set your preferred Organization Variables
organizationColorScheme
(i.e., your organization’s corporate colors)previousMinorOS
(i.e., the number of previous minor OS versions which can pass the OS compliance check; thanks, @robjschroeder!)allowedFreeDiskPercentage
(i.e., the allowed percentage of free disk space)networkQualityTestMaximumAge
(i.e., frequently at which the time-intensive Network Quality Test should be executed)allowedUptimeMinutes
(i.e., the allowed number of minutes since the last reboot)excessiveUptimeAlertStyle
(i.e., Should excessive uptime result in a “warning” or “error” ?)
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Organization Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Script Human-readabale Name humanReadableScriptName="Computer Compliance" # Organization's Script Name organizationScriptName="CC" # Organization's Color Scheme organizationColorScheme="weight=semibold,colour1=#ef9d51,colour2=#ef7951" # Organization's Kerberos Realm (leave blank to disable check) kerberosRealm="" # "Anticipation" Duration (in seconds) anticipationDuration="2" # How many previous minor OS versions will be marked as compliant previousMinorOS="2" # Allowed percentage of free disk space allowedFreeDiskPercentage="10" # Network Quality Test Maximum Age # Leverages `date -v-`; One of either y, m, w, d, H, M or S # must be used to specify which part of the date is to be adjusted networkQualityTestMaximumAge="1H" # Allowed number of uptime minutes # - 1 day = 24 hours × 60 minutes/hour = 1,440 minutes # - 7 days, multiply: 7 × 1,440 minutes = 10,080 minutes allowedUptimeMinutes="10080" # Should excessive uptime result in a "warning" or "error" ? excessiveUptimeAlertStyle="warning"
- If you’ve deployed a Configuration Profile for Jamf Pro variables, specify the Preference Domain, shown below as
jamfProVariables
. (Note to self: Locate or write a blog post about “Jamf Pro Payload Variables for Configuration Profiles.”)
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Jamf Pro Configuration Profile Variable # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Organization's Client-side Jamf Pro Variables jamfProVariables="org.churchofjesuschrist.jamfprovariables.plist" # Property List File plistFilepath="/Library/Managed Preferences/${jamfProVariables}" if [[ -e "${plistFilepath}" ]]; then # Jamf Pro ID jamfProID=$( defaults read "${plistFilepath}" "Jamf Pro ID" 2>&1 ) # Site Name jamfProSiteName=$( defaults read "${plistFilepath}" "Site Name" 2>&1 ) fi
- Adjust the various IT Support-related variables for your environment
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # IT Support Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # supportTeamName="IT Support" supportTeamPhone="+1 (801) 555-1212" supportTeamEmail="rescue@domain.org" supportTeamWebsite="https://support.domain.org" supportTeamHyperlink="[${supportTeamWebsite}](${supportTeamWebsite})" supportKB="KB8675309" supportKBURL="[${supportKB}](https://servicenow.domain.org/support?id=kb_article_view&sysparm_article=${supportKB})"
Computer Compliance with swiftDialog.zsh
Latest version available on GitHub.
#!/bin/zsh --no-rcs # shellcheck shell=bash #################################################################################################### # # Name: Computer Compliance # # Purpose: Provides users a "heads-up display" of critical computer compliance information via swiftDialog # # Information: https://snelson.us/2025/04/computer-compliance-0-0-2/ # # Inspired by: # - @talkingmoose's [Build a Computer Information script for your Help Desk](https://www.jamf.com/jamf-nation/discussions/29208/build-a-computer-information-script-for-your-help-desk) # #################################################################################################### # # HISTORY # # Version 1.0.0, 15-Apr-2025, Dan K. Snelson (@dan-snelson) # - First "official" release # # Version 1.1.0, 17-Apr-2025, Dan K. Snelson (@dan-snelson) # - Added output of "/usr/libexec/mdmclient AvailableOSUpdates" to $scriptLog # # Version 1.2.0, 19-Apr-2025, Dan K. Snelson (@dan-snelson) # - Added `operationMode` [ test | production ] # #################################################################################################### #################################################################################################### # # Global Variables # #################################################################################################### export PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin/ # Script Version scriptVersion="1.2.0" # Client-side Log scriptLog="/var/log/org.churchofjesuschrist.log" # Elapsed Time SECONDS="0" # Operation Mode [ test | production ] operationMode="test" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Organization Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Script Human-readabale Name humanReadableScriptName="Computer Compliance" # Organization's Script Name organizationScriptName="CC" # Organization's Color Scheme organizationColorScheme="weight=semibold,colour1=#ef9d51,colour2=#ef7951" # Organization's Kerberos Realm (leave blank to disable check) kerberosRealm="" # "Anticipation" Duration (in seconds) anticipationDuration="2" # How many previous minor OS versions will be marked as compliant previousMinorOS="2" # Allowed percentage of free disk space allowedFreeDiskPercentage="10" # Network Quality Test Maximum Age # Leverages `date -v-`; One of either y, m, w, d, H, M or S # must be used to specify which part of the date is to be adjusted networkQualityTestMaximumAge="1H" # Allowed number of uptime minutes # - 1 day = 24 hours × 60 minutes/hour = 1,440 minutes # - 7 days, multiply: 7 × 1,440 minutes = 10,080 minutes allowedUptimeMinutes="10080" # Should excessive uptime result in a "warning" or "error" ? excessiveUptimeAlertStyle="warning" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Jamf Pro Configuration Profile Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Organization's Client-side Jamf Pro Variables jamfProVariables="org.churchofjesuschrist.jamfprovariables.plist" # Property List File plistFilepath="/Library/Managed Preferences/${jamfProVariables}" if [[ -e "${plistFilepath}" ]]; then # Jamf Pro ID jamfProID=$( defaults read "${plistFilepath}" "Jamf Pro ID" 2>&1 ) # Site Name jamfProSiteName=$( defaults read "${plistFilepath}" "Site Name" 2>&1 ) fi # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Operating System Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # osVersion=$( sw_vers -productVersion ) osVersionExtra=$( sw_vers -productVersionExtra ) osBuild=$( sw_vers -buildVersion ) osMajorVersion=$( echo "${osVersion}" | awk -F '.' '{print $1}' ) if [[ -n $osVersionExtra ]] && [[ "${osMajorVersion}" -ge 13 ]]; then osVersion="${osVersion} ${osVersionExtra}"; fi serialNumber=$( ioreg -rd1 -c IOPlatformExpertDevice | awk -F'"' '/IOPlatformSerialNumber/{print $4}' ) computerName=$( scutil --get ComputerName | /usr/bin/sed 's/’//' ) computerModel=$( sysctl -n hw.model ) localHostName=$( scutil --get LocalHostName ) batteryCycleCount=$( ioreg -r -c "AppleSmartBattery" | /usr/bin/grep '"CycleCount" = ' | /usr/bin/awk '{ print $3 }' | /usr/bin/sed s/\"//g ) ssid=$( ipconfig getsummary 2>/dev/null $(networksetup -listallhardwareports | awk '/Hardware Port: Wi-Fi/{getline; print $2}') | awk -F ' SSID : ' '/ SSID : / {print $2}' ) sshStatus=$( systemsetup -getremotelogin | awk -F ": " '{ print $2 }' ) networkTimeServer=$( systemsetup -getnetworktimeserver ) locationServices=$( defaults read /var/db/locationd/Library/Preferences/ByHost/com.apple.locationd LocationServicesEnabled ) locationServicesStatus=$( [ "${locationServices}" = "1" ] && echo "Enabled" || echo "Disabled" ) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Logged-in User Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # loggedInUser=$( echo "show State:/Users/ConsoleUser" | scutil | awk '/Name :/ { print $3 }' ) loggedInUserFullname=$( id -F "${loggedInUser}" ) loggedInUserFirstname=$( echo "$loggedInUserFullname" | sed -E 's/^.*, // ; s/([^ ]*).*/\1/' | sed 's/\(.\{25\}\).*/\1…/' | awk '{print ( $0 == toupper($0) ? toupper(substr($0,1,1))substr(tolower($0),2) : toupper(substr($0,1,1))substr($0,2) )}' ) loggedInUserID=$( id -u "${loggedInUser}" ) loggedInUserGroupMembership=$( id -Gn "${loggedInUser}" ) loggedInUserHomeDirectory=$( dscl . read "/Users/${loggedInUser}" NFSHomeDirectory | awk -F ' ' '{print $2}' ) # Kerberos Single Sign-on Extension if [[ -n "${kerberosRealm}" ]]; then /usr/bin/su \- "${loggedInUser}" -c "/usr/bin/app-sso -i ${kerberosRealm}" > /var/tmp/app-sso.plist ssoLoginTest=$( /usr/libexec/PlistBuddy -c "Print:login_date" /var/tmp/app-sso.plist 2>&1 ) if [[ ${ssoLoginTest} == *"Does Not Exist"* ]]; then kerberosSSOeResult="${loggedInUser} NOT logged in" else username=$( /usr/libexec/PlistBuddy -c "Print:upn" /var/tmp/app-sso.plist | awk -F@ '{print $1}' ) kerberosSSOeResult="${username}" fi /bin/rm -f /var/tmp/app-sso.plist fi # Platform Single Sign-on Extension pssoeEmail=$( dscl . read /Users/"${loggedInUser}" dsAttrTypeStandard:AltSecurityIdentities 2>/dev/null | awk -F'SSO:' '/PlatformSSO/ {print $2}' ) if [[ -n "${pssoeEmail}" ]]; then platformSSOeResult="${pssoeEmail}" else platformSSOeResult="${loggedInUser} NOT logged in" fi # Last modified time of user's Microsoft OneDrive sync file (thanks, @pbowden-msft!) if [[ -d "${loggedInUserHomeDirectory}/Library/Application Support/OneDrive/settings/Business1/" ]]; then DataFile=$( ls -t "${loggedInUserHomeDirectory}"/Library/Application\ Support/OneDrive/settings/Business1/*.ini | head -n 1 ) EpochTime=$( stat -f %m "$DataFile" ) UTCDate=$( date -u -r $EpochTime '+%d-%b-%Y' ) oneDriveSyncDate="${UTCDate}" else oneDriveSyncDate="Not Configured" fi # Time Machine Backup Date tmDestinationInfo=$( tmutil destinationinfo 2>/dev/null ) if [[ "${tmDestinationInfo}" == *"No destinations configured"* ]]; then tmStatus="Not configured" tmLastBackup="" else tmDestinations=$( tmutil destinationinfo 2>/dev/null | grep "Name" | awk -F ':' '{print $NF}' | awk '{$1=$1};1') tmStatus="${tmDestinations//$'\n'/, }" tmBackupDates=$( tmutil latestbackup 2>/dev/null | awk -F "/" '{print $NF}' | cut -d'.' -f1 ) if [[ -z $tmBackupDates ]]; then tmLastBackup="Last backup date(s) unknown; connect destination(s)" else tmLastBackup="; Date(s): ${tmBackupDates//$'\n'/, }" fi fi #################################################################################################### # # Networking Variables # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Wi-Fi IP Address # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # networkServices=$( networksetup -listallnetworkservices | grep -v asterisk ) while IFS= read aService do activePort=$( /usr/sbin/networksetup -getinfo "$aService" | /usr/bin/grep "IP address" | /usr/bin/grep -v "IPv6" ) if [ "$activePort" != "" ] && [ "$activeServices" != "" ]; then activeServices="$activeServices\n$aService $activePort" elif [ "$activePort" != "" ] && [ "$activeServices" = "" ]; then activeServices="$aService $activePort" fi done <<< "$networkServices" wiFiIpAddress=$( echo "$activeServices" | /usr/bin/sed '/^$/d' | head -n 1) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Palo Alto Networks GlobalProtect VPN IP address # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # globalProtectTest="/Applications/GlobalProtect.app" if [[ -e "${globalProtectTest}" ]] ; then interface=$( ifconfig | grep -B1 "10.25" | awk '{ print $1 }' | head -1 ) if [[ -z "$interface" ]]; then globalProtectStatus="Inactive" else globalProtectIP=$( ifconfig | grep -A2 -E "${interface}" | grep inet | awk '{ print $2 }' ) globalProtectStatus="${globalProtectIP}" fi else globalProtectStatus="GlobalProtect is NOT installed" fi #################################################################################################### # # swiftDialog Variables # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Dialog binary # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # swiftDialog Binary Path dialogBinary="/usr/local/bin/dialog" # swiftDialog JSON File dialogJSONFile=$( mktemp -u /var/tmp/dialogJSONFile_${organizationScriptName}.XXXX ) # swiftDialog Command File dialogCommandFile=$( mktemp /var/tmp/dialogCommandFile_${organizationScriptName}.XXXX ) # Set Permissions on Dialog Command Files chmod 644 "${dialogCommandFile}" # The total number of steps for the progress bar, plus three (i.e., "progress: increment") progressSteps="18" # Set initial icon based on whether the Mac is a desktop or laptop if system_profiler SPPowerDataType | grep -q "Battery Power"; then icon="SF=laptopcomputer.and.arrow.down,${organizationColorScheme}" else icon="SF=desktopcomputer.and.arrow.down,${organizationColorScheme}" fi # Create `overlayicon` from Self Service's custom icon (thanks, @meschwartz!) xxd -p -s 260 "$(defaults read /Library/Preferences/com.jamfsoftware.jamf self_service_app_path)"/Icon$'\r'/..namedfork/rsrc | xxd -r -p > /var/tmp/overlayicon.icns overlayicon="/var/tmp/overlayicon.icns" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # IT Support Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # supportTeamName="IT Support" supportTeamPhone="+1 (801) 555-1212" supportTeamEmail="rescue@domain.org" supportTeamWebsite="https://support.domain.org" supportTeamHyperlink="[${supportTeamWebsite}](${supportTeamWebsite})" supportKB="KB8675309" infobuttonaction="https://servicenow.domain.org/support?id=kb_article_view&sysparm_article=${supportKB}" supportKBURL="[${supportKB}](${infobuttonaction})" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Help Message Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # helpmessage="For assistance, please contact: **${supportTeamName}**<br>- **Telephone:** ${supportTeamPhone}<br>- **Email:** ${supportTeamEmail}<br>- **Website:** ${supportTeamWebsite}<br>- **Knowledge Base Article:** ${supportKBURL}<br><br>**User Information:**<br>- **Full Name:** ${loggedInUserFullname}<br>- **User Name:** ${loggedInUser}<br>- **User ID:** ${loggedInUserID}<br>- **Location Services:** ${locationServicesStatus}<br>- **Microsoft OneDrive Sync Date:** ${oneDriveSyncDate}<br>- **Platform SSOe:** ${platformSSOeResult}<br><br>**Computer Information:**<br>- **macOS:** ${osVersion} (${osBuild})<br>- **Computer Name:** ${computerName}<br>- **Serial Number:** ${serialNumber}<br>- **Wi-Fi:** ${ssid}<br>- ${wiFiIpAddress}<br>- **VPN IP:** ${globalProtectStatus}<br><br>**Jamf Pro Information:**<br>- **Site:** ${jamfProSiteName}" helpimage="qr=${infobuttonaction}" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Main Dialog Window # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # dialogJSON=' { "commandfile" : "'"${dialogCommandFile}"'", "ontop" : true, "moveable" : true, "windowbuttons" : "min", "quitkey" : "k", "title" : "'"${humanReadableScriptName} (${scriptVersion})"'", "icon" : "'"${icon}"'", "overlayicon" : "'"${overlayicon}"'", "message" : "none", "iconsize" : "198.0", "infobox" : "**User:** '"{userfullname}"'<br><br>**Computer Model:** '"{computermodel}"'<br><br>**Serial Number:** '"{serialnumber} "'<br><br>**macOS Version:** '"{osversion} (${osBuild})"' ", "infobuttontext" : "'"${supportKB}"'", "infobuttonaction" : "'"${infobuttonaction}"'", "button1text" : "Wait", "button1disabled" : "true", "helpmessage" : "'"${helpmessage}"'", "helpimage" : "'"${helpimage}"'", "position" : "center", "progress" : "'"${progressSteps}"'", "progresstext" : "Please wait …", "height" : "750", "width" : "900", "messagefont" : "size=14", "titlefont" : "shadow=true, size=24", "listitem" : [ {"title" : "macOS Version", "subtitle" : "Organizational standards are the current and immediately previous versions of macOS", "icon" : "SF=01.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Available Updates", "subtitle" : "Keep your Mac up-to-date to ensure its security and performance", "icon" : "SF=02.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "System Integrity Protection", "subtitle" : "System Integrity Protection (SIP) in macOS protects the entire system by preventing the execution of unauthorized code.", "icon" : "SF=03.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Firewall", "subtitle" : "The built-in macOS firewall helps protect your Mac from unauthorized access.", "icon" : "SF=04.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "FileVault Encryption", "subtitle" : "FileVault is built-in to macOS and provides full-disk encryption to help prevent unauthorized access to your Mac", "icon" : "SF=05.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Last Reboot", "subtitle" : "Restart your Mac regularly — at least once a week — can help resolve many common issues", "icon" : "SF=06.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Free Disk Space", "subtitle" : "See KB0080685 Disk Usage to help identify the 50 largest directories", "icon" : "SF=07.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "MDM Profile", "subtitle" : "The presence of the Jamf Pro MDM profile helps ensure your Mac is enrolled", "icon" : "SF=08.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "MDM Certficate Expiration", "subtitle" : "Validate the expiration date of the Jamf Pro MDM certficate", "icon" : "SF=09.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Apple Push Notification service", "subtitle" : "Validate communication between Apple, Jamf Pro and your Mac", "icon" : "SF=10.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Jamf Pro Check-In", "subtitle" : "Your Mac should check-in with the Jamf Pro MDM server multiple times each day", "icon" : "SF=11.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Jamf Pro Inventory", "subtitle" : "Your Mac should submit its inventory to the Jamf Pro MDM server daily", "icon" : "SF=12.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "BeyondTrust Privilege Management", "subtitle" : "Privilege Management for Mac pairs powerful least-privilege management and application control", "icon" : "SF=13.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Cisco Umbrella", "subtitle" : "Cisco Umbrella combines multiple security functions so you can extend data protection anywhere.", "icon" : "SF=14.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "CrowdStrike Falcon", "subtitle" : "Technology, intelligence, and expertise come together in CrowdStrike Falcon to deliver security that works.", "icon" : "SF=15.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Palo Alto GlobalProtect", "subtitle" : "Virtual Private Network (VPN) connection to Church headquarters", "icon" : "SF=16.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"}, {"title" : "Network Quality Test", "subtitle" : "Various networking-related tests of your Mac’s Internet connection", "icon" : "SF=17.circle.fill,'"${organizationColorScheme}"'", "status" : "pending", "statustext" : "Pending …"} ] } ' echo "${dialogJSON}" > "${dialogJSONFile}" #################################################################################################### # # Functions # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Client-side Logging # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function updateScriptLog() { echo "${organizationScriptName} ($scriptVersion): $( date +%Y-%m-%d\ %H:%M:%S ) - ${1}" | tee -a "${scriptLog}" } function preFlight() { updateScriptLog "[PRE-FLIGHT] ${1}" } function logComment() { updateScriptLog " ${1}" } function notice() { updateScriptLog "[NOTICE] ${1}" } function info() { updateScriptLog "[INFO] ${1}" } function errorOut(){ updateScriptLog "[ERROR] ${1}" } function error() { updateScriptLog "[ERROR] ${1}" let errorCount++ } function warning() { updateScriptLog "[WARNING] ${1}" let errorCount++ } function fatal() { updateScriptLog "[FATAL ERROR] ${1}" exit 1 } function quitOut(){ updateScriptLog "[QUIT] ${1}" } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Update the running dialog # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function dialogUpdate(){ sleep 0.3 echo "$1" >> "$dialogCommandFile" } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Run command as logged-in user (thanks, @scriptingosx!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function runAsUser() { info "Run \"$@\" as \"$loggedInUserID\" … " launchctl asuser "$loggedInUserID" sudo -u "$loggedInUser" "$@" } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Parse JSON via osascript and JavaScript # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function get_json_value() { JSON="$1" osascript -l 'JavaScript' \ -e 'const env = $.NSProcessInfo.processInfo.environment.objectForKey("JSON").js' \ -e "JSON.parse(env).$2" } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Quit Script (thanks, @bartreadon!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function quitScript() { quitOut "Exiting …" notice "User: ${loggedInUserFullname} (${loggedInUser}) [${loggedInUserID}] ${loggedInUserGroupMembership}; Kerberos SSOe: ${kerberosSSOeResult}; Platform SSOe: ${platformSSOeResult}; Location Services: ${locationServicesStatus}; SSH: ${sshStatus}; Microsoft OneDrive Sync Date: ${oneDriveSyncDate}; Time Machine Backup Date: ${tmStatus} ${tmLastBackup}; Battery Cycle Count: ${batteryCycleCount}; Wi-Fi: ${ssid}; ${wiFiIpAddress}; VPN IP: ${globalProtectStatus}; ${networkTimeServer}; Jamf Pro ID: ${jamfProID}; Site: ${jamfProSiteName}" if [[ -n "${overallCompliance}" ]]; then dialogUpdate "icon: SF=xmark.circle.fill,weight=bold,colour1=#BB1717,colour2=#F31F1F" dialogUpdate "title: Computer Non-compliant (as of $( date '+%Y-%m-%d-%H%M%S' ))" errorOut "${overallCompliance}" exitCode="1" else dialogUpdate "icon: SF=checkmark.circle.fill,weight=bold,colour1=#00ff44,colour2=#075c1e" dialogUpdate "title: Computer Compliant (as of $( date '+%Y-%m-%d-%H%M%S' ))" fi dialogUpdate "progress: increment 100" dialogUpdate "progresstext: Elapsed Time: $(printf '%dh:%dm:%ds\n' $((SECONDS/3600)) $((SECONDS%3600/60)) $((SECONDS%60)))" dialogUpdate "button1text: Close" dialogUpdate "button1: enable" # Remove the dialog command file rm -rf "${dialogCommandFile}" # Remove the dialog JSON file rm -rf "${dialogJSONFile}" # Remove overlay icon rm -rf "${overlayicon}" # Remove default dialog.log rm -rf /var/tmp/dialog.log notice "Elapsed Time: $(printf '%dh:%dm:%ds\n' $((SECONDS/3600)) $((SECONDS%3600/60)) $((SECONDS%60)))" quitOut "Goodbye!" exit "${exitCode}" } #################################################################################################### # # Pre-flight Checks # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Client-side Logging # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # if [[ ! -f "${scriptLog}" ]]; then touch "${scriptLog}" if [[ -f "${scriptLog}" ]]; then preFlight "Created specified scriptLog: ${scriptLog}" else fatal "Unable to create specified scriptLog '${scriptLog}'; exiting.\n\n(Is this script running as 'root' ?)" fi else # preFlight "Specified scriptLog '${scriptLog}' exists; writing log entries to it" fi # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Logging Preamble # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # preFlight "\n\n###\n# $humanReadableScriptName (${scriptVersion})\n# https://snelson.us/2025/04/computer-compliance-0-0-2/\n###\n" preFlight "Initiating …" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Computer Information # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # preFlight "${computerName} (S/N ${serialNumber})" preFlight "${loggedInUserFullname} (${loggedInUser}) [${loggedInUserID}]" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Confirm script is running as root # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # if [[ $(id -u) -ne 0 ]]; then fatal "This script must be run as root; exiting." fi # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Confirm jamf.log exists # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # if [[ ! -f "/private/var/log/jamf.log" ]]; then fatal "jamf.log missing; exiting." fi # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Validate / install swiftDialog (Thanks big bunches, @acodega!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function dialogInstall() { # Get the URL of the latest PKG From the Dialog GitHub repo dialogURL=$(curl -L --silent --fail "https://api.github.com/repos/swiftDialog/swiftDialog/releases/latest" | awk -F '"' "/browser_download_url/ && /pkg\"/ { print \$4; exit }") # Expected Team ID of the downloaded PKG expectedDialogTeamID="PWA5E9TQ59" preFlight "Installing swiftDialog..." # Create temporary working directory workDirectory=$( /usr/bin/basename "$0" ) tempDirectory=$( /usr/bin/mktemp -d "/private/tmp/$workDirectory.XXXXXX" ) # Download the installer package /usr/bin/curl --location --silent "$dialogURL" -o "$tempDirectory/Dialog.pkg" # Verify the download teamID=$(spctl -a -vv -t install "$tempDirectory/Dialog.pkg" 2>&1 | awk '/origin=/ {print $NF }' | tr -d '()') # Install the package if Team ID validates if [[ "$expectedDialogTeamID" == "$teamID" ]]; then installer -pkg "$tempDirectory/Dialog.pkg" -target / sleep 2 dialogVersion=$( /usr/local/bin/dialog --version ) preFlight "swiftDialog version ${dialogVersion} installed; proceeding..." else # Display a so-called "simple" dialog if Team ID fails to validate osascript -e 'display dialog "Please advise your Support Representative of the following error:\r\r• Dialog Team ID verification failed\r\r" with title "Error" buttons {"Close"} with icon caution' completionActionOption="Quit" exitCode="1" quitScript fi # Remove the temporary working directory when done /bin/rm -Rf "$tempDirectory" } function dialogCheck() { # Check for Dialog and install if not found if [ ! -e "/Library/Application Support/Dialog/Dialog.app" ]; then preFlight "swiftDialog not found. Installing..." dialogInstall else dialogVersion=$(/usr/local/bin/dialog --version) if [[ "${dialogVersion}" < "${swiftDialogMinimumRequiredVersion}" ]]; then preFlight "swiftDialog version ${dialogVersion} found but swiftDialog ${swiftDialogMinimumRequiredVersion} or newer is required; updating..." dialogInstall else preFlight "swiftDialog version ${dialogVersion} found; proceeding..." fi fi } dialogCheck # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Pre-flight Check: Complete # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # preFlight "Complete" #################################################################################################### # # Compliance Check Functions # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Compliant OS Version (thanks, @robjschroeder!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkOS() { notice "Checking macOS version compatibility..." dialogUpdate "icon: SF=pencil.and.list.clipboard,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Comparing installed OS version with compliant version …" sleep "${anticipationDuration}" if [[ "${osBuild}" =~ [a-zA-Z]$ ]]; then logComment "OS Build, ${osBuild}, ends with a letter; skipping" osResult="Non-Compliant Beta OS" dialogUpdate "listitem: index: ${1}, status: error, statustext: ${osResult}" warning "${osResult}" else # logComment "OS Build, ${osBuild}, ends with a number; proceeding …" # N-rule variable [How many previous minor OS path versions will be marked as compliant] n="${previousMinorOS}" # URL to the online JSON data online_json_url="https://sofafeed.macadmins.io/v1/macos_data_feed.json" user_agent="SOFA-Jamf-EA-macOSVersionCheck/1.0" # local store json_cache_dir="/private/tmp/sofa" json_cache="$json_cache_dir/macos_data_feed.json" etag_cache="$json_cache_dir/macos_data_feed_etag.txt" # ensure local cache folder exists /bin/mkdir -p "$json_cache_dir" # check local vs online using etag if [[ -f "$etag_cache" && -f "$json_cache" ]]; then # logComment "e-tag stored, will download only if e-tag doesn’t match" etag_old=$(/bin/cat "$etag_cache") /usr/bin/curl --compressed --silent --etag-compare "$etag_cache" --etag-save "$etag_cache" --header "User-Agent: $user_agent" "$online_json_url" --output "$json_cache" etag_new=$(/bin/cat "$etag_cache") if [[ "$etag_old" == "$etag_new" ]]; then # logComment "Cached ETag matched online ETag - cached json file is up to date" else # logComment "Cached ETag did not match online ETag, so downloaded new SOFA json file" fi else # logComment "No e-tag cached, proceeding to download SOFA json file" /usr/bin/curl --compressed --location --max-time 3 --silent --header "User-Agent: $user_agent" "$online_json_url" --etag-save "$etag_cache" --output "$json_cache" fi # 1. Get model (DeviceID) model=$(sysctl -n hw.model) # logComment "Model Identifier: $model" # check that the model is virtual or is in the feed at all if [[ $model == "VirtualMac"* ]]; then model="Macmini9,1" elif ! grep -q "$model" "$json_cache"; then warning "Unsupported Hardware" # return 1 fi # 2. Get current system OS system_version=$( /usr/bin/sw_vers -productVersion ) system_os=$(cut -d. -f1 <<< "$system_version") # system_version="15.3" # logComment "System Version: $system_version" if [[ $system_version == *".0" ]]; then system_version=${system_version%.0} logComment "Corrected System Version: $system_version" fi # exit if less than macOS 12 if [[ "$system_os" -lt 12 ]]; then osResult="Unsupported macOS" result "$osResult" dialogUpdate "listitem: index: 1, status: fail, statustext: $osResult" # return 1 fi # 3. Identify latest compatible major OS latest_compatible_os=$(/usr/bin/plutil -extract "Models.$model.SupportedOS.0" raw -expect string "$json_cache" | /usr/bin/head -n 1) # logComment "Latest Compatible macOS: $latest_compatible_os" # 4. Get OSVersions.Latest.ProductVersion latest_version_match=false security_update_within_30_days=false n_rule=false for i in {0..3}; do os_version=$(/usr/bin/plutil -extract "OSVersions.$i.OSVersion" raw "$json_cache" | /usr/bin/head -n 1) if [[ -z "$os_version" ]]; then break fi latest_product_version=$(/usr/bin/plutil -extract "OSVersions.$i.Latest.ProductVersion" raw "$json_cache" | /usr/bin/head -n 1) if [[ "$latest_product_version" == "$system_version" ]]; then latest_version_match=true break fi num_security_releases=$(/usr/bin/plutil -extract "OSVersions.$i.SecurityReleases" raw "$json_cache" | xargs | awk '{ print $1}' ) if [[ -n "$num_security_releases" ]]; then for ((j=0; j<num_security_releases; j++)); do security_release_product_version=$(/usr/bin/plutil -extract "OSVersions.$i.SecurityReleases.$j.ProductVersion" raw "$json_cache" | /usr/bin/head -n 1) if [[ "${system_version}" == "${security_release_product_version}" ]]; then security_release_date=$(/usr/bin/plutil -extract "OSVersions.$i.SecurityReleases.$j.ReleaseDate" raw "$json_cache" | /usr/bin/head -n 1) security_release_date_epoch=$(date -jf "%Y-%m-%dT%H:%M:%SZ" "$security_release_date" +%s) days_ago_30=$(date -v-30d +%s) if [[ $security_release_date_epoch -ge $days_ago_30 ]]; then security_update_within_30_days=true fi if (( $j <= "$n" )); then n_rule=true fi fi done fi done if [[ "$latest_version_match" == true ]] || [[ "$security_update_within_30_days" == true ]] || [[ "$n_rule" == true ]]; then osResult="Passed" dialogUpdate "listitem: index: ${1}, status: success, statustext: $osResult" info "$osResult: macOS ${osVersion} (${osBuild})" else osResult="Failed" dialogUpdate "listitem: index: ${1}, status: fail, statustext: $osResult" errorOut "$osResult: macOS ${osVersion} (${osBuild})" overallCompliance+="Failed: ${1}; " fi fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Available Software Updates # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkAvailableSoftwareUpdates() { notice "Check Available Software Updates …" dialogUpdate "icon: SF=arrow.trianglehead.2.clockwise,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining Available Software Updates status …" sleep "${anticipationDuration}" mdmClientAvailableOSUpdates=$( /usr/libexec/mdmclient AvailableOSUpdates | head -n 5 ) if [[ "${mdmClientAvailableOSUpdates}" == *"OS Update Item"* ]]; then notice "MDM Client Available OS Updates" info "${mdmClientAvailableOSUpdates}" fi recommendedUpdates=$( /usr/libexec/PlistBuddy -c "Print :RecommendedUpdates:0" /Library/Preferences/com.apple.SoftwareUpdate.plist 2>/dev/null ) if [[ -n "${recommendedUpdates}" ]]; then SUListRaw=$( softwareupdate --list --include-config-data 2>&1 ) case "${SUListRaw}" in *"Can’t connect"* ) availableSoftwareUpdates="Can’t connect to the Software Update server" dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${availableSoftwareUpdates}" errorOut "Available Software Updates: ${availableSoftwareUpdates}" overallCompliance+="Failed: ${1}; " ;; *"The operation couldn’t be completed."* ) availableSoftwareUpdates="The operation couldn’t be completed." dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${availableSoftwareUpdates}" errorOut "Available Software Updates: ${availableSoftwareUpdates}" overallCompliance+="Failed: ${1}; " ;; *"Deferred: YES"* ) availableSoftwareUpdates="Deferred software available." dialogUpdate "listitem: index: ${1}, status: error, statustext: ${availableSoftwareUpdates}" warning "Available Software Updates: ${availableSoftwareUpdates}" ;; *"No new software available."* ) availableSoftwareUpdates="No new software available." dialogUpdate "listitem: index: ${1}, status: success, statustext: ${availableSoftwareUpdates}" info "Available Software Updates: ${availableSoftwareUpdates}" ;; * ) SUList=$( echo "${SUListRaw}" | grep "*" | sed "s/\* Label: //g" | sed "s/,*$//g" ) availableSoftwareUpdates="${SUList}" dialogUpdate "listitem: index: ${1}, status: error, statustext: ${availableSoftwareUpdates}" warning "Available Software Updates: ${availableSoftwareUpdates}" ;; esac else availableSoftwareUpdates="None" dialogUpdate "listitem: index: ${1}, status: success, statustext: ${availableSoftwareUpdates}" info "Available Software Updates: ${availableSoftwareUpdates}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check System Integrity Protection # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkSIP() { notice "Check System Integrity Protection …" dialogUpdate "icon: SF=checkmark.shield.fill,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining System Integrity Protection status …" sleep "${anticipationDuration}" sipCheck=$( csrutil status ) case ${sipCheck} in *"enabled"* ) dialogUpdate "listitem: index: ${1}, status: success, statustext: Enabled" info "System Integrity Protection: Enabled" ;; * ) dialogUpdate "listitem: index: ${1}, status: fail, statustext: Failed" errorOut "System Integrity Protection: Failed" overallCompliance+="Failed: ${1}; " ;; esac } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Firewall # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkFirewall() { notice "Check Firewall …" dialogUpdate "icon: SF=firewall.fill,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining Firewall status …" sleep "${anticipationDuration}" firewallCheck=$( /usr/libexec/ApplicationFirewall/socketfilterfw --getglobalstate) case ${firewallCheck} in *"enabled"* ) dialogUpdate "listitem: index: ${1}, status: success, statustext: Enabled" info "Firewall: Enabled" ;; * ) dialogUpdate "listitem: index: ${1}, status: fail, statustext: Failed" errorOut "Firewall: Failed" overallCompliance+="Failed: ${1}; " ;; esac } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Uptime # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkUptime() { notice "Check Uptime …" dialogUpdate "icon: SF=stopwatch,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Calculating time since last reboot …" sleep "${anticipationDuration}" timestamp="$( date '+%Y-%m-%d-%H%M%S' )" lastBootTime=$( sysctl kern.boottime | awk -F'[ |,]' '{print $5}' ) currentTime=$( date +"%s" ) upTimeRaw=$((currentTime-lastBootTime)) upTimeMin=$((upTimeRaw/60)) upTimeHours=$((upTimeMin/60)) uptimeDays=$( uptime | awk '{ print $4 }' | sed 's/,//g' ) uptimeNumber=$( uptime | awk '{ print $3 }' | sed 's/,//g' ) if [[ "${uptimeDays}" = "day"* ]]; then if [[ "${uptimeNumber}" -gt 1 ]]; then uptimeHumanReadable="${uptimeNumber} days" else uptimeHumanReadable="${uptimeNumber} day" fi elif [[ "${uptimeDays}" == "mins"* ]]; then uptimeHumanReadable="${uptimeNumber} mins" else uptimeHumanReadable="${uptimeNumber} (HH:MM)" fi if [[ "${upTimeMin}" -gt "${allowedUptimeMinutes}" ]]; then case ${excessiveUptimeAlertStyle} in "warning" ) dialogUpdate "listitem: index: ${1}, status: error, statustext: ${uptimeHumanReadable}" warning "Uptime: ${uptimeHumanReadable}" ;; "error" | * ) dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${uptimeHumanReadable}" errorOut "Uptime: ${uptimeHumanReadable}" overallCompliance+="Failed: ${1}; " ;; esac else dialogUpdate "listitem: index: ${1}, status: success, statustext: ${uptimeHumanReadable}" info "Uptime: ${uptimeHumanReadable}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Free Disk Space # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkFreeDiskSpace() { notice "Checking Free Disk Space …" dialogUpdate "icon: SF=externaldrive.fill.badge.checkmark,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining free disk space …" sleep "${anticipationDuration}" freeSpace=$( diskutil info / | grep -E 'Free Space|Available Space|Container Free Space' | awk -F ":\s*" '{ print $2 }' | awk -F "(" '{ print $1 }' | xargs ) freeBytes=$( diskutil info / | grep -E 'Free Space|Available Space|Container Free Space' | awk -F "(\\\(| Bytes\\\))" '{ print $2 }' ) diskBytes=$( diskutil info / | grep -E 'Total Space' | awk -F "(\\\(| Bytes\\\))" '{ print $2 }' ) freePercentage=$( echo "scale=2; ( $freeBytes * 100 ) / $diskBytes" | bc ) diskSpace="$freeSpace free (${freePercentage}% available)" diskMessage="Disk Space: ${diskSpace}" if [[ "${freePercentage}" < "${allowedFreeDiskPercentage}" ]]; then dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${diskSpace}" errorOut "Disk Space: ${diskSpace}" overallCompliance+="Failed: ${1}; " else dialogUpdate "listitem: index: ${1}, status: success, statustext: ${diskSpace}" info "Disk Space: ${diskSpace}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check the status of the Jamf Pro MDM Profile # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkJamfProMdmProfile() { notice "Check the status of the Jamf Pro MDM Profile …" dialogUpdate "icon: SF=gear.badge,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining MDM Profile status …" sleep "${anticipationDuration}" mdmProfileTest=$( profiles list -all | grep "00000000-0000-0000-A000-4A414D460003" ) if [[ -n "${mdmProfileTest}" ]]; then dialogUpdate "listitem: index: ${1}, status: success, statustext: Installed" info "Jamf Pro MDM Profile: Installed" else dialogUpdate "listitem: index: ${1}, status: fail, statustext: NOT Installed" errorOut "Jamf Pro MDM Profile: NOT Installed" overallCompliance+="Failed: ${1}; " fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Apple Push Notification service (thanks, @isaacatmann!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkAPNs() { notice "Check Apple Push Notification service …" dialogUpdate "icon: SF=wave.3.up.circle.fill,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining Apple Push Notification service status …" sleep "${anticipationDuration}" apnsCheck=$( command log show --last 24h --predicate 'subsystem == "com.apple.ManagedClient" && (eventMessage CONTAINS[c] "Received HTTP response (200) [Acknowledged" || eventMessage CONTAINS[c] "Received HTTP response (200) [NotNow")' | tail -1 | cut -d '.' -f 1 ) if [[ "${apnsCheck}" == *"Timestamp"* ]] || [[ -z "${apnsCheck}" ]]; then dialogUpdate "listitem: index: ${1}, status: fail, statustext: Failed" errorOut "Apple Push Notification service: ${apnsCheck}" overallCompliance+="Failed: ${1}; " else apnsStatusEpoch=$( date -j -f "%Y-%m-%d %H:%M:%S" "${apnsCheck}" +"%s" ) apnsStatus=$( date -r "${apnsStatusEpoch}" "+%A %-l:%M %p" ) dialogUpdate "listitem: index: ${1}, status: success, statustext: ${apnsStatus}" info "Apple Push Notification service: ${apnsCheck}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check the expiration date of the JSS Built-in Certificate Authority (thanks, @isaacatmann!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkJssCertificateExpiration() { notice "Check the expiration date of the JSS Built-in Certificate Authority …" dialogUpdate "icon: SF=mail.and.text.magnifyingglass,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining MDM Certificate expiration date …" sleep "${anticipationDuration}" identities=( $( security find-identity -v /Library/Keychains/System.keychain | awk '{print $3}' | tr -d '"' | head -n 1 ) ) now_seconds=$( date +%s ) if [[ "${identities}" != "identities" ]]; then for i in $identities; do if [[ $(security find-certificate -c "$i" | grep issu | tr -d '"') == *"JSS BUILT-IN CERTIFICATE AUTHORITY"* ]] || [[ $(security find-certificate -c "$i" | grep issu | tr -d '"') == *"JSS Built-in Certificate Authority"* ]]; then expiry=$(security find-certificate -c "$i" -p | openssl x509 -noout -enddate | cut -f2 -d"=") expirationDateFormatted=$( date -j -f "%b %d %H:%M:%S %Y GMT" "${expiry}" "+%d-%b-%Y" ) date_seconds=$(date -j -f "%b %d %T %Y %Z" "$expiry" +%s) if (( date_seconds > now_seconds )); then dialogUpdate "listitem: index: ${1}, status: success, statustext: ${expirationDateFormatted}" info "JSS Built-in Certificate Authority Expiration: ${expirationDateFormatted}" else dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${expirationDateFormatted}" errorOut "JSS Built-in Certificate Authority Expiration: ${expirationDateFormatted}" overallCompliance+="Failed: ${1}; " fi fi done else expirationDateFormatted="NOT Installed" dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${expirationDateFormatted}" errorOut "JSS Built-in Certificate Authority Expiration: ${expirationDateFormatted}" overallCompliance+="Failed: ${1}; " fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Last Jamf Pro Check-In (thanks, @jordywitteman!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkJamfProCheckIn() { notice "Checking last Jamf Pro check-in …" dialogUpdate "icon: SF=dot.radiowaves.left.and.right,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining last Jamf Pro check-in …" sleep "${anticipationDuration}" # Enable 24 hour clock format (12 hour clock enabled by default) twenty_four_hour_format="false" # Number of seconds since action last occurred (86400 = 1 day) check_in_time_old=86400 # 1 day check_in_time_aging=28800 # 8 hours last_check_in_time=$(grep "Checking for policies triggered by \"recurring check-in\"" "/private/var/log/jamf.log" | tail -n 1 | awk '{ print $2,$3,$4 }') # Convert last Jamf Pro check-in time to epoch last_check_in_time_epoch=$(date -j -f "%b %d %T" "${last_check_in_time}" +"%s") time_since_check_in_epoch=$(($currentTimeEpoch-$last_check_in_time_epoch)) # Convert last Jamf Pro epoch to something easier to read if [[ "${twenty_four_hour_format}" == "true" ]]; then # Outputs 24 hour clock format last_check_in_time_human_reable=$(date -r "${last_check_in_time_epoch}" "+%A %H:%M") else # Outputs 12 hour clock format last_check_in_time_human_reable=$(date -r "${last_check_in_time_epoch}" "+%A %-l:%M %p") fi # Set status indicator for last check-in if [ ${time_since_check_in_epoch} -ge ${check_in_time_old} ]; then # check_in_status_indicator="🔴" dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${last_check_in_time_human_reable}" errorOut "Last Jamf Pro Check-in: ${last_check_in_time_human_reable}" overallCompliance+="Failed: ${1}; " elif [ ${time_since_check_in_epoch} -ge ${check_in_time_aging} ]; then # check_in_status_indicator="🟠" dialogUpdate "listitem: index: ${1}, status: error, statustext: ${last_check_in_time_human_reable}" warning "Last Jamf Pro Check-in: ${last_check_in_time_human_reable}" overallCompliance+="Error ${1}" elif [ ${time_since_check_in_epoch} -lt ${check_in_time_aging} ]; then # check_in_status_indicator="🟢" dialogUpdate "listitem: index: ${1}, status: success, statustext: ${last_check_in_time_human_reable}" info "Last Jamf Pro Check-in: ${last_check_in_time_human_reable}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Last Jamf Pro Inventory Update (thanks, @jordywitteman!) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkJamfProInventory() { notice "Checking last Jamf Pro inventory update …" dialogUpdate "icon: SF=checklist,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining last Jamf Pro inventory update …" sleep "${anticipationDuration}" # Enable 24 hour clock format (12 hour clock enabled by default) twenty_four_hour_format="false" # Number of seconds since action last occurred (86400 = 1 day) inventory_time_old=604800 # 1 week inventory_time_aging=259200 # 3 days # Get last Jamf Pro inventory time from jamf.log last_inventory_time=$(grep "Removing existing launchd task /Library/LaunchDaemons/com.jamfsoftware.task.bgrecon.plist..." "/private/var/log/jamf.log" | tail -n 1 | awk '{ print $2,$3,$4 }') # Convert last Jamf Pro inventory time to epoch last_inventory_time_epoch=$(date -j -f "%b %d %T" "${last_inventory_time}" +"%s") time_since_inventory_epoch=$(($currentTimeEpoch-$last_inventory_time_epoch)) # Convert last Jamf Pro epoch to something easier to read if [[ "${twenty_four_hour_format}" == "true" ]]; then # Outputs 24 hour clock format last_inventory_time_human_reable=$(date -r "${last_inventory_time_epoch}" "+%A %H:%M") else # Outputs 12 hour clock format last_inventory_time_human_reable=$(date -r "${last_inventory_time_epoch}" "+%A %-l:%M %p") fi #set status indicator for last inventory if [ ${time_since_inventory_epoch} -ge ${inventory_time_old} ]; then # inventory_status_indicator="🔴" dialogUpdate "listitem: index: ${1}, status: fail, statustext: ${last_inventory_time_human_reable}" errorOut "Last Jamf Pro Inventory Update: ${last_inventory_time_human_reable}" overallCompliance+="Failed: ${1}; " elif [ ${time_since_inventory_epoch} -ge ${inventory_time_aging} ]; then # inventory_status_indicator="🟠" dialogUpdate "listitem: index: ${1}, status: error, statustext: ${last_inventory_time_human_reable}" warning "Last Jamf Pro Inventory Update: ${last_inventory_time_human_reable}" overallCompliance+="Error ${1}" elif [ ${time_since_inventory_epoch} -lt ${inventory_time_aging} ]; then # inventory_status_indicator="🟢" dialogUpdate "listitem: index: ${1}, status: success, statustext: ${last_inventory_time_human_reable}" info "Last Jamf Pro Inventory Update: ${last_inventory_time_human_reable}" fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check FileVault # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkFileVault() { notice "Checking FileVault status …" dialogUpdate "icon: SF=lock.laptopcomputer,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining FileVault disk encryption status …" sleep "${anticipationDuration}" fileVaultCheck=$( fdesetup isactive ) if [[ -f /Library/Preferences/com.apple.fdesetup.plist ]] || [[ "$fileVaultCheck" == "true" ]]; then fileVaultStatus=$( fdesetup status -extended -verbose 2>&1 ) case ${fileVaultStatus} in *"FileVault is On."* ) dialogUpdate "listitem: index: ${1}, status: success, statustext: Enabled" info "FileVault: Enabled" ;; *"Deferred enablement appears to be active for user"* ) dialogUpdate "listitem: index: ${1}, status: success, statustext: Enabled (next login)" warning "FileVault: Enabled (next login)" ;; * ) dialogUpdate "listitem: index: ${1}, status: error, statustext: Failed" errorOut "FileVault: Failed" overallCompliance+="Failed: ${1}; " ;; esac else dialogUpdate "listitem: index: ${1}, status: error, statustext: Failed" errorOut "FileVault: Failed" overallCompliance+="Failed: ${1}; " fi } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Setup Your Mac Validation (where Parameter 2 represents the Jamf Pro Policy Custom Trigger) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkSetupYourMacValidation() { trigger="${2}" appPath="${3}" notice "Setup Your Mac Validation: ${appPath} …" dialogUpdate "icon: ${appPath}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining status of ${appPath} …" # sleep "${anticipationDuration}" symValidation=$( /usr/local/bin/jamf policy -event $trigger | grep "Script result:" ) case ${symValidation} in *"Failed"* ) dialogUpdate "listitem: index: ${1}, status: fail, statustext: Failed" errorOut "${appPath} Failed" overallCompliance+="Failed: ${1}; " ;; *"Running"* ) dialogUpdate "listitem: index: ${1}, status: success, statustext: Running" info "${appPath} Running" ;; *"Error"* | * ) dialogUpdate "listitem: index: ${1}, status: error, statustext: Error" errorOut "${appPath} Error" overallCompliance+="Error: ${1}; " ;; esac } # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Check Network Quality # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # function checkNetworkQuality() { notice "Checking Network Quality …" dialogUpdate "icon: SF=gauge.with.dots.needle.67percent,${organizationColorScheme}" dialogUpdate "listitem: index: ${1}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: Determining Network Quality …" # sleep "${anticipationDuration}" networkQualityTestFile="/var/tmp/networkQualityTest" if [[ -e "${networkQualityTestFile}" ]]; then networkQualityTestFileCreationEpoch=$( stat -f "%m" "${networkQualityTestFile}" ) networkQualityTestMaximumEpoch=$( date -v-"${networkQualityTestMaximumAge}" +%s ) if [[ "${networkQualityTestFileCreationEpoch}" -gt "${networkQualityTestMaximumEpoch}" ]]; then info "Using cached Network Quality Test" testStatus="(cached)" else unset testStatus info "Removing cached result …" rm "${networkQualityTestFile}" info "Starting Network Quality Test …" networkQuality -s -v -c > "${networkQualityTestFile}" info "Completed Network Quality Test" fi else info "Starting Network Quality Test …" networkQuality -s -v -c > "${networkQualityTestFile}" info "Completed Network Quality Test" fi networkQualityTest=$( < "${networkQualityTestFile}" ) case "${osVersion}" in 11* ) dlThroughput="N/A; macOS ${osVersion}" dlResponsiveness="N/A; macOS ${osVersion}" ;; 12* | 13* | 14* | 15* ) dlThroughput=$( get_json_value "$networkQualityTest" "dl_throughput") dlResponsiveness=$( get_json_value "$networkQualityTest" "dl_responsiveness" ) ;; esac mbps=$( echo "scale=2; ( $dlThroughput / 1000000 )" | bc ) dialogUpdate "listitem: index: ${1}, status: success, statustext: ${mbps} Mbps ${testStatus}" info "Download: ${mbps} Mbps, Responsiveness: ${dlResponsiveness}; " dialogUpdate "icon: ${icon}" } #################################################################################################### # # Program # #################################################################################################### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Create Dialog # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ${dialogBinary} --jsonfile ${dialogJSONFile} --json & dialogUpdate "progresstext: Initializing …" # Band-Aid for macOS 15 `withAnimation` SwiftUI bug dialogUpdate "list: hide" dialogUpdate "list: show" # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Compliance Checks (where "n" represents the listitem order) # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # if [[ "${operationMode}" == "production" ]]; then # Production Mode checkOS "0" checkAvailableSoftwareUpdates "1" checkSIP "2" checkFirewall "3" checkFileVault "4" checkUptime "5" checkFreeDiskSpace "6" checkJamfProMdmProfile "7" checkJssCertificateExpiration "8" checkAPNs "9" checkJamfProCheckIn "10" checkJamfProInventory "11" checkSetupYourMacValidation "12" "symvBeyondTrustPMfM" "/Applications/PrivilegeManagement.app" checkSetupYourMacValidation "13" "symvCiscoUmbrella" "/Applications/Cisco/Cisco Secure Client.app" checkSetupYourMacValidation "14" "symvCrowdStrikeFalcon" "/Applications/Falcon.app" checkSetupYourMacValidation "15" "symvGlobalProtect" "/Applications/GlobalProtect.app" checkNetworkQuality "16" dialogUpdate "icon: ${icon}" dialogUpdate "progresstext: Final Analysis …" sleep "${anticipationDuration}" else # Non-production Mode dialogUpdate "title: ${humanReadableScriptName} (${scriptVersion}) [Operation Mode: ${operationMode}]" listitemLength=$(get_json_value "${dialogJSON}" "listitem.length") for (( i=0; i<listitemLength; i++ )); do dialogUpdate "listitem: index: ${i}, status: wait, statustext: Checking …" dialogUpdate "progress: increment" dialogUpdate "progresstext: [Operation Mode: ${operationMode}] • Item No. ${i} …" # sleep "${anticipationDuration}" dialogUpdate "listitem: index: ${i}, status: success, statustext: Enabled" done dialogUpdate "icon: ${icon}" dialogUpdate "progresstext: Final Analysis …" sleep "${anticipationDuration}" fi # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Quit Script # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # quitScript
B. Add the Computer Compliance with swiftDialog.zsh
script to your Jamf Pro server
- Add your customized
Computer Compliance with swiftDialog.zsh
script to your Jamf Pro server - Click Save

C. Create a Jamf Pro Policy to execute Computer Compliance with swiftDialog.zsh
- Create a new Jamf Pro Policy, using the following as a guide for Options > General:
- Set Display Name to
Computer Compliance (1.2.0)
- Set Execution Frequency to
Ongoing
- Set Display Name to

- Select the Scripts payload and add your customzied
Computer Compliance with swiftDialog.zsh
script

- Scope the policy to your liking; we target Setup Your Mac: Complete
- Use the following for Self Service
- Self Service Display Name:
Computer Compliance (1.2.0)
- Button Name Before Initiation:
Validate
- Button Name After Initiation:
Validate
- Description:
- Self Service Display Name:
Validates basic compliance information about your Mac which may aid support personnel. --- ## Compliance Checks 1. macOS Version 1. Available Updates 1. System Integrity Protection 1. Firewall 1. FileVault Encryption 1. Last Reboot 1. Free Disk Space 1. MDM Profile 1. MDM Certificate Expiration 1. Apple Push Notification service 1. Jamf Pro Check-in 1. Jamf Pro Inventory 1. BeyondTrust Privilege Management 1. Cisco Umbrella 1. CrowdStrike Falcon 1. Palo Alto GlobalProtect 1. Network Quality Test --- ## Information Reporting ### IT Support - Telephone - Email - Website - Knowledge Base Article ### User Information - Full Name - User Name - User ID - Location Services - Microsoft OneDrive Sync Date - Platform Single Sign-on Extension ### Computer Information - macOS version (and build) - Computer Name - Serial Number - Wi-Fi SSID - Wi-FI IP Address - VPN IP Address ### Jamf Pro Information - Site

- Click Save
D. Testing
To more easily simulate a compliance failure, we adjusted the following while testing:
allowedUptimeMinutes
allowedFreeDiskPercentage
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Organization Variables # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # Script Human-readabale Name humanReadableScriptName="Computer Compliance" # Organization's Script Name organizationScriptName="CC" # Organization's Color Scheme organizationColorScheme="weight=semibold,colour1=#ef9d51,colour2=#ef7951" # Organization's Kerberos Realm (leave blank to disable check) kerberosRealm="" # "Anticipation" Duration (in seconds) anticipationDuration="2" # How many previous minor OS versions will be marked as compliant previousMinorOS="2" # Allowed percentage of free disk space allowedFreeDiskPercentage="10" # Network Quality Test Maximum Age # Leverages `date -v-`; One of either y, m, w, d, H, M or S # must be used to specify which part of the date is to be adjusted networkQualityTestMaximumAge="1H" # Allowed number of uptime minutes # - 1 day = 24 hours × 60 minutes/hour = 1,440 minutes # - 7 days, multiply: 7 × 1,440 minutes = 10,080 minutes allowedUptimeMinutes="10080" # Should excessive uptime result in a "warning" or "error" ? excessiveUptimeAlertStyle="warning"

P.S. Just remember to change back the adjusted variables.
P.S.S. For a real treat, purposely remove the MDM Profile from a test Mac.