Obsidian Ridge

Category

Device Management

MDM, Intune, JAMF, Addigy, Workspace ONE, and Kandji guidance for secure device fleets.

Many security programs are quietly undermined by weak device management. A team may buy endpoint protection, identity controls, or awareness training, but if laptops are not enrolled, encrypted, patched, and configured consistently, the rest of the stack is working uphill. This category focuses on that operational layer.

Filter and sort

Filter what you see

Articles

All published articles in this category

FAQ

Common questions about Device Management

Why does device management belong in a security knowledge base?

Because secure baselines, patching, remote control, encryption, and user onboarding all depend on device management working correctly.

Is this category only for Apple environments?

No. It covers mixed fleets, Windows-centric environments, and the tradeoffs between vendor-specific and cross-platform approaches.

Will these articles help with compliance too?

Yes. Strong device management is one of the fastest ways to produce evidence for encryption, patching, access, and configuration controls.