<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Inchoate Explications]]></title><description><![CDATA[Topically Ephemeral IT insights]]></description><link>https://inchoate-explications.tech/</link><image><url>https://inchoate-explications.tech/favicon.png</url><title>Inchoate Explications</title><link>https://inchoate-explications.tech/</link></image><generator>Ghost 5.88</generator><lastBuildDate>Wed, 06 May 2026 12:09:28 GMT</lastBuildDate><atom:link href="https://inchoate-explications.tech/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Current thoughts about contemporary macOS Security]]></title><description><![CDATA[<p>When it comes to managing Security for macOS in a corporate environment, the first critical requirement is to understand that macOS is not Windows.<br>Of course this is known and understood by all veteran Mac Admins, but it bears repeating for anyone who might have extensive experience handling Security policies</p>]]></description><link>https://inchoate-explications.tech/current-thoughts-about-current-macos-security/</link><guid isPermaLink="false">67a67676f74c860f32edda63</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 07 Feb 2025 21:14:46 GMT</pubDate><content:encoded><![CDATA[<p>When it comes to managing Security for macOS in a corporate environment, the first critical requirement is to understand that macOS is not Windows.<br>Of course this is known and understood by all veteran Mac Admins, but it bears repeating for anyone who might have extensive experience handling Security policies and protections for Windows, but is newly tasked with pursing the same for macOS.</p><p>Continuing from the above understanding, it&apos;s important to ensure that the proper tools and practices are pursued, for effectively protecting macOS, and avoid any misunderstandings (or worse disasters) that can arise by attempting to treat two very different computer operating systems as the same.</p><p>One thing that protecting both OSes (macOS and Windows) have in common, is that the best security is a layered approach, and with that in mind: Your first best layer of protection is user awareness and training (Security awareness and best-practices for users).</p><p>In terms of Security researchers who represent expertise most worthy of your attention, I recommend you devote some time and attention to Patrick Wardle (his website is <a href="https://objective-see.org/index.html?ref=inchoate-explications.tech">https://objective-see.org/index.html</a>) and Phil Stokes (his blog is here: <a href="https://sqwarq.wordpress.com/?ref=inchoate-explications.tech">https://sqwarq.wordpress.com</a>). Which is not intended to imply any disregard for anyone else ! But please do your own research, and be a particularly careful consumer when it comes to bold statements or claims relating to the security of macOS.</p><p>An understanding of the native security capabilites of macOS and Apple hardware, should cover at least <a href="https://www.apple.com/macos/security/?ref=inchoate-explications.tech" rel="noreferrer">ASLR, SIP</a> as well as <a href="https://inchoate-explications.tech/managing-entra-azure-users-immutableid-with-microsoft-graph/" rel="noreferrer">Gatekeeper, Notarization, and XProtect</a>.</p><p>I recommend further reading listed at the end of this post.</p><p>In the current day and age (and probably as far back as the last 5-7 years), another critical layer of a meaningful security posture is DNS-level protection/filtering. <br>Common choices here are Netskope, DNSFilter, Cisco Webroot (look for any history of compatibiility issues), and <a href="https://help.zscaler.com/zscaler-client-connector/what-is-zscaler-client-connector?ref=inchoate-explications.tech" rel="noreferrer">Zscaler</a> amongst others. At a smaller scale, you might care to trial <a href="https://nextdns.io/?ref=inchoate-explications.tech" rel="noreferrer">NextDNS</a>.</p><p>If you&apos;re working with Jamf (or not, it&apos;s not a requirement), I recommend you look into <a href="https://www.jamf.com/lp/jamf-protect-endpoint-protection-for-mac-and-mobile/?utm_source=google&amp;utm_medium=cpc&amp;utm_content=21363207019_164066805340_jamf%20protect_e_c_g_719646153061&amp;gad_source=1&amp;gclid=EAIaIQobChMIvI3BhbeyiwMVymwPAh34ZRbAEAAYASAAEgL6iPD_BwE" rel="noreferrer">Jamf Protect</a>  (for historical context, read about the past work of Patrick Wardle).</p><p>In terms of Security Software for macOS, opinions differ greatly here.<br>Some like to believe that nothing more is needed than the native features of the Apple software and hardware. Given the state of the current threat landscape (for technology and online communications), such a perspective is probably overly-confident and probably unduly biased in favor of Apple. </p><p>That said, in my opinion, many common &quot;Anti-Virus&quot; offerings don&apos;t actually offer anything that specifically protects against the current real-world threats that exist for - and are specific to- macOS.  In other words, I&apos;m not entirely convinced that many of them accomplish anything ...that is properly or thoroughly effective. Beware of products that appear to &quot;check a box&quot; (eg when it comes to compliance requirements), and please look carefully into whether the product does provide the intended goal of effectively protecting macOS.</p><p>That said, so-called &quot;Next-Gen&quot; security software can indeed provide real, worthwhile protections. Common choices here with cross-platform support are Crowdstrike Falcon <a href="https://www.crowdstrike.com/platform/endpoint-security/?ref=inchoate-explications.tech">https://www.crowdstrike.com/platform/endpoint-security/</a>, and Sentinel One <a href="https://www.sentinelone.com/?ref=inchoate-explications.tech">https://www.sentinelone.com</a></p><p>If you need to deal with regulatory compliance, I recommend you read <a href="https://support.apple.com/guide/certifications/macos-security-compliance-project-apc322685bb2/web?ref=inchoate-explications.tech">Apple&apos;s article very nicely directing us</a> to the <a href="https://github.com/usnistgov/macos_security?ref=inchoate-explications.tech#readme">macOS Security Compliance Project (mSCP)</a> <br>Jamf also has information here: <a href="https://www.jamf.com/lp/jamf-shared/?utm_source=google&amp;utm_medium=cpc&amp;utm_content=17808946542_137834231654_jamf_p_c_g_635639151767&amp;gad_source=1&amp;gbraid=0AAAAACdkyZm9iAVHapAF0Kvq6W0380LUs&amp;gclid=Cj0KCQiA-5a9BhCBARIsACwMkJ7OVzusct__YgFcAhOzgxnmk-TYRzIRyAYCjKBxSqKm8rxhHF0i8ScaApiWEALw_wcB">Enforcing CIS, STIG and More to Meet Auditor Standards</a></p><p>Additional considerations should of course include keeping your fleet up to date, which means MDM is a requirement. While I&apos;ve mentioned Jamf, other popular choices (also not limited to the MDM exclusively) for macOS are Kandji, Mosyle, Addigy, and SimpleMDM. However, if you&apos;re specifically Sys/DevOps (GitOps, CF management) oriented in your practices, you could do well to look at FleetDM, Zentral, or even roll your own with MicroMDM and perhaps AutoPkg, Munki, Chef, Puppet, Salt or Ansible.</p><p>At this time, while I use Intune extensively with Windows, it would not yet be a first choice for macOS. It might be fine for your needs for iOS</p><p>Additionally, you should of course choose a trustworthy Identity Provider and configure it appropriately.  </p><p>Additional <a href="https://support.apple.com/kb/index?page=search&amp;src=support_book_topic&amp;locale=en_US&amp;bookid=6eaad3fac75b6647a53c556fae333fa7&amp;rurl=https%3A%2F%2Fsupport.apple.com%2Fguide%2Fsecurity%2Fprotecting-against-malware-sec469d47bd8%2Fweb&amp;title=Apple+Platform+Security&amp;query=iOS&amp;ref=inchoate-explications.tech">information about iOS security is available from Apple.</a></p><p>Additional further reading from Apple:<br><a href="https://support.apple.com/guide/security/welcome/web?ref=inchoate-explications.tech">https://support.apple.com/guide/security/welcome/web</a>,  <a href="https://www.apple.com/macos/security/?ref=inchoate-explications.tech">https://www.apple.com/macos/security/</a> , <a href="https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/web?ref=inchoate-explications.tech">https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/web</a>, as well as <a href="https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/1/web/1?ref=inchoate-explications.tech">https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/1/web/1</a></p>]]></content:encoded></item><item><title><![CDATA[Managing Entra/Azure users (immutableID) with Microsoft Graph]]></title><description><![CDATA[<p>When dealing with federated user identities, you&apos;ve very likely encountered situations in which a user&apos;s ImmutableID needs to be altered. <br><br>A very nice benefit of working with accounts via Microsoft Graph, is you can do so via Powershell (7) for macOS ! (Most things you&apos;ll</p>]]></description><link>https://inchoate-explications.tech/managing-entra-azure-users-immutableid-with-microsoft-graph/</link><guid isPermaLink="false">673bb1f8f74c860f32edd9cb</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Mon, 18 Nov 2024 21:41:53 GMT</pubDate><content:encoded><![CDATA[<p>When dealing with federated user identities, you&apos;ve very likely encountered situations in which a user&apos;s ImmutableID needs to be altered. <br><br>A very nice benefit of working with accounts via Microsoft Graph, is you can do so via Powershell (7) for macOS ! (Most things you&apos;ll need are available).<br><br>For that, I strongly recommend downloading via the direct MS link here,<br><a href="https://mnk.li/powershell-for-macOS?ref=inchoate-explications.tech">https://mnk.li/powershell-for-macOS</a><br><br>A simple (starting-point) script example is here,<br><a href="https://github.com/illudium/powershell-admin-helper-scripts/blob/main/msgraph_changeImmutableID.ps?ref=inchoate-explications.tech">https://github.com/illudium/powershell-admin-helper-scripts/blob/main/msgraph_changeImmutableID.ps</a></p>]]></content:encoded></item><item><title><![CDATA[Managing Adobe updates remotely via Jamf or other MDM]]></title><description><![CDATA[Leveraging Adobe RUM for Adobe app updates, and AppleScript to gracefully quit open Adobe apps (by prompting the user).]]></description><link>https://inchoate-explications.tech/managing-adobe-updates-remotely-via-jamf-or-other-mdm-2/</link><guid isPermaLink="false">673bb77df74c860f32edd9e2</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Sat, 19 Oct 2024 17:53:00 GMT</pubDate><media:content url="https://inchoate-explications.tech/content/images/2024/11/Adobe-Updates.png" medium="image"/><content:encoded><![CDATA[<img src="https://inchoate-explications.tech/content/images/2024/11/Adobe-Updates.png" alt="Managing Adobe updates remotely via Jamf or other MDM"><p>Adobe provides their Remote Update Manager tool, which&#xA0;<a href="https://helpx.adobe.com/enterprise/using/using-remote-update-manager.html?ref=inchoate-explications.tech">you can read more about from Adobe</a></p><p>There is an excellent script for using Adobe RUM via Jamf, from John Mahlman, here: https://github.com/jmahlman/Mac-Admin-Scripts/blob/master/Adobe-RUMWithProgress-jamfhelper.sh</p><p>One problem you will encounter with RUM, is that it will download available updates but fail to apply them, when an Adobe app is still running.</p><p>To handle that gracefully, I suggest the following script snippet&#xA0;<a href="https://github.com/illudium/shell-scripts-for-Mac-mgmt/blob/main/quit_all_adobe_apps.sh?ref=inchoate-explications.tech">(also listed here)</a>, which will invoke AppleScript and ask the user quit all running Adobe apps, and prompt them to save any unsaved changes.</p><pre><code class="language-shell">#!/bin/sh

#other code here

quit_all_adobe_apps ()
{
osascript &lt;&lt;EOF
tell application &quot;System Events&quot;
	set adobeApps to displayed name of (every process whose background only is false and (name starts with &quot;Adobe&quot; or name is &quot;Distiller&quot;)) as list
end tell

repeat with appName in adobeApps
	set end of adobeApps to appName
end repeat

try
	if adobeApps is not {} then
		repeat with currentApp in adobeApps
			if application currentApp is running then
				try
					tell application currentApp to activate
					tell application currentApp to quit
				end try
			end if
		end repeat
	end if
end try
EOF
}

# other code here

quit_all_adobe_apps</code></pre>]]></content:encoded></item><item><title><![CDATA[Microsoft Entra (Azure) discovery]]></title><description><![CDATA[<p>When you face (are tasked with) Azure/Entra discovery or cataloging, and want to work in an efficient manner, be sure to use the following:</p><pre><code class="language-powershell">Get-AzResource
</code></pre><p>along with:</p><pre><code class="language-powershell">Get-AzSubscription
</code></pre><h4 id="originally-published-by-me-march-15th-2024">Originally published by me, March 15th, 2024</h4>]]></description><link>https://inchoate-explications.tech/microsoft-entra-azure-discovery/</link><guid isPermaLink="false">673bb95bf74c860f32edd9f9</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 15 Mar 2024 15:00:00 GMT</pubDate><content:encoded><![CDATA[<p>When you face (are tasked with) Azure/Entra discovery or cataloging, and want to work in an efficient manner, be sure to use the following:</p><pre><code class="language-powershell">Get-AzResource
</code></pre><p>along with:</p><pre><code class="language-powershell">Get-AzSubscription
</code></pre><h4 id="originally-published-by-me-march-15th-2024">Originally published by me, March 15th, 2024</h4>]]></content:encoded></item><item><title><![CDATA[macOS and advanced network commands for managing DNS settings]]></title><description><![CDATA[<p>While MDM is unequivocally a must for managing macOS at (really any) scale, there are times when the core capabilities of MDM won&#x2019;t meet our needs, and a custom scripted approach is required.</p><h3 id="commands-for-determining-the-active-network-interface-and-working-with-dns-server-settings">Commands for determining the active network interface and working with DNS server settings:</h3><p>When we</p>]]></description><link>https://inchoate-explications.tech/macos-and-advanced-network-commands-for-managing-dns-settings/</link><guid isPermaLink="false">673bb9e8f74c860f32edda0f</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 09 Feb 2024 14:00:00 GMT</pubDate><content:encoded><![CDATA[<p>While MDM is unequivocally a must for managing macOS at (really any) scale, there are times when the core capabilities of MDM won&#x2019;t meet our needs, and a custom scripted approach is required.</p><h3 id="commands-for-determining-the-active-network-interface-and-working-with-dns-server-settings">Commands for determining the active network interface and working with DNS server settings:</h3><p>When we want to programmatically determine the existing primary network interface ID, name and existing DNS servers, there are a few different ways we can go about this:</p><pre><code class="language-shell">serviceGUID=&quot;$(printf &quot;open\nget State:/Network/Global/IPv4\nd.show&quot; | /usr/sbin/scutil | /usr/bin/awk &apos;/PrimaryService/{print $3}&apos;)&quot;

serviceName=&quot;$(printf &quot;open\nget Setup:/Network/Service/${serviceGUID}\nd.show&quot; | /usr/sbin/scutil | /usr/bin/awk -F&apos;: &apos; &apos;/UserDefinedName/{print $2}&apos;)&quot;
</code></pre><p>!!! OR !!!</p><pre><code class="language-shell">activeIF=$(route -n get 0.0.0.0 2&gt;/dev/null | awk &apos;/interface: / {print $2}&apos;)

serviceName=$(networksetup -listnetworkserviceorder | grep &quot;$activeIF&quot; | awk -v FS=&quot;(Hardware Port: |,)&quot; &apos;{print $2}&apos;)

</code></pre><h4 id="the-problem-with-cataloging-existing-dns-servers-when-they-are-supplied-via-dhcp">The problem with cataloging existing DNS servers, when they are supplied via DHCP</h4><p>When DNS servers are provisioned via DHCP, a common approach for determining the IP addresses for said servers will fail:</p><pre><code class="language-shell">/usr/sbin/networksetup -getdnsservers &quot;$serviceName&quot;
</code></pre><p>Returns with incorrect info: &#x201C;There aren&#x2019;t any DNS Servers set on &lt;serviceName&gt;&#x201D;</p><p>Which is hardly useful ! So, we can proceed with the following:</p><p>For utility and extra&#xA0;<a href="https://www.google.com/search?q=shell+scripting+using+an+array&amp;ref=inchoate-explications.tech">tech-type fun, let&#x2019;s use an array !</a></p><pre><code class="language-shell">currDNS=($(/usr/sbin/networksetup -getdnsservers &quot;$serviceName&quot;))

if [[ ${currDNS[0]} == &quot;There&quot; ]]; then
  currDNS=($(ipconfig getsummary $activeIF | awk -v FS=&quot;({|, |})&quot; &apos;/domain_name_server/ {$1=&quot;&quot;; print $0 }&apos;))
fi

# check the array, via 
# declare -p currDNS
# For an example of working with the captured info:
# echo ${currDNS[0]}

# So now you can capture those existing DNS servers and append another

/usr/sbin/networksetup -setdnsservers &quot;$serviceName&quot; ${currDNS[0]} ${currDNS[1]} 8.8.8.8</code></pre>]]></content:encoded></item><item><title><![CDATA[GCP - how do I get a list of all projects in an org ?]]></title><description><![CDATA[<p>When dealing with Google Cloud (GCP), how can we get a list of all existing projects (for example) ? There are a number of good posts out there about this, so&#xA0;<a href="https://stackoverflow.com/questions/61244749/how-to-list-all-projects-in-gcp-that-belongs-to-a-specific-organization?ref=localhost" rel="noreferrer">I&apos;m not presenting anything especially novel here</a>. But - if nothing else - hopefully this will be</p>]]></description><link>https://inchoate-explications.tech/gcp-how-do-i-get-a-list-of-all-projects-in-an-org/</link><guid isPermaLink="false">67351ea3f74c860f32edd967</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 15 Dec 2023 21:50:00 GMT</pubDate><content:encoded><![CDATA[<p>When dealing with Google Cloud (GCP), how can we get a list of all existing projects (for example) ? There are a number of good posts out there about this, so&#xA0;<a href="https://stackoverflow.com/questions/61244749/how-to-list-all-projects-in-gcp-that-belongs-to-a-specific-organization?ref=localhost" rel="noreferrer">I&apos;m not presenting anything especially novel here</a>. But - if nothing else - hopefully this will be useful to others, and I&apos;m recording it here for posterity.<br><br>Pulling GCP IAM information typically means dealing with how GCP effectively uses Projects as a boundary/encapsulation. Which requires a multi-step approach, such as follows:</p><pre><code class="language-gcloud">
# gcloud list all projects in root folder of organization in GCP:
gcloud alpha projects search --query=&quot;parent.id=&lt;tenant_ID_Here&quot;

gcloud projects list --filter &apos;parent.id=&lt;id_here&gt; AND parent.type=organization&apos; | awk &apos;{print $1 }&apos; &gt; projects.txt</code></pre><p>And from there, reference the following with something like:</p><pre><code class="language-gcloud">
for Project in projects.txt; do gcloud projects get-iam-policy Project; done

</code></pre><p>Originally shared December 15, 2023</p>]]></content:encoded></item><item><title><![CDATA[GCP (Google Cloud): Discovery - collecting, reviewing auditing Projects and IAM]]></title><description><![CDATA[<p>Pulling GCP IAM information typically means dealing with how GCP effectively uses Projects as a boundary/encapsulation.</p><p>Start by listing all projects in the root folder of an organization in GCP:</p><pre><code class="language-gcloud">gcloud alpha projects search --query=&quot;parent.id=&lt;tenant_ID_Here&quot;
</code></pre><p>AND</p><pre><code class="language-gcloud">gcloud projects list --filter &apos;</code></pre>]]></description><link>https://inchoate-explications.tech/gcp-google-cloud-discovery-collecting-reviewing-auditing-projects-and-iam/</link><guid isPermaLink="false">673bbb11f74c860f32edda29</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 15 Dec 2023 05:00:00 GMT</pubDate><content:encoded><![CDATA[<p>Pulling GCP IAM information typically means dealing with how GCP effectively uses Projects as a boundary/encapsulation.</p><p>Start by listing all projects in the root folder of an organization in GCP:</p><pre><code class="language-gcloud">gcloud alpha projects search --query=&quot;parent.id=&lt;tenant_ID_Here&quot;
</code></pre><p>AND</p><pre><code class="language-gcloud">gcloud projects list --filter &apos;parent.id=&lt;id_here&gt; AND parent.type=organization&apos; | awk &apos;{print $1 }&apos; &gt; projects.txt
</code></pre><p>And from there, reference the following with something like</p><pre><code class="language-shell">for Project in projects.txt; do gcloud projects get-iam-policy Project; done
</code></pre><p>For more information and reference, see https://stackoverflow.com/questions/44746358/how-do-i-list-all-iam-users-for-my-google-cloud-project</p>]]></content:encoded></item><item><title><![CDATA[New items on a fileserver (network fileshare) from one user are missing (don’t show up) for other users]]></title><description><![CDATA[<p>A common occurrence with clients/users on Macs working with a fileserver (network shares) is that when someone else adds new items (files, folders) to network (server-based) sharepoint/folder/drive, other Mac users don&#x2019;t see those new items, they appear to be missing or &#x201C;hidden,&#x201D; but</p>]]></description><link>https://inchoate-explications.tech/new-items-on-a-fileserver-network-fileshare-from-one-user-are-missing-dont-show-up-for-other-users/</link><guid isPermaLink="false">673bbbc1f74c860f32edda41</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Sat, 06 May 2023 04:00:00 GMT</pubDate><content:encoded><![CDATA[<p>A common occurrence with clients/users on Macs working with a fileserver (network shares) is that when someone else adds new items (files, folders) to network (server-based) sharepoint/folder/drive, other Mac users don&#x2019;t see those new items, they appear to be missing or &#x201C;hidden,&#x201D; but they&#x2019;re not.</p><p>(This is actually a longstanding issue with macOS and the Finder).</p><p>&#x2013;</p><h2 id="an-available-workaround-as-remediation">An available workaround as remediation:</h2><p>This is a long-standing issue with (shortcoming of the macOS Finder, in that it&#x2019;s not very good at picking up changes or auto-refreshing in response to underlying changes in a network-based volume. It can happen with OS X Server-based AFP, and various vendors&#x2019; AFP or SMB server-based shares/network folders. One thing we can easily do is create an AppleScript to prompt/prod the Finder to refresh. Save it as an application, store it somewhere safe from accidential deletion (eg: /Library/CompanySupport) and then add it (drag and drop) to the top of a Finder window. Users can click on it to cause a Finder refresh. Optionally, you can add a dialog stating that a refresh is happening.</p><p>The AppleScript content is below:</p><pre><code class="language-applescript">try
 tell application &quot;Finder&quot; to update items of front window
end try
</code></pre><p>And with a dialog:</p><pre><code class="language-applescript">try
 tell application &quot;Finder&quot; to update items of front window
 display dialog &quot;Refreshing the Finder&quot; default button &quot;OK&quot; giving up after 1
end try</code></pre>]]></content:encoded></item><item><title><![CDATA[macOS and the continuing saga of softwareupdate (software update) being “frozen” or not working, no updates listed]]></title><description><![CDATA[<p>There is a well-known issue with macOS in which a Mac does not show available software updates. This has been occurring since the time of macOS Big Sur - aka&#xA0;<a href="https://www.youtube.com/watch?v=KOO5S4vxi0o&amp;ref=inchoate-explications.tech">&#x201C;macOS &#x2018;(this one) goes to&#x2019; 11&#x201D;</a></p><hr><h3 id="investigating-further">Investigating further</h3><p>If you look at the running processes,</p>]]></description><link>https://inchoate-explications.tech/macos-and-the-continuing-saga-of-softwareupdate-software-update-being-frozen-or-not-working-no-updates-listed/</link><guid isPermaLink="false">6750adcff74c860f32edda54</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Thu, 17 Mar 2022 15:00:00 GMT</pubDate><content:encoded><![CDATA[<p>There is a well-known issue with macOS in which a Mac does not show available software updates. This has been occurring since the time of macOS Big Sur - aka&#xA0;<a href="https://www.youtube.com/watch?v=KOO5S4vxi0o&amp;ref=inchoate-explications.tech">&#x201C;macOS &#x2018;(this one) goes to&#x2019; 11&#x201D;</a></p><hr><h3 id="investigating-further">Investigating further</h3><p>If you look at the running processes, you may see an existing&#xA0;<code>softwareudpated</code>&#xA0;process listed, which might have been active for some time.</p><p>Manually launching Software Update (in the GUI) or using the&#xA0;<code>softwareudpate</code>&#xA0;command, will simply sit without returning anything about available updates.</p><h4 id="remediation">Remediation</h4><p>To get past this, I have found the following helpful and the steps do not require a reboot:</p><p>Run the following via the Terminal (or remotely via ssh):&#xA0;<code>sudo /bin/launchctl disable system/com.apple.softwareupdated</code></p><p>Then wait several seconds, and run:&#xA0;<code>sudo /bin/launchctl enable system/com.apple.softwareupdated</code></p><p>Wait several more seconds. Note, the following should be (technically speaking) redundant and unnecessary, but think of it as one more &#x201C;kick&#x201D; to help get things working again:</p><p><code>sudo /bin/launchctl kickstart -k system/com.apple.softwareupdated</code></p><p>And - hopefully - you&#x2019;ll find the problem resolved, as I have so far.</p>]]></content:encoded></item><item><title><![CDATA[IDRAC RED007: UNABLE TO VERIFY UPDATE PACKAGE SIGNATURE]]></title><description><![CDATA[<p>Dell servers provide an iDRAC (&#x201C;Integrated Dell Remote Access Controller&#x201D;) card for remote management of the unit. Note that this feature is a default (with some limited functionality in the &#x201C;express&#x201D; version) in Dell&#x2019;s most entry-level tower server options.</p><p>There are a number of</p>]]></description><link>https://inchoate-explications.tech/idrac-red007-unable-to-verify-update-package-signature/</link><guid isPermaLink="false">67351994f74c860f32edd923</guid><dc:creator><![CDATA[David Haines]]></dc:creator><pubDate>Fri, 25 Jan 2019 19:18:00 GMT</pubDate><content:encoded><![CDATA[<p>Dell servers provide an iDRAC (&#x201C;Integrated Dell Remote Access Controller&#x201D;) card for remote management of the unit. Note that this feature is a default (with some limited functionality in the &#x201C;express&#x201D; version) in Dell&#x2019;s most entry-level tower server options.</p><p>There are a number of options for managing updates for Dell servers, including direct access to an iDRAC card, which is configured with a specifed network configuration during initial setup of a/the server in question. Of course, please observe standard best-practices and never provide public accessibility to any such device, keep it behind your perimeter firewall where it (the iDRAC interface) can only be accessed via VPN. Once configured the iDRAC card is readily accessible at its assigned IP address, via a web-browser.</p><p>While there may be a tendency to &#x201C;set it and forget it&#x201D; with regards to something like this, there is an expectation to keep the iDRAC updated, and generally within a certain range (for reasons of compatibility if not official support) of associated system BIOS versions. If you are tasked with maintaining a Dell server that&#x2019;s fallen behind in terms of updates, you can encounter an error when attempting to update an iDRAC when jumping up too many versions:</p><p>idrac RED007: Unable to verify Update Package signature</p><h3 id="remediation">Remediation</h3><p>This is most probably due to the existing iDRAC setup lacking required information about newer security (certificate) information for the much newer update installer.</p><p><strong>A confirmed fix</strong> is to apply earlier updates to/for the iDRAC in a more step-wise manner: For example, if the card is listed at version 2.3x.(etc), apply the update to 2.40.40.40 then 2.5x, etc. up the latest update. It is often possible to skip one version, but as always, proceed with due care &amp; caution.</p><h4 id="originally-published-by-me-january-29-2019">Originally published by me, January 29, 2019</h4>]]></content:encoded></item></channel></rss>