This framework will enforce the installation of pending Apple security updates on Jamf Pro-managed Macs. Users will have the option to Run Updates or Defer. After a specified amount of time passes, the Mac will be forced to install the updates, then restart automatically if any updates require it.
This workflow is most useful for updates that require a restart and include important security-related patches (e.g. macOS Catalina 10.15.2), but also applies to critical security updates that don't require a restart (e.g. Safari 13.0.4). Basically, anything with the Recommended: YES
and/or Action: restart
label in the softwareupdate
catalog is in scope.
This framework is distributed in the form of a munkipkg project, which allows easy creation of a new installer package when changes are made to the script or to the LaunchDaemon that runs it (despite the name, packages generated with munkipkg don't require Munki; they work great with Jamf Pro). See the Installer creation section below for specific steps on creating the installer for this framework.
Here's what needs to be in place in order to use this framework:
- The current version of this framework has been tested only on macOS 10.13 through 10.15, but older versions should continue to function normally for previous macOS builds (note, however, that those versions of macOS are no longer receiving regular security updates from Apple and thus may not benefit from this framework).
- Target Macs must be enrolled in Jamf Pro and have the
jamfHelper
binary installed. - We're assuming that an automatic restart is desired when updates require it.
- We're assuming that the Jamf Pro server has one or more policies that regularly collect inventory updates from the Mac fleet. This will ensure that Install or Defer is only pushed to a Mac that has a pending update and avoids false-positive script runs (even though the script will not display any alerts if no updates are needed, pushing it to a Mac that doesn't need it results in unnecessary memory and network bandwidth usage and should be avoided).
- Optional: a company logo graphic file in a "stash" on each Mac (if no logo is provided, the Software Update icon will be used).
- Optional but recommended: a Mac with Content Caching service active at all major office locations. This will conserve network bandwidth and improve the download speed of updates.
Here's how everything works, once it's configured:
- When a new critical Apple security update is released, the Jamf Pro administrator creates a smart group for Macs that need this update, and adds it to the existing policy scope.
- Macs that meet the smart group criteria run the policy at next check-in.
- The policy installs a package that places a LaunchDaemon and a script.
- The LaunchDaemon executes the script, which performs the following actions:
-
The script runs
softwareupdate --list
to determine if any updates are required (determined by whether the update is labeled as recommended and/or requiring a restart). If no such updates are found, the script and LaunchDaemon self-destruct. -
If a required update is found, the script runs
softwareupdate --download --all
orsoftwareupdate --download --recommended
to cache all available recommended Apple updates in the background (--all
if a restart is required for any updates,--recommended
if not). -
An onscreen message appears, indicating the new updates are required to be installed. Two options are given: Run Updates or Defer.
(Note: your company logo will appear in place of the Software Update icon, if you specify the
LOGO
path.) -
If the user clicks Defer, the prompt will be dismissed. The next prompt will reappear after 4 hours by default (this is customizable). Users can continue to defer the prompt each time it appears for up to 72 hours (also customizable).
-
When the user clicks Run Updates, the script runs the cached software updates.
-
- If the deferral deadline passes, the script behaves differently:
- After the updates are done installing, if a restart is required:
- A "soft" restart is attempted.
- 5 minutes after the "soft" restart attempt, if the user still has not restarted (or if unsaved work prevents the "soft" restart from occurring), the script forces a restart to occur.
The framework has two major limitations:
- Sequential updates cannot be installed as a group (e.g. Security Update 2019-002 Mojave cannot be installed unless 10.14.6 is already installed). If multiple sequential critical updates are available, they are treated as two separate rounds of prompting/deferring. As a result, Macs requiring sequential updates may take more than one deferral/enforcement cycle (default 3 days) to be fully patched.
- Reasonable attempts have been made to make this workflow enforceable, but there's nothing stopping an administrator of a Mac from unloading the LaunchDaemon or resetting the preference file.
This framework is designed to work "out of the box" without any modification, but if you wish to customize the workflow to your organization's needs (e.g. changing wording in the alerts, adding corporate branding, adjusting alert timing and the maximum deferral time before update enforcement), you can make whatever changes are needed, either by deploying a configuration profile, or by directly modifying the script (payload/Library/Scripts/Install or Defer.sh) with a text editor (e.g. Atom) and building an installer package for deployment of your customized script.
You can customize some values using a configuration profile targeting the $BUNDLE_ID
preference domain. This allows you to apply different configurations to different groups of Macs (e.g. a dedicated test group could have shorter deferral times), and lets you make changes to these settings on the fly without repackaging and redeploying the script. The following keys can be defined via configuration profile:
-
MaxDeferralTime
Integer. Number of seconds between the first script run and the updates being enforced. Defaults to
259200
(3 days). -
SkipDeferral
Boolean. Whether to bypass deferral time entirely and skip straight to update enforcement (useful for script testing purposes). Defaults to
false
.
There are several settings in the script that can be customized by changing default variable values:
-
PLIST
Path to a plist file that is used to store settings locally. Omit ".plist" extension.
-
LOGO
(Optional) Path to a logo that will be used in messaging. Recommend 512px, PNG format. If no logo is provided, the Software Update icon will be used (as shown in the example screenshots in this README).
-
BUNDLE_ID
The identifier of the LaunchDaemon that is used to call this script, which should match the file in the payload/Library/LaunchDaemons folder. Omit ".plist" extension.
-
SCRIPT_PATH
The file path of the
Install or Defer.sh
script. Used in the script to assist with resource file clean-up.
-
MSG_ACT_OR_DEFER_HEADING
The heading/title of the message users will receive when updates are available.
-
MSG_ACT_OR_DEFER
The body of the message users will receive when updates are available.
-
MSG_ACT_HEADING
The heading/title of the message users will receive when they must run updates immediately.
-
MSG_ACT
The body of the message users will receive when they must run updates immediately.
-
MSG_UPDATING_HEADING
The heading/title of the message users will receive when updates are running in the background.
-
MSG_UPDATING
The body of the message users will receive when updates are running in the background.
The above messages use the following dynamic substitutions:
%DEFER_HOURS%
will be automatically replaced by the number of hours remaining in the deferral period.%UPDATE_MECHANISM%
will be automatically replaced by either "App Store > Updates" or "System Preferences > Software Update" depending on the version of macOS.- The section in the
<<double comparison operators>>
will be removed if a restart is not required. - The section in the
{{double curly brackets}}
will be removed when this message is displayed for the final time before the deferral deadline.
-
EACH_DEFER
When the user clicks "Defer" the next prompt is delayed by this much time.
-
UPDATE_DELAY
The number of seconds to wait between displaying the "run updates" message and applying updates, then attempting a soft restart.
-
HARD_RESTART_DELAY
The number of seconds to wait between attempting a soft restart and forcing a restart.
Download and install munkipkg, if you haven't already. Add the munkipkg
binary location to your PATH
or create an alias in your bash profile so that you can reference the command directly.
If you make changes to the script, we recommend changing the following three things:
- The Last Modified metadata in the script.
- The Version metadata in the script.
- The
version
key in the build-info.plist file (to match the script version).
With munkipkg installed, this command will generate a new installer package in the build folder:
munkipkg /path/to/install-or-defer
The subsequent installer package can be uploaded to Jamf Pro and scoped as specified below in the Jamf Pro setup section.
The following objects should be created on the Jamf Pro server in order to implement this framework:
Upload this package (created with munkipkg above) to the Jamf Pro server via Jamf Admin or via the Jamf Pro web app:
- install-or-defer-x.x.x.pkg
Create a smart group for each software update or operating system patch you wish to enforce. Here are some examples to serve as guides, using regular expressions to allow for fewer criteria:
- Critical Update Needed: macOS Catalina 10.15.2
Operating System Build
matches regex
^19[A-B]
- Critical Update Needed: Security Update 2019-007 High Sierra
Operating System Build
matches regex
^17G\d{1,4}$
For completion's sake, here's an example of an update that won't require a restart but is still tagged as Recommended: YES
in the softwareupdate
catalog:
- Critical Update Needed: Safari 13.0.4
Application Title
is
Safari.app
and
(
Application Version
matches regex
^\d\.
or
Application Version
matches regex
^1[0-2]\.
or
Application Version
matches regex
^13\.0\.[0-3]
)
Create a policy with the following criteria:
- Name: Install or Defer
- Triggers:
- Recurring check-in
- Custom: install-or-defer
- Execution Frequency: Once every week1
- Packages:
- install-or-defer-x.x.x.pkg
- Scope:
- One or more test Macs with one or more pending security updates.
- Triggers:
-
On a test Mac in scope for the Install or Defer policy, open Console.app and filter for the Process
logger
, or run this Terminal command:log stream --style syslog --predicate 'senderImagePath ENDSWITH "logger"'
-
Open Terminal and trigger the "stash" policy that deploys the logo graphics, if not already installed:
sudo jamf policy -event stash
-
Then trigger the Install or Defer policy:
sudo jamf policy -event install-or-defer
-
Enter your administrative password when prompted.
-
The policy should run and install the script/LaunchDaemon. Switch back to Console to view the output. You should see something like the following:
default 16:21:07.693371 -0700 logger Starting Install or Defer.sh script. Performing validation and error checking... default 16:21:09.153793 -0700 logger Validation and error checking passed. Starting main process... default 16:21:09.153839 -0700 logger No logo provided, or no logo exists at specified path. Using Software Update icon. default 16:21:09.884776 -0700 logger Maximum deferral time: 72h:00m:00s default 16:21:10.024080 -0700 logger Deferral deadline: 2020-04-05 16:21:09 default 16:21:10.026087 -0700 logger Time remaining: 71h:59m:59s default 16:21:10.044935 -0700 logger Checking for pending system updates... default 16:21:20.041968 -0700 logger Caching all system updates... default 16:21:39.218631 -0700 logger Software Update Tool default 16:21:39.218681 -0700 logger default 16:21:39.218704 -0700 logger Finding available software default 16:21:39.218724 -0700 logger default 16:21:39.326278 -0700 logger Downloaded Safari default 16:24:26.066989 -0700 logger Downloading Security Update 2020-002 default 16:24:26.067232 -0700 logger Downloaded Security Update 2020-002 default 16:24:26.067356 -0700 logger Done. default 16:24:26.122639 -0700 logger Prompting to install updates now or defer...
-
After the updates are downloaded, you should see the following prompt appear onscreen:
-
Click Defer. You should see something like the following output appear in Console:
default 16:24:34.444397 -0700 logger User clicked Defer after 00h:00m:08s.
-
Run the following command in Terminal:
sudo defaults read /Library/Preferences/com.github.mpanighetti.install-or-defer
You should see something similar to the following output (the numbers, which represent dates, will vary):
AppleSoftwareUpdatesDeferredUntil = 1585884274; AppleSoftwareUpdatesForcedAfter = 1586042469;
-
Enter the following commands to "skip ahead" to the next deferral and re-trigger the prompt:
sudo defaults write /Library/Preferences/com.github.mpanighetti.install-or-defer AppleSoftwareUpdatesDeferredUntil -int $(date +%s) sudo launchctl unload /Library/LaunchDaemons/com.github.mpanighetti.install-or-defer.plist sudo launchctl load /Library/LaunchDaemons/com.github.mpanighetti.install-or-defer.plist
-
You should see the install/defer prompt appear again.
-
Click Run Updates. As long as there are no apps with unsaved changes, the Mac will run updates in the background. You should see the following prompt appear onscreen:
- If you want to test the "hard" restart feature of this framework, open Terminal and type
top
before the updates finish running. Then wait 5 minutes after "soft" restart attempt, and confirm that the Mac restarts successfully.
- If you want to test the "hard" restart feature of this framework, open Terminal and type
-
After updates are installed and (optionally) the Mac is successfully restarted, you should not see any more onscreen messages.
-
(OPTIONAL) If an additional round of updates is needed, run
sudo jamf policy -event install-or-defer
again to start the process over. Sequential updates cannot be installed as a group (see Limitations section above).
Once the Testing steps above have been followed, there are only a few steps remaining to deploy the framework:
- On the Jamf Pro web app, edit the Install or Defer policy and click on the Scope tab.
- Remove the test Macs from the scope.
- Add all the Critical Update Needed smart groups into the scope.
- Click Save.
- Monitor the policy logs to ensure the script is working as expected.
If major problems are detected with the critical update prompt or installation workflow, disable the Install or Defer policy. This will prevent computers from being newly prompted for installation of updates.
Note that any computers which have already received the framework push will continue through the motions of alerting, deferring, updating, and restarting. If you need to remove the framework from your fleet and stop it from running, you could write an uninstall script using the preinstall script as a foundation (it would basically just need to unload the LaunchDaemons and remove the resource files).
Once the script is debugged and updated, you can generate a new installer package, upload the package to the Jamf Pro server, link it to the policy, and re-enable the policy. The preinstall script will remove any existing resources and replace them with your modified files.
This most likely means that Install or Defer was manually downloaded and modified, and the LaunchDaemon was given incorrect ownership and permissions in the process of downloading the resource files. If you're using munkipkg to build the package, this should be fixed as of version 3.0.1, but if you're packaging the project using other means, make sure you run these commands beforehand:
sudo chown root:wheel /path/to/install-or-defer/payload/Library/LaunchDaemons/com.github.mpanighetti.install-or-defer.plist
sudo chmod 644 /path/to/install-or-defer/payload/Library/LaunchDaemons/com.github.mpanighetti.install-or-defer.plist
- Feel free to change the
com.github.mpanighetti
style identifier to match your company instead. If you do this, make sure to update the filenames of the LaunchDaemons, their corresponding file paths in the preinstall and postinstall scripts, and the$BUNDLE_ID
variable in the script. - You can specify a different default logo if you'd rather not use the Software Update icon (e.g. corporate branding).
jamfHelper
supports .icns and .png files. - If you encounter any issues or have questions, please open an issue on this GitHub repo.
Enjoy!
1 This example frequency assumes you're using the default deferral period of 72 hours. If you've set a custom deferral period, it is recommended that your policy runs less frequently than the maximum deferral time, so that your Macs have the chance to defer, timeout, and apply the updates before the policy attempts to run again (since the preinstall script will reset AppleSoftwareUpdatesDeferredUntil
and AppleSoftwareUpdatesForcedAfter
).