Category filter

Jamf to Hexnode Migration Guide for Apple and Cross-Platform Management

A comprehensive enterprise migration framework for transitioning from Jamf Pro to Hexnode UEM. This guide helps organizations migrate Apple-centric device management environments into a unified endpoint management strategy supporting macOS, iOS, Windows, Android, and BYOD devices.

Why Organizations Are Migrating

Many enterprises initially adopt Jamf for Apple-focused management but later require broader, cross-platform capabilities. Organizations commonly migrate to Hexnode to:

  • Consolidate Apple and non-Apple device management
  • Reduce operational complexity
  • Eliminate multiple management consoles
  • Improve visibility across all endpoints
  • Simplify compliance management
  • Standardize automation workflows
  • Support mixed-device environments

Before You Begin: Prerequisites

Before initiating the migration, ensure you have gathered the following:

  • Administrative access to both Jamf and Hexnode
  • Device inventory exports
  • Apple Business Manager (ABM) access
  • Existing policy documentation
  • Script repositories
  • Extension attribute inventory
  • Compliance and restriction documentation
  • Application deployment inventory

Understanding the Migration Strategy

Apple-First to Unified Endpoint Management Transition

Organizations migrating from Jamf typically shift their operational models:

Existing State (Jamf) Target State (Hexnode)
Apple-only management Unified endpoint management
Separate UEM tools Single management console
macOS-centric workflows Cross-platform workflows
Apple-specific compliance Unified compliance posture
Fragmented reporting Centralized visibility

For most enterprises, a phased coexistence approach minimizes disruption:

  1. Assessment & Cleanup (Jamf Environment)
  2. Hexnode Parallel Deployment
  3. Pilot Migration
  4. Department-wise Rollout
  5. Unified Policy Validation
  6. Jamf Decommissioning

Phase 1 – Environment Assessment

Identify all Apple management dependencies currently handled through Jamf.

1.1 Export Device Inventory

Export all managed Apple device information. Ensure you capture the following critical fields:

Category Details
Device identity Serial number, UDID
Ownership Corporate or BYOD
Platform macOS, iPhone, iPad
Enrollment method ADE, user enrollment
Assigned user Email and department
Compliance status Current device posture

1.2 Review Apple Business Manager Integration

Validate your ABM integration, which is central to migration planning:

  • ADE (Automated Device Enrollment) assignments
  • VPP (Volume Purchase Program) token status
  • Managed Apple IDs
  • Device supervision status
  • Enrollment synchronization

1.3 Analyze Existing Policies

Review all current Jamf policies and restrictions. Common categories include:

  • Password enforcement
  • FileVault management
  • Gatekeeper settings
  • Firewall enforcement
  • Software update policies
  • Restrictions
  • Login window customization
  • Privacy preferences policy control (PPPC)

1.4 Compliance Policy Mapping

Map your existing Jamf workflows to their Hexnode equivalents. Ensure all security baselines remain consistent post-migration.

Jamf Configuration Hexnode Equivalent
FileVault enforcement Disk encryption policies
Password policies Passcode policies
macOS restrictions Device restrictions
Patch management workflows Patch management policies
Compliance reporting Compliance monitoring

1.5 Extension Attributes Mapping

Jamf Extension Attributes often contain critical custom logic. Export all attributes, remove deprecated logic, and rebuild required workflows in Hexnode.

Jamf Extension Attributes Hexnode Equivalent
Custom inventory attributes Custom device attributes
Script-generated reporting Script-based inventory collection
Compliance extensions Automated compliance checks
Custom reporting fields Device metadata and reporting

Important: Some extension attributes rely on Jamf-specific APIs or script paths and will require redesigning for Hexnode.

1.6 macOS Scripting Assessment

Review all existing shell scripts, post-enrollment automations, login scripts, software deployment scripts, and compliance/inventory scripts.

Jamf Capability Hexnode Equivalent
Shell script deployment Script execution policies
Automated remediation Automated actions
Post-enrollment workflows Enrollment automation
Device customization Policy-based configuration

Action items for scripts: Categorize by business function, remove obsolete automation, validate dependencies, and test execution thoroughly in Hexnode.

Phase 2 – Unified Management Planning

Establish Hexnode alongside Jamf before executing a large-scale migration.

2.1 Parallel Deployment Strategy

A coexistence period is strongly recommended.

  • Pilot coexistence: Best for initial validation.
  • Department-based rollout: Best for structured enterprise migration.
  • Platform-based transition: Best for gradual UEM consolidation.

2.2 Identity Integration

Configure and validate your identity providers (Entra ID, Okta, Google Workspace, Active Directory) in Hexnode. Verify SSO workflows, user provisioning, group synchronization, and RBAC mappings.

2.3 Certificate and Token Planning

Review APNs certificates, VPP tokens, SCEP configurations, PKI infrastructure, Wi-Fi certificates, and VPN certificates.

Important: Expired Apple-related certificates are one of the most common migration blockers. Ensure all are up to date before proceeding.

Phase 3 – Migration Execution

Actively migrate devices from Jamf to Hexnode.

3.1 ADE (Automated Device Enrollment) Migration

  • Assign devices to the Hexnode MDM server in Apple Business Manager.
  • Remove old MDM profiles.
  • Re-enroll devices.
  • Reapply configuration profiles.
  • Validate supervision status, ADE synchronization, and Activation Lock handling.

3.2 macOS Device Migration

  • Remove the Jamf management profile.
  • Enroll the device into Hexnode.
  • Reapply restrictions, policies, and redeploy applications.
  • Validate FileVault status, Wi-Fi/VPN connectivity, PPPC configurations, and compliance reporting.

3.3 iPhone and iPad Migration

  • Reassign ADE ownership.
  • Remove the old MDM profile.
  • Re-enroll through Hexnode.
  • Reassign VPP applications.
  • Validate supervised restrictions.

3.4 Application Migration

Export your current catalog (VPP apps, PKGs, internal apps, SaaS launchers) and remove unused software. Validate installation methods, recreate deployment groups in Hexnode, and reapply managed app configurations.

Phase 4 – Validation and Optimization

  • Compliance Validation: Check FileVault enforcement, password compliance, firewall status, and patch compliance.
  • Reporting Validation: Verify inventory reporting, compliance dashboards, and device health monitoring.
  • User Experience Testing: Validate enrollment experience, login workflows, VPN connectivity, and self-service functionality.
  • Unified Management Validation: Ensure macOS, iOS/iPadOS, Windows, Android, and BYOD endpoints are effectively managed centrally.

Phase 5 – Jamf Decommissioning

Begin the controlled retirement of Jamf dependencies only after validation is fully complete.

  • Disable Legacy Policies: Gradually retire Jamf policies, restrictions, patch workflows, and scripts.
  • Remove Legacy Certificates: Retire old APNs certificates, VPP tokens, and SCEP/Wi-Fi configurations.
  • Archive Historical Reporting: Export audit logs, archive compliance history, preserve inventory records, and retain licensing documentation before shutting down the Jamf instance.

Rollback Planning & Risk Management

Always prepare a rollback strategy before production rollout.

Migration Phase Rollback Strategy
Pilot migration Re-enrollment in Jamf
Department rollout Scoped coexistence rollback
Production rollout Parallel management recovery

Downtime Expectations & User Impact

Users may experience application reauthentication, VPN reprovisioning, or device restart requirements.

Platform Typical User Impact
macOS Low to medium
iPhone/iPad Low
BYOD Apple devices Medium

Common Migration Failure Scenarios

  • ADE Synchronization Delays: Caused by ABM sync latency. Prevention: Allow adequate sync time before testing enrollment.
  • FileVault Reporting Mismatch: Caused by unvalidated encryption workflows. Prevention: Test reporting heavily during the pilot phase.
  • Script Execution Failure: Caused by Jamf-specific dependencies. Prevention: Validate and rewrite scripts for Hexnode in advance.
  • VPP Application Assignment Issues: Caused by licensing reassignment inconsistencies. Prevention: Validate VPP sync during pilot testing.

Risk Matrix

Risk Severity Likelihood Mitigation
ADE enrollment disruption High Medium Pilot testing
FileVault reporting failure Medium Medium Compliance validation
Script compatibility issues Medium High Script testing
Inventory reporting gaps Medium Medium Extension attribute audit
User disruption Medium Medium Staggered rollout

For a successful transition in mixed-device enterprises:

  1. Start with Apple pilot groups.
  2. Simplify legacy Jamf workflows before moving them.
  3. Validate unified policy management.
  4. Introduce non-Apple device management gradually.
  5. Maintain coexistence temporarily.
  6. Delay Jamf decommissioning until a final audit is complete.