03-27-2025 08:43 AM - edited 03-31-2025 10:36 PM
In this article, we will go through the process of deploying ESET Endpoint Security for macOS endpoints using JumpCloud.
Generally, when deploying macOS Antivirus or Endpoint Security solutions remotely via an MDM solution, before the security agent is installed, it needs to have pre-approved permissions like Full Disk Access, System Extensions, VPN, Notifications etc for the agent to function correctly. Therefore the configuration profiles have to be deployed prior to deploying the agent.
To deploy ESET Endpoint Security on macOS Mac fleet using JumpCloud, there are 5 steps:
First, we begin by deploying the required System Extensions using JumpCloud's Mac System Extension Policy.
P8DQRXPVLP
com.eset.endpoint
com.eset.network
com.eset.firewall
com.eset.devices
Full Disk Access permissions for the Endpoint Security agent can be deployed using JumpCloud’s Application Privacy Preferences Policy. However only one identifier can be configured in a single policy and there are five identifiers to be configured for FDA as listed below. For each policy, under Privacy Preferences check 'Allow Access To All Files' option.
Endpoint Security Identifier:
com.eset.ees.g2
identifier "com.eset.ees.g2" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Realtime Identifier:
com.eset.endpoint
identifier "com.eset.endpoint" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Network Identifier:
com.eset.network
identifier "com.eset.network" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Firewall Identifier:
com.eset.firewall
identifier "com.eset.firewall" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Uninstaller Identifier:
com.eset.Uninstaller
identifier "com.eset.app.Uninstaller" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Alternatively, if you do not wish to have five individual policies for the same FDA permission, you can create a custom MDM configuration profile using iMazing Profile Editor adding all five identifiers in a single 'Privacy Preferences Policy Control' payload and deploy the profile using JumpCloud's Mac MDM Custom Configuration Profile policy.
For VPN and Firewall configurations, since there are no preconfigured policies available, you can leverage Apple Configurator and iMazing Profile Editor to create custom MDM profiles with the values listed below and deploy it via JumpCloud Mac MDM Custom Configuration Profile policy.
VPN Payload: (I recommend using Apple Configurator for this payload)
com.eset.network.manager
localhost
com.eset.network
identifier "com.eset.network" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
Content Filter (Firewall) Payload: (I recommend using iMazing Profile Editor for this payload)
com.eset.firewall.manager
com.eset.firewall
identifier "com.eset.firewall" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
⛔️ Note - When creating custom configuration profiles using either Apple Configurator or iMazing Profile Editor, ensure you also add Payload Organization (your company name), Payload Scope (System) and Target Device Type (Mac). |
Finally deploy all the policies configured so far to your target Mac device(s), to grant pre-approved permissions to the ESET Endpoint Security agent.
⛔️ Note - You can use the same installer and installer script for multiple devices. |
/tmp/PROTECTAgentInstaller.sh
file destination.root
' and time out set to '600
' seconds:
chmod +x /tmp/PROTECTAgentInstaller.sh
sh /tmp/PROTECTAgentInstaller.sh
rm /tmp/PROTECTAgentInstaller.sh
We see the end point registered in ESET PROTECT under Computers:
Hereafter, for further information and help from ESET, search and refer ESET Knowledge Base or reach out to ESET Support.
New to the site? Take a look at these additional resources:
Ready to join us? You can register here.