ESET Endpoint Antivirus for macOS 7 Owner's manual

Category
Antivirus security software
Type
Owner's manual
ESET Endpoint Antivirus for macOS
User guide
Click here to display the online version of this document
Copyright ©2023 by ESET, spol. s r.o.
ESET Endpoint Antivirus for macOS was developed by ESET, spol. s r.o.
For more information visit https://www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without
permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice.
Technical Support: https://support.eset.com
REV. 4/19/2023
1 ESET Endpoint Antivirus for macOS 1 ..................................................................................................
2 What's new in version 7 1 ....................................................................................................................
2.1 Version 6 & version 7 comparison 2 .................................................................................................
2.2 Settings migration 6 ......................................................................................................................
2.3 Changelogs 7 ................................................................................................................................
3 System requirements 7 ........................................................................................................................
4 Upgrade ESET Endpoint Antivirus for macOS version 6 to version 7 7 .................................................
5 Installation 10 ......................................................................................................................................
5 Basic installation 10 ........................................................................................................................
5 Command line installation 11 ..............................................................................................................
5 Post-installation process 12 ................................................................................................................
5 Pre-installation settings 13 .................................................................................................................
5 Jamf pre-installation settings 16 ...........................................................................................................
5 Deployment via ESET management console 18 ..........................................................................................
5 Where can I find my license 19 ............................................................................................................
5 Local activation 19 .........................................................................................................................
5 Activation via Terminal 20 .................................................................................................................
5 Remote activation 20 ......................................................................................................................
6 Documentation for endpoints managed remotely 21 ...........................................................................
6.1 Introduction to ESET PROTECT CLOUD 21 .........................................................................................
6.2 Introduction to ESET PROTECT 22 ...................................................................................................
6.3 Disable notification via MDM 23 ......................................................................................................
7 Working with ESET Endpoint Antivirus for macOS 24 ...........................................................................
7.1 Protection Status 24 .....................................................................................................................
7.2 Computer Scan 25 .........................................................................................................................
7.2 Custom scan 26 ..........................................................................................................................
7.3 Update detection modules 26 .........................................................................................................
7.3 Terminal utilities and daemons 26 ......................................................................................................
7.3 Quarantine 27 ............................................................................................................................
7.3 Configuration 29 ..........................................................................................................................
7.3 Events 29 .................................................................................................................................
7.3 Update detection modules via Terminal 30 .............................................................................................
7.3 On-demand scan via Terminal 31 .......................................................................................................
7.4 About 33 ......................................................................................................................................
8 Product configuration 33 ......................................................................................................................
8.1 Detection engine 33 ......................................................................................................................
8.1 Real-time File System Protection 34 ....................................................................................................
8.1 Cloud-based protection 36 ...............................................................................................................
8.1 Malware scans 38 ........................................................................................................................
8.1 ThreatSense parameters 38 .............................................................................................................
8.1 Additional ThreatSense parameters 41 .................................................................................................
8.1 Cleaning levels 41 ........................................................................................................................
8.2 Update 42 ....................................................................................................................................
8.2 Update mirror (custom update servers) 43 .............................................................................................
8.2 Anti-Phishing protection 44 ..............................................................................................................
8.2 Web access protection 44 ...............................................................................................................
8.2 Email client protection 45 ................................................................................................................
8.3 Tools 47 .......................................................................................................................................
8.3 Proxy server 47 ...........................................................................................................................
8.3 Log files 48 ...............................................................................................................................
8.4 User Interface 49 ..........................................................................................................................
9 Uninstallation 50 ..................................................................................................................................
10 Technical support 51 ..........................................................................................................................
11 End User License Agreement 52 ........................................................................................................
12 Privacy Policy 59 ................................................................................................................................
1
ESET Endpoint Antivirus for macOS
ESET Endpoint Antivirus for macOS 7 represents a new approach to truly integrated computer security. The most
recent version of the ThreatSense® scanning engine utilizes speed and precision to keep your computer safe. The
result is an intelligent system constantly on alert for attacks and malicious software that might threaten your
computer.
ESET Endpoint Antivirus for macOS 7 is a complete security solution developed from our long-term effort to
combine maximum protection and a minimal system footprint. The advanced technologies, based on artificial
intelligence, are capable of proactively eliminating infiltration by viruses, spyware, trojan horses, worms, adware,
rootkits, and other Internet-borne attacks without hindering system performance or disrupting your computer.
The product is primarily designed for use on workstations in a small business/enterprise environment. It can be
used with ESET PROTECT, allowing you to manage any number of client workstations easily, apply policies and
rules, monitor detections, and remotely administer changes from any networked computer.
What's new in version 7
ESET Endpoint Antivirus for macOS version 7 is a new generation of our product based on micro-services rather
than a single service.
Native Apple ARM chip support (from version 7.1.1700.0)
Native 64-bit architecture
Improved performance and stability. If ESET Endpoint Antivirus for macOS crashes, it can auto-restart
without the user noticing.
Better security by making processes more independent from each other.
New main program window including:
oDark mode support
oNative desktop notifications
oOption to disable GUI for end user
Improved real-time file system protection
oThe latest native 64-bit scanning engine
oOptimized for multi-core performance
oReal-time scanning under local user
Brand new native Graphical user interface
Extended configuration of ESET LiveGrid via ESET PROTECT and ESET PROTECT CLOUD
Unification of command line commands with Linux platform.
2
Version 6 & version 7 comparison
Feature Version 6 (latest version) Version 7
Architecture
Architecture Monolithic Micro-services
Architectural security profile
The main process runs
under root
(all important operations
are done by the main
process)
Each service runs with
the lowest possible
rights
Lower possible attack
vector
Vulnerability in one
service doesn't expose
the whole application.
Crashing or hijacking
one product process
will not disable all
protections
Architectural Stability profile
Crash in monolithic
scanner causes a
temporal void in
protection
Automatic process
reboot in case of a crash
Non-critical service
crash will not cause a
pause in protection
Simpler services
optimized for specific
tasks
Automatic service
reboot in case of a
crash
macOS Support
10.12 (Sierra)
10.13 (High Sierra)
10.14 (Mojave)
10.15 (Catalina)
11 (Big Sur)
12 (Monterey)
10.15 (Catalina)
11 (Big Sur)
12 (Monterey)
13 (Ventura)
Native 64-bit scanning engine x x
Native 64-bit application x x
Multi-language support language-specific
installation package
all languages in one
package (GUI language
same as system)
Native ARM support from version
7.1.1700.0
Rosetta ARM support x x
File system protection
Detection engine
Detection of potentially unwanted, unsafe and suspicious
applications x x
Performance exclusions x x
3
Feature Version 6 (latest version) Version 7
Detection exclusions by Path & Detection
After creating detection
exclude (files are
scanned, but issues are
ignored) in ESET
PROTECT, it creates
performance exclusion
(files are not scanned).
x
Detection exclusions by Detection x
Detection exclusions by Exact file (hash) x
Real-time file system protection
Increase network volumes compatibility x not needed
Scan under logged-in user x
Scan local drives x x
Scan removable media x x
Scan network drives x x
Scan on open, creation x x
Scan on execution x Yes, part of open
Process Exclusions x
Cloud-based protection
ESET LiveGrid© Reputation system x x
(extended)
ESET LiveGrid© Feedback system x x
Granular configuration of what can be sent x
Malware scans (On-demand)
Scan of symbolic links x x
Scan of email files x x
Scan of mailboxes x x
Scan of archives x x
Scan of self-extracting archives x x
Scan of runtime packers x x
Scan alternative data streams (ADS) x x
Enable smart optimization x x
Exclude system control folders from scanning x Not needed
Run background scans with low priority x
Preserve last access timestamp x x
Start-up scan x
Web and email protection
Application exclusions x x
IP addresses exclusions x x
Web Access Protection (HTTP scanning) x x
4
Feature Version 6 (latest version) Version 7
Email Client protection x x
Anti-phishing protection x x
Modules updater
Custom Proxy server for Primary/secondary update server x
Modules rollback x x
Pre-release updates x x
Delayed updates x x
Other major features
Device Control x
Firewall
Web Control
ERMM support (command line interface for Remote
Monitoring and Management integration) x
ESET Enterprise Inspector support x x
Other minor features
Command line interface x x (unified with ESET
Endpoint for Linux)
Detection log x x
Event log x x
Computer scan log x x
Import or export settings x x
Quarantine x x
Local task Scheduler x x
Proxy server configuration x x
Presentation mode x x (system native Do
not disturb)
User Interface
User Interface - Tools
Log files x
Detected threats x
Events x
Computer scan x
Device Control x
Firewall (In Endpoint Security)
Filtered websites
Web Control (In Endpoint Security)
Log filtering x
Protection statistics x
Scheduler x
5
Feature Version 6 (latest version) Version 7
Running processes x
Quarantine x
Submit file for analysis x
User interface - Other
Protection status x x
Computer scan x x
Manual modules update x x
Local settings/configuration by the user x
Import or export settings from GUI x
Help x x
Brand new native graphical user interface x
Dark Mode support x
High-resolution display support x x
Ability to disable GUI to user x
Native notifications x
Menu bar icon x x
Ability to hide Menu bar icon x x
Context menu integration x
Granular control of protection status shown in GUI/reported
to ESET PROTECT or ESET PROTECT CLOUD x x
System update notifications x
Only in ESET PROTECT
or ESET PROTECT
CLOUD console
Installation
Local GUI-based installation x x
Component-based installation x
Remote component-based installation (component
installation needs additional steps) x
Silent installation support (via MDM pre-approvals) x x
Product update via reinstallation x x
Product update from ESET PROTECT or ESET PROTECT
CLOUD x x
Product activation
Activation with license key x x
Subscription license support x x
Activation via ESET PROTECT or ESET PROTECT CLOUD x x
Activation with offline license file x
Activation with ESET Business Account x
Compatibility with ESET management consoles
Compatibility with ESET PROTECT CLOUD x x
6
Feature Version 6 (latest version) Version 7
Compatibility with ESET PROTECT x x
Compatibility with ESMC 7.1 and earlier x
Compatibility with ESMC 7.2 x x
Settings migration
From version 7.2 and later, your settings from ESET Endpoint Antivirus for macOS version 6 are automatically
migrated to the new version during the upgrade process.
After the migration process is finished, ESET Endpoint Antivirus for macOS will display a notification on the home
screen of successful settings migration: Your settings were transferred to the new version.
Policies in ESET PROTECT and ESET PROTECT CLOUD will not migrate automatically as not all features
present in ESET Endpoint Antivirus for macOS version 6 are present in version 7. After the upgrade to
version 7, you need to review your existing policies and create new policies based on the feature present in
version 7. You can find more information on how to create or delete policies in the Policies topic:
Policies in ESET PROTECT
Policies in ESET PROTECT CLOUD
Policies in ESET PROTECT and ESET PROTECT CLOUD for ESET Endpoint Antivirus for macOS version 6 and
version 7 can be active at the same time.
If you already upgraded your ESET Endpoint Antivirus for macOS from version 6 to version 7 or 7.1, you can
still migrate your setting with an upgrade to a later version. For instructions, visit the ESET Knowledgebase
article on migration.
All settings that are available in version 7.X will migrate from version 6, with the following exceptions:
Privileges settings (is not supported in version 7)
Custom proxy server for updates (Custom proxy is not supported in version 7)
Quarantine content
Cleaning levels for scans
Target profiles for On-demand scan
Settings for the following features are stored in the migration .xml file and can be loaded when the features will
be present in the future version of ESET Endpoint Antivirus for macOS:
Device Control
Logs
Web Access Protection
7
Presentation Mode
Other migration issues
Custom scan profiles are migrated but can only be managed via ESET PROTECT or ESET PROTECT CLOUD.
Changelogs
System requirements
For optimal performance of ESET Endpoint Antivirus for macOS, your system should meet the following hardware
and software requirements:
System requirements:
Processor Intel 64-bit, Apple ARM 64-bit
Operating system macOS 10.15 to macOS 13
macOS Server 10.15 and later
Memory 300 MB
Free disk space 400 MB
ESET Endpoint Antivirus for macOS requires a functional internet connection during the installation.
ESET Endpoint Antivirus for macOS version 7.1.1700.0 and later provides native support for Apple ARM
chip.
Upgrade ESET Endpoint Antivirus for macOS version 6
to version 7
After the upgrade from ESET Endpoint Antivirus for macOS version 6 to version 7, ESET Endpoint Antivirus
for macOS will revert to default settings. This includes policies in the ESET management console.
ESET Endpoint Antivirus for macOS version 7 contains many differences to version 6, and some of the
features are missing. Before you decide to upgrade your ESET Endpoint Antivirus for macOS, we
recommend reading the topic Comparison of version 6 & version 7.
Local upgrade
Upgrade via command line
Upgrade via ESET management console
Settings migration
8
Local upgrade
1. Download the latest ESET Endpoint Antivirus for macOS installation file (.dmg).
2. Open the installation file (.dmg).
3. Double click the Install ESET Endpoint Antivirus for macOS icon .
4. System will request access to files based on your installation file location. Click OK.
5. Click Continue if no other security application is installed. If there is another antivirus application installed,
the installation might fail.
6. Click Continue to confirm the system requirements.
7. Click Continue.
8. Click Agree to accept the End-User License Agreement and Privacy Policy.
9. If you want to change the destination folder or change if all users have access to ESET Endpoint Antivirus
for macOS, click Change Install Location. To start the installation, click Install.
Change Install Location
Select the installation destination. Select if you want to install ESET Endpoint Antivirus for macOS for all
users on your computer or just for the current user. You can also select a specific folder for ESET Endpoint
Antivirus for macOS installation. Select your option and click Continue to return to the Installation type step.
10. You might be prompted to enter the administrator password at the start of the installation.
11. Click Close to finish the installation.
12. After the installation, it is necessary to restart your computer for you to be able to allow full disk access
for this new version of ESET Endpoint Antivirus for macOS.
13. After the restart, open the Apple menu.
14. Click System Preferences.
15. Go to Security & Privacy.
16. Select the Privacy tab.
17. In the Privacy tab, select Full Disk Access.
18. Click the lock icon and type the administrator password to allow making changes.
19. Check the ESET Endpoint Antivirus for macOS and ESET Real-time File System Protection options.
20. Reactive your ESET Endpoint Antivirus for macOS. You will find more activation options in the Activation
topic.
9
Upgrade via command line
To upgrade ESET Endpoint Antivirus for macOS to version 7 via command line:
1. Download the ESET Endpoint Antivirus for macOS version 7.
2. Distribute the .dmg files to the target computers.
3. Run the installation as described in the Command line installation topic.
Upgrade ESET Endpoint Antivirus for macOS via ESET PROTECT or ESET
PROTECT CLOUD
The following changes must be made in your configuration profiles in your MDM before the upgrade:
In the Full disk access configuration profile
Version 6 Version 7
Identifier com.eset.eea.6 Identifier com.eset.eea.g2
If you install ESET Endpoint Antivirus for macOS on macOS 12 and later, you need to add Full disk access for
the Uninstaller.app. This is needed to remove version 6 from your system and to allow you to uninstall version 7
remotely in the future. To the Full disk access configuration profile, add:
ESET Endpoint Antivirus & ESET Endpoint Security on macOS 12 Monterey
Identifier com.eset.app.Uninstaller
Identifier Type bundleID
Code Requirement identifier "com.eset.app.Uninstaller" and anchor apple generic and
certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and
certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and
certificate leaf[subject.OU] = P8DQRXPVLP
App or Service SystemPolicyAllFiles
Access Allow
In the Web and Email protection configuration profile
Version 6 Version 7
Identifier for the custom
SSL VPN
com.eset.sysext.manager Identifier for the custom
SSL VPN
com.eset.network.manager
If you remove the settings for version 6 before upgrading to version 7, users will receive notification as if
those settings were not applied. We recommend creating a new configuration profile for ESET Endpoint
Antivirus for macOS version 7, deploying the configuration profile to the target computers, upgrading your
ESET Endpoint Antivirus for macOS and removing the configuration profiles for version 6.
10
You can find the new configuration profiles for ESET Endpoint Antivirus for macOS version 7 for you to download
in the Pre-installation settings topic.
After you deploy the new configuration profiles, continue the installation in the Deploy via ESET management
console topic.
Installation
Installation methods
Installation
method
Installation type Notes
GUI installation Local You can install ESET Endpoint Antivirus for macOS locally from the
installation .dmg file. After the installation, it is necessary to apply user
consent settings in the post-installation process to ensure the protection
of your computer.
Command line
installation
Local/Remote You can install ESET Endpoint Antivirus for macOS without interacting with
the installers' GUI. You can also use this method to install ESET Endpoint
Antivirus for macOS remotely. If you are installing ESET Endpoint Antivirus
for macOS remotely, we recommend applying user consent settings via
MDM before the installation.
ESET PROTECT Remote If your computer is enrolled in ESET PROTECT, you can create an
installation task to install ESET Endpoint Antivirus for macOS on target
computers.
ESET PROTECT
CLOUD
Remote If your computer is enrolled in ESET PROTECT CLOUD, you can create an
installation task to install ESET Endpoint Antivirus for macOS on target
computers.
ESET Endpoint Antivirus for macOS requires user consent settings to function. These settings need to be
manually applied after the installation. Your device must be enrolled in MDM to avoid adding user consent
settings to each computer. MDM will then be used to distribute configuration profiles to target computers.
If you do not apply these settings before installation, users will receive multiple pop-up dialogues urging
them to apply user consent settings manually. We recommend distributing configuration profiles before
the ESET Endpoint Antivirus for macOS installation.
Basic installation
1. Download the latest ESET Endpoint Antivirus for macOS installation file (.dmg).
2. Open the installation file (.dmg).
3. Double click the Install ESET Endpoint Antivirus for macOS icon .
4. System will request access to files based on your installation file location. Click OK.
5. Click Continue if no other security application is installed. If there is another antivirus application installed,
the installation might fail.
6. Click Continue to confirm the system requirements.
11
7. Click Continue.
8. Click Agree to accept the End-User License Agreement and Privacy Policy.
9. If you want to change the destination folder or change if all users have access to ESET Endpoint Antivirus
for macOS, click Change Install Location. To start the installation, click Install.
Change Install Location
Select the installation destination. Select if you want to install ESET Endpoint Antivirus for macOS for all
users on your computer or just for the current user. You can also select a specific folder for ESET Endpoint
Antivirus for macOS installation. Select your option and click Continue to return to the Installation type step.
10. You might be prompted to enter the administrator password at the start of the installation.
11. Click Close to finish the installation.
12. After the installation, you will receive System Extension Blocked dialogue. For proper function of ESET
Endpoint Antivirus for macOS, it is necessary to allow system extensions, full disk access, and notifications
for the ESET Endpoint Antivirus for macOS. Follow the post-installation process to enable all ESET Endpoint
Antivirus for macOS functions.
Command line installation
Skip the GUI installation by installing ESET Endpoint Antivirus for macOS via command line. If your computer is not
enrolled in MDM, you will still need to manually allow user access permission for ESET Endpoint Antivirus for
macOS in System Preferences.
If you are using command line installation to install ESET Endpoint Antivirus for macOS remotely, we
recommend that you distribute configuration profiles with user consent settings via MDM before the ESET
Endpoint Antivirus for macOS installation. You can find configuration profile settings in the Pre-installation
settings topic.
1. Download ESET Endpoint Antivirus for macOS.
2. To mount the downloaded .dmg file, double-click the file or use the following command line process:
a.In Terminal, navigate to the location of the file. Type in: cd ~/Downloads
Replace Downloads with the location of your downloaded file.
b.Type in: hdiutil attach eea_osx_mlp_0.dmg.
Replace eea_osx_mlp_0 with your filename.
3. In terminal type: sudo installer -pkg /Volumes/ESET\ Endpoint\
Antivirus/.resources/Installer.pkg -target /
You may need to replace the path to the Installer.pkg with your Installer.pkg location.
4. After the installation, you will need to allow user consent settings for ESET Endpoint Antivirus for macOS in
the post-installation process to allow full protection.
12
Post-installation process
After the installation, you must allow the user consent settings for ESET Endpoint Antivirus for macOS.
macOS Ventura and newer
Allow system extensions
After ESET Endpoint Antivirus for macOS installation, a notification will pop up prompting you to enable system
extensions.
1.Click Open System Settings.
2.Select Privacy & Security from the menu on the left.
3.Scroll down to the Security section, click Details button underneath the note "Some system software requires
your attention before it can be used".
Details button is not present
If note "Some system software requires your attention before it can be used" and the Details button are
not present, system extensions were already allowed and no further action is needed.
4.Use your Touch ID or click Use Password and type your User Name and Password, then click Unlock.
5.Enable both ESET Real-time File System Protection and ESET Web and Email Protection.
6.Click OK.
7.ESET Web and Email Protection alert is displayed prompting you to add proxy configuration, select Allow. In
case you do not allow proxy configuration while the alert is shown, you will need to restart your computer in
order to initiate the alert and have the option to allow proxy configuration again.
Allow Full Disk Access
When you open the ESET Endpoint Antivirus for macOS for the first time, you will see a Security alert: ESET
Endpoint Antivirus for macOS does not have Full Disk Access.
1.Open System Settings.
2.Select Privacy & Security from the menu on the left.
3.Click on Full Disk Access option, select ESET Endpoint Antivirus for macOS from the list and enable it.
4.Use your Touch ID or click Use Password and type your User Name and Password, then click Unlock.
5.In case a restart ESET Endpoint Antivirus for macOS prompt displays, click Later.
6.Select ESET Real-time File System Protection from the list and enable it.
macOS Monterey and older
13
Allow Web and Email protection
Right after ESET Endpoint Antivirus for macOS installation is finished, a dialog will be displayed:
"ESET Web and Email Protection" Would Like to Add Proxy Configuration.
Click Allow. If you click Don't Allow, Web and Email protection does not work.
Allow notifications
After ESET Endpoint Antivirus for macOS installation, a notification will pop up in the top right.
1. Move the cursor over the notification to display the Options button.
2. Click Options.
3. Click Allow.
If you click Don't allow, you might miss critical security information.
Allow system extensions
1. Click the Apple icon.
2. Click System Preferences.
3. Go to Security & Privacy.
4. In the General tab, click the lock icon and type the administrator password to make changes.
5. Click Allow to enable ESET Real-time file system protection.app system extensions to load.
6. Quit and reopen ESET Endpoint Antivirus for macOS or restart your computer to apply the changes.
Allow Full Disk Access
1. Click the Apple icon.
2. Click System Preferences.
3. Go to Security & Privacy.
4. Select the Privacy tab.
5. In the Privacy tab, select Full Disk Access.
6. Click the lock icon and type the administrator password to allow making changes.
7. Check the following options:
a.ESET Real-time file system protection
b.ESET Endpoint Antivirus for macOS - System will offer you to restart your computer. This step is not necessary.
Remote installation
Before installation
ESET Endpoint Antivirus for macOS requires privileges settings that prevent it from being fully installed remotely
without your device being enrolled in MDM. If your device is enrolled in MDM, you can use the MDM to distribute
these settings via configuration profiles. If your device is not enrolled in MDM, these privileges settings must be
allowed manually on each computer.
If you are using Jamf, you can also see our Jamf specific guide.
Setting configuration profiles for ESET Endpoint Antivirus for macOS
Before installing ESET Endpoint Antivirus for macOS, you must enable the following settings on targeted
computers:
oESET system extensions
If ESET system extensions are not enabled before the installation, users will receive System extensions
14
blocked notifications until the ESET system extensions are enabled.
oFull disk access
If full disk access is not enabled before the installation, users will receive Your computer is partially protected
notifications until the full disk access is enabled.
oWeb and Email protection
You must add the Web and Email protection configuration to the system settings for Web and Email
protection to function.
If the Web and Email protection configuration is missing after the ESET Endpoint Antivirus for macOS
installation, users will receive "ESET Endpoint Antivirus for macOS" Would Like to Filter Network Content.
When they receive this notification, click Allow. If they click Don't Allow, Web and Email protection will not
work.
To enable the ESET settings above remotely, your computer must be enrolled with an MDM (Mobile Device
Management) server, such as Jamf.
Enable ESET system extensions
To enable system extensions on your device remotely, perform one of the following actions before the
installation:
oDownload the .plist payload. Create a configuration profile in your MDM using the .plist payload.
oCreate a configuration profile in your MDM using the following settings:
Team identifier (TeamID) P8DQRXPVLP
Bundle identifier (BundleID) com.eset.endpoint
com.eset.network
Enable full disk access
To enable full disk access remotely, perform one of the following actions before the installation:
oDownload the .plist payload file for ESET Endpoint Antivirus for macOS. Create a configuration profile in
your MDM using the .plist payload.
If your device is managed by ESET PROTECT or ESET PROTECT CLOUD, you need to enable full disk access for
ESET Management Agent as well. Download the .plist payload file for ESET Management Agent.
oCreate a configuration profile using the following settings:
ESET Endpoint Antivirus
Identifier com.eset.eea.g2
Identifier Type bundleID
Code Requirement identifier "com.eset.eea.g2" and anchor apple generic and
certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and
certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */
and certificate leaf[subject.OU] = P8DQRXPVLP
App or Service SystemPolicyAllFiles
Access Allow
Identifier com.eset.endpoint
15
Identifier Type bundleID
Code Requirement identifier "com.eset.endpoint" and anchor apple generic and
certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and
certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */
and certificate leaf[subject.OU] = P8DQRXPVLP
App or Service SystemPolicyAllFiles
Access Allow
On macOS 12 Monterey and later
Identifier com.eset.app.Uninstaller
Identifier Type bundleID
Code Requirement identifier "com.eset.app.Uninstaller" and anchor apple generic
and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */
and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists
*/ and certificate leaf[subject.OU] = P8DQRXPVLP
App or Service SystemPolicyAllFiles
Access Allow
ESET Management Agent
Identifier com.eset.remoteadministrator.agent
Identifier Type bundleID
Code Requirement identifier "com.eset.remoteadministrator.agent" and anchor apple
generic and certificate 1[field.1.2.840.113635.100.6.2.6] /*
exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13]
/* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
App or Service SystemPolicyAllFiles
Access Allow
After allowing full disk access and system extensions remotely, in System Preferences > Security & Privacy,
these settings might appear disabled. If ESET Endpoint Antivirus for macOS does not display any warnings,
full disk access and system extensions are allowed, regardless of their status in System Preferences >
Security & Privacy.
Web and Email protection
To add Web and Email protection configuration to system settings remotely, perform one of the following actions
before the installation:
oDownload the .plist payload file. Create a configuration profile in your MDM using the .plist payload.
Your computer must be enrolled in the MDM server to deploy configuration profiles to those computers.
oTo create a configuration profile, create a VPN type configuration profile with the following settings:
VPN type VPN
Connection type Custom SSL
Identifier for the custom SSL VPN com.eset.network.manager
Server localhost
Provider Bundle Identifier com.eset.network
User authentication Certificate
16
Provider Type App-proxy
Provider Designated Requirement identifier "com.eset.network" and anchor apple generic and
certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and
certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and
certificate leaf[subject.OU] = P8DQRXPVLP
Enable VPN on Demand
On Demand Rules Configuration
XML
<array>
<dict>
<key>Action</key>
<string>Connect</string>
</dict>
</array>
Idle Timer Do not disconnect
Proxy Setup None
Web and Email protection configuration is removed after uninstalling ESET Endpoint Antivirus for macOS. If you
need to uninstall and install ESET Endpoint Antivirus for macOS, you need to deploy the Web and Email protection
configuration to the target computer after the uninstallation again.
Jamf pre-installation settings
In the Jamf main window, click Computers > Configuration profiles.
Web and Email protection
You must add the Web and Email protection configuration to system settings for Web and Email protection to
function. If the Web and Email protection configuration is missing after the ESET Endpoint Antivirus for macOS
installation, users will receive "ESET Endpoint Antivirus for macOS" Would Like to Filter Network Content.
Web Access Protection configuration is removed after uninstalling ESET Endpoint Antivirus for macOS. If
you need to uninstall and reinstall ESET Endpoint Antivirus for macOS, you must redeploy the Web and
Email protection configuration to the target computer.
In the General section, fill:
Name for example, ESET Web&Email Protection
Level Computer level
Distribution method usually: Install automatically
In the VPN section, fill:
VPN Type VPN
Connection type Custom SSL
Identifier com.eset.network.manager
server localhost
Provider Bundle Identifier com.eset.network
User Authentication Certificate
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65

ESET Endpoint Antivirus for macOS 7 Owner's manual

Category
Antivirus security software
Type
Owner's manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI