Jamf pre-installation settings
To enable all necessary pre-installation settings download the .plist payload file for ESET Endpoint Security version 8, and use it to create a configuration profile in your MDM. If you disable program components via component installation, you should also remove these components from your MDM configuration profiles.
Setting configuration profiles for ESET Endpoint Security manually
In the Jamf main window, click Computers > Configuration profiles.
Web and Email protection
You must add the Web and Email protection configuration to system settings for Web and Email protection to function. If the Web and Email protection configuration is missing after the ESET Endpoint Security installation, users will receive "ESET Endpoint Security" Would Like to Filter Network Content.
Web Access Protection configuration is removed after uninstalling ESET Endpoint Security. If you need to uninstall and reinstall ESET Endpoint Security, you must redeploy the Web and Email protection configuration to the target computer. |
In the General section, fill:
Name |
for example, ESET Web&Email Protection |
Level |
Computer level |
Distribution method |
usually: Install automatically |
In the VPN section, fill:
VPN Type |
VPN |
Connection type |
Custom SSL |
Identifier |
com.eset.network.manager |
server |
localhost |
Provider Bundle Identifier |
com.eset.network |
User Authentication |
Certificate |
Provider Type |
App-proxy |
Provider Designated Requirement |
identifier "com.eset.network" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
Identity Certificate |
None |
Idle Timer |
Do not disconnect |
Proxy Setup |
None |
Enable ESET system extensions
In the General section, fill:
Name |
for example, ESET SEXT |
Level |
Computer level |
Distribution method |
usually, Install automatically |
In the System Extensions section, fill:
Display Name |
for example, ESET SEXT |
System Extension Types |
Allowed System Extensions |
Team Identifier |
P8DQRXPVLP |
Allowed System Extensions |
com.eset.endpoint |
Enable full disk access
In the General section, fill:
Name |
for example, ESET Full disk access |
Level |
Computer level |
Distribution method |
usually, Install automatically |
In the Privacy Preferences Policy Control section, fill:
Identifier |
com.eset.endpoint |
Identifier Type |
bundle ID |
Code Requirement |
identifier "com.eset.endpoint" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
App or Service |
SystemPolicyAllFiles |
Access |
Allow |
Identifier |
com.eset.ees.g2 |
Identifier Type |
bundle ID |
Code Requirement |
identifier "com.eset.ees.g2" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
App or Service |
SystemPolicyAllFiles |
Access |
Allow |
Identifier |
com.eset.network |
Identifier Type |
bundle ID |
Code Requirement |
identifier "com.eset.network" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
App or Service |
SystemPolicyAllFiles |
Access |
Allow |
Identifier |
com.eset.firewall |
Identifier Type |
bundle ID |
Code Requirement |
identifier "com.eset.firewall" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
App or Service |
SystemPolicyAllFiles |
Access |
Allow |
Identifier |
com.eset.app.Uninstaller |
Identifier Type |
bundle ID |
Code Requirement |
identifier "com.eset.app.Uninstaller" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |
App or Service |
SystemPolicyAllFiles |
Access |
Allow |
After allowing full disk access and system extensions remotely, in System Settings > Privacy & Security, these settings might appear disabled. If ESET Endpoint Security does not display any warnings, full disk access and system extensions are allowed, regardless of their status in System Settings > Privacy & Security. |
Firewall
To add firewall configuration to system settings remotely, create a content filter configuration profile for the firewall before the installation/upgrade. Use the following settings:
Identifier |
com.eset.firewall.manager |
Filter order |
Firewall |
Socket filter |
com.eset.firewall |
Socket filter designated requirement |
identifier "com.eset.firewall" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP |