Endpoint Protector 5 JAMF Deployment User Manual EN
Endpoint Protector 5 JAMF Deployment User Manual EN
Endpoint Protector 5 JAMF Deployment User Manual EN
User Manual
I | Endpoint Protector | User Manual
Table of Contents
1. Introduction ............................................ 1
2. Deployment using Policies and Scripts ........ 6
3. Disclaimer .............................................. 9
1 | Endpoint Protector | User Manual
1. Introduction
Since the release of macOS 11.0 changes have been made in regard to system
extensions and now it is allowed for endpoint security solutions to function
without requiring kernel-level access.
This affects the deployment of the Endpoint Protector Client on all Macs using
11.0 or later.
Companies can use third party deployment tools such as JAMF and others. For
those using JAMF in particular, the steps are as followed:
3. Under the Private Preferences Policy Control tab, press the Configure
button
5. For Deep Packet Inspection extra steps are needed, otherwise assign a
scope, and wait for the Private Preferences Policy Control to be deployed.
After the Configuration Profile has been successfully deployed, you can proceed
to the Endpoint Protector Client Deployment described in the following chapter.
6 | Endpoint Protector | User Manual
Follow the steps described below to deploy the Endpoint Protector Client using
JAMF policies:
1. With your prefer text editor, open the epp_change_ip.sh script, received
from Endpoint Protector
Information
If additional branding is required, the EPP_SERVER_PORT and
EPP_DEPARTMET CODE can also be changed.
Note
Some text editors might change the formatting (e.g.: replacing
commas “”, etc.). Make sure these are not altered. One way would be
to use the Terminal Editor as the text editor.
6. Create a new policy, add a name and make sure Recurring check-in is
checked
8 | Endpoint Protector | User Manual
10. Check that the Endpoint Protector Client has been deployed correctly and
the Server-Client communication and policies work as expected. This
means the endpoint appears in the List of Computes within the Endpoint
Protector UI and that the Endpoint Protector Client is displayed in the
menu bar.
9 | Endpoint Protector | User Manual
3. Disclaimer
Endpoint Protector does not contain malware software and does not send at any
time any of your private information (if Automatic Live Update Reporting is
DISABLED).
Each Endpoint Protector Server has the default SSH Protocol (22) open for
Support Interventions and there is one (1) System Account enabled (epproot)
protected with a password. The SSH Service can be disabled at customers’
request.