-
MAC Agent Computer Group CreationMAC computers will need to be installed into a separate computer group. To create a computer group for your MAC(s), in the ThreatLocker Portal, navigate to the Computer Groups page. Click the 'New Computer Group' button at the top of the page. Input a name for the new group. In the Computer Group Type section, select 'MAC' from the dropdown menu. The remainder of the settings can be left at their default selections.
-
MAC Agent InstallationDownload the ThreatLocker MAC Agent here: https://beta.threatlocker.com/ThreatLockerMAC.zip Alternatively, you can download the DMG Installer from the ThreatLocker Portal. You will first need to create a Computer Group for Macs as outlined here: MAC Agent Computer Group Creation | ThreatLocker Help Center (kb.help) . Navigate to the Computers Page. Click the 'Install New Computer' button and the DMG Installer will be located in the RMM and Script Deployment window.
-
MAC Agent Group Key LocationGroup Key (InstallKey) Location Before installation, you will need to retrieve your Group Key from the ThreatLocker Portal. Please note: This is NOT the same as the Unique Identifier that is found on the Computers Page > Install New Computers window. First, you need to create a separate Computer Group for your MAC computers. For instructions on how to create a separate group see the associated articlehttps://threatlocker.kb.help/mac-agent-computer-group-creation. Navigate to the Computer Groups Page.
-
Mac Agent Beta TestingDownload the ThreatLocker MAC Agent here: https://beta.threatlocker.com/ThreatLockerMAC.zip Important: ThreatLocker Access for Cyber Heroes must be set to Read Only for organizations that are participating in the Mac Agent beta testing. Minimum Requirements Operating System - macOS 11 Big Sur. 11.5.2 specifically has been tested and proven to work Functionality Currently, the Mac Agent will log all files executing on the endpoint in the ThreatLocker Portal's Unified Audit page.
-
Uninstalling the ThreatLocker MAC AgentClick on the ThreatLocker icon in the tray. Select 'Quit'. Drag the ThreatLocker App icon from the Applications folder into the bin. You will receive a message informing you that the ThreatLocker app is hosting system extensions. Click 'Continue' on the popup. If prompted, input your username and password and click 'OK'. You need to ensure that all baseline remnants have been removed. Open Terminal by clicking the icon located at the bottom of the screen.
-
Mac Applications on Approval Request PageIn the Matching Applications section, when Add the file(s) to an existing application definition is selected, Mac App will now appear as a selectable option within the Existing Application dropdown box.
-
Mac Application Policies: Option to RequestWhen configuring Mac policies, you can enable the ability for users to submit a request when they are denied from performing a particular action. This option can be toggled On or Off by selecting the Yes or No radio buttons (respectively) found below "Do you want to allow the User to request access?