This article describes the steps to configure permissions for macOSlevel that required each 3rd party vendor's System extension to be approved. This required Team ID to be allowed, also known as the Apple Developer ID.
In case, ManageEngine MDM is used, Below mentioned Permission will be deployed to macOS machines Automatically. Follow below steps if Other MDM Vendor is used.
Permissions can be provided through MDM Privacy Preferences Policy Control (PPPC) profile. Permissions that will be granted are Full disk access, Accessibility, and Screen capture.
| Identifier | com.manageengine.protectord |
|---|---|
| Code sign requirement | anchor apple generic and identifier "com.manageengine.protectord" and certificate leaf[subject.OU] = TZ824L8Y37 |
| Static code validation | No |
| Allowed Permissions | System Policy All Files |
| Other Permissions | User controlled |
| Identifier | dcagentservice |
|---|---|
| Code sign requirement | identifier dcagentservice and anchor apple generic and certificate leaf[subject.OU] = TZ824L8Y37 |
| Static code validation | No |
| Allowed Permissions | System Policy All Files |
| Other Permissions | User controlled |
Apps for Apple Events
| # | Identifier | Code Requirement |
|---|---|---|
| 1 | com.apple.systemevents | identifier "com.apple.systemevents" and anchor apple |
| 2 | com.apple.systemuiserver | identifier "com.apple.systemuiserver" and anchor apple |
| 3 | com.apple.finder | identifier "com.apple.finder" and anchor apple |
| 4 | com.apple.installer | identifier "com.apple.installer" and anchor apple |
| Identifier | com.zoho.assist.ManageEngineRemoteAccess |
|---|---|
| Code sign requirement | identifier "com.zoho.assist.ManageEngineRemoteAccess" and anchor apple generic and certificate leaf[subject.OU] = TZ824L8Y37 |
| Static code validation | No |
| Allowed Permissions | Accessibility, screen capture |
| Other Permissions | User controlled |
If the above steps is not helpful, kindly follow steps in this link for providing permission for Remote access.
| Identifier | com.manageengine.protectord |
|---|---|
| Code sign requirement | anchor apple generic and identifier "com.manageengine.appctrl.driver" and certificate leaf[subject.OU] = TZ824L8Y37 |
| Static code validation | No |
| Allowed Permissions | System Policy All Files |
| Other Permissions | User controlled |
System Extensions can be allowed through MDM System Extension profile.
| Team Identifier | TZ824L8Y37 |
|---|---|
| Allowed Extension Categories | Security extensions |
| Extension bundle identifier(s) | com.manageengine.protectord |
| Team Identifier | TZ824L8Y37 |
|---|---|
| Allowed Extension Categories | Security extensions |
| Extension bundle identifier(s) | com.manageengine.appctrl.driver |
Admins can restrict users from disabling the apps running background items on the macOS machine. Team Identifier of the app to be restricted from disabling = TZ824L8Y37