@ssrai20 Jamf Pro does not have any built-in capabilities for restricting downloads. You could use it to install a tool if you find, or write, one to do that, but it's not going to do it by itself.
To prevent common Malwares I'm using a combination of EA, Smart Group and Script.
For example Mackeeper :
The EA :
#!/bin/bash
###############
# Variables #
###############
user=`ls -la /dev/console | cut -d " " -f 4`
result=()
filesFound=0
suspiciousFiles=(
"/Applications/MacKeeper.app"
"/Applications/JustCloud.app"
"/Library/Preferences/.3FAD0F65-FC6E-4889-B975-B96CBF807B78"
"/private/var/folders/mh/yprf0vxs3mx_n2lg3tjgqddm0000gn/T/MacKeeper*"
"/private/tmp/MacKeeper*"
"/Users/$user/Library/Application Support/MacKeeper Helper"
"/Users/$user/Library/LaunchAgents/com.zeobit.MacKeeper.Helper.plist"
"/Users/$user/Library/LaunchAgents/com.jdibackup.JustCloud.autostart.plist"
"/Library/LaunchAgents/com.jdibackup.JustCloud.notify.plist"
"/Users/$user/Library/Logs/JustCloud"
"/Users/$user/Library/Logs/MacKeeper.log"
"/Users/$user/Library/Logs/MacKeeper.log.signed"
"/Users/$user/Library/Logs/SparkleUpdateLog.log"
"/Users/$user/Library/Preferences/.3246584E-0CF8-4153-835D-C7D952862F9D"
"/Users/$user/Library/Preferences/com.zeobit.MacKeeper.Helper.plist"
"/Users/$user/Library/Preferences/com.zeobit.MacKeeper.plist"
"/Users/$user/Library/Saved Application State/com.zeobit.MacKeeper.savedState"
"/Users/$user/Downloads/MacKeeper*"
"/Users/$user/Documents/MacKeeper*Library/Application Support/MacKeeper Helper"
"/Users/$user/Library/LaunchAgents/com.zeobit.MacKeeper.Helper.plist"
"/Users/$user/Library/LaunchAgents/com.jdibackup.JustCloud.autostart.plist"
"/Users/$user/Library/LaunchAgents/com.jdibackup.JustCloud.notify.plist"
"/Users/$user/Library/Logs/JustCloud"
"/Users/$user/Library/Logs/MacKeeper.log"
"/Users/$user/Library/Logs/MacKeeper.log.signed"
"/Users/$user/Library/Logs/SparkleUpdateLog.log"
"/Users/$user/Library/Preferences/.3246584E-0CF8-4153-835D-C7D952862F9D"
"/Users/$user/Library/Preferences/com.zeobit.MacKeeper.Helper.plist"
"/Users/$user/Library/Preferences/com.zeobit.MacKeeper.plist"
"/Users/$user/Library/Saved Application State/com.zeobit.MacKeeper.savedState"
"/Users/$user/Downloads/MacKeeper*"
"/Users/$user/Documents/MacKeeper*"
)
###############
# Script #
###############
for suspiciousFile in "${suspiciousFiles[@]}"; do
echo "Looking for $suspiciousFile"
if [ -e "$suspiciousFile" ]; then
filesFound=$(expr $filesFound + 1)
result+=("$suspiciousFile")
fi
done
if [ $filesFound -ne 0 ]; then
echo "<result>"Yes: "${result[@]}</result>"
else
echo "<result>No</result>"
fi
exit
A smart group is populated with "YES" and then a script to remove then is executed.
Following that blog here to list the files :
https://applehelpwriter.com/2018/08/02/latest-mackeeper-file-paths/
JAMFs products all operate on the device level. EDR clients are responsive by nature, to prevent the file from getting to the device you need a network security tool. A network security tool can inspect traffic in flight, and quarantine traffic with malicious or undesired content.