Need some assistance with ESET EA plists for Full Disk access

n123
New Contributor

Based on the downloadable .plist for Full Disk Access from https://help.eset.com/eea_mac/7/en-US/install_remote_pre-installation.html

The issue that I can't upload them to jamf as it has 4 different Preference Domain inside. So I'd like to split it between 4 preferences domains:

com.eset.app.Uninstaller; com.eset.devices; com.eset.eea.g2; com.eset.endpoint

But looks like I'm making syntax mistakes and can find them.

Tried with the example from https://developer.apple.com/documentation/devicemanagement/privacypreferencespolicycontrol

So my plists are almost the same, the difference if only in Identifier value and CodeRequirement value took from the shared plist:

 

 

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN" “http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
    <key>PayloadContent</key>
    <array>
        <dict>
            <key>Services</key>
            <dict>
                <key>SystemPolicyAllFiles</key>
                <array>
                    <dict>
                        <key>Identifier</key>
                        <string>com.eset.eea.g2</string>
                        <key>IdentifierType</key>
                        <string>bundleID</string>
                        <key>CodeRequirement</key>
                        <string>identifier "com.eset.eea.g2" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP</string>
                        <key>Allowed</key>
                        <true/>
                        <key>Comment</key>
                        <string>Allows ESET to scan all files for potential threats</string>
                    </dict>
                </array>
            </dict>
        </dict>
    </array>
</dict>
</plist>

 

 

 

2 REPLIES 2

AJPinto
Honored Contributor II

JAMF could do fine with uploading the .mobileconfig from the vendor. Multiply payloads dont mess JAMF up unless .mobileconfig has a payload JAMF does not support, then you can usually just sign the .mobileconfig so JAMF does not screw with it.

 

Your XML is missing a few things. It would probably be easier to do this in JAMF. You can make full disk access configuration profiles in JAMF's console, its the Privacy Preferences Policy Control payload. If you want to upload a .mobileconfig, you can use a tool like iMazing Profile Editor or ProfileCreator to make the config profile with a GUI. ProfileCreator lets you view the XML in app.

 

This is an example of full disk access for an application called ForcePoint to give you an idea of what it would look like.

JAMF

AJPinto_0-1687351739524.png

ProfileCreator

AJPinto_3-1687352151759.png

AJPinto_1-1687352119226.png

 

iMazing Profile Editor

AJPinto_2-1687352136212.png

 

n123
New Contributor

Thanks!

It works as expected when I create configuration profile via jamf pro payloads.

The issue is that I need a plist upload, because the goal is to add a custom HIP check to Global Protect.

GP can only validate custom checks for macos with plists.

As I got it, you can't get a plist from a conf profiles configured with payloads.

And when I try to upload conf profiles as plists with either eset's or some apple's Preference Domains it doesn't work as expected: ESET AV doesn't receive Full Disk Access.