Posted on 06-17-2019 07:56 AM
I just found this...
"In order to prevent attackers enabling FileVault with a secret key via fdesetup, a possible avenue for a ransomware attack, Apple have introduced a new prompt that requires user approval before FileVault can be used to encrypt the drive programmatically."
From...
https://www.sentinelone.com/blog/7-big-security-surprises-coming-to-macos-10-15-catalina/
And in my testing I am see the prompt twice.. once when fdesetup is set to defer and once when the user enables.
C
Posted on 06-17-2019 12:44 PM
I haven't reviewed these new security features in Catalina, but the prompt in the screenshot looks very much like PPPC. If that's the case, Jamf Pro will likely include those new security settings in its PPPC Configuration Profile payload for the release or Catalina.
Posted on 06-17-2019 12:57 PM
There's not a lot you can do these days that doesn't involve a user having to say yes. They might as well just remove MDM/enterprise features and just let people do what they want.
Posted on 06-17-2019 12:57 PM
There's not a lot you can do these days that doesn't involve a user having to say yes. They might as well just remove MDM/enterprise features and just let people do what they want.
Posted on 06-17-2019 01:28 PM
Hmm i read here and there that profile based enablement of FV not will be affected, but the FDESETUP through CLI will not accept blank password/username anymore, or in some way like that.
Posted on 06-17-2019 01:40 PM
@txhaflaire I thought that was the case already with Mojave anyway. It's certainly what I've seen if you want to apply a securetoken to a new or existing user via the cmd (if you don't know the user's password).
Posted on 06-17-2019 01:41 PM
@allanp81 I'm taking the optimistic view like @talkingmoose and expect we'll have a way to approve it via Configuration Profile. If not, there are ways to "encourage" your users to approve the things required to make a Mac meet your compliance requirements with scaling levels of subtlety.
Posted on 06-17-2019 04:10 PM
In my testing and in what I have read. Using a profile still use fdesetup and there is no workaround. I think our security team and onsite teams would laugh me out of the room if I suggested that deploying machines unencrypted and then "encouraging" users to encrypt later. In fact, we auto wipe our machines if the FV key isn't reported back to Jamf after enrollment.
C
Posted on 06-18-2019 03:15 AM
From what I've seen, using a profile does not trigger the prompt.
Posted on 06-18-2019 05:57 AM
Posted on 06-18-2019 06:15 AM
19A471t, haven't tried the latest one yet
Posted on 06-18-2019 06:23 AM
Posted on 06-18-2019 06:30 AM
Maybe you still have an FV deferral active on your testbox that was created by fdesetup before you applied the profile?
Try
sudo fdesetup disable
and re-apply the profile?
Posted on 07-24-2019 10:00 AM
I pulled the policy that was setting the FV on and I'm only relying on the Config Profile. The problem I have now is, at logout, it requires the user to put in their password before FV is enabled. The user can hit cancel and FV will be off.
So I finally typed my password and now the screen just is blank, which I'm assuming is the FV encrypting the drive. Users will not find this beneffical and force a hard boot.
Posted on 08-12-2019 09:48 AM
The current beta resolved my issue..
Posted on 08-12-2019 10:41 AM
@gachowski With a profile it works now? please describe :)
Posted on 08-12-2019 03:12 PM
@gachowski - I'm in the beta as well...just getting rolling. Are you just using the simple built-in for FV testing here?
Posted on 08-14-2019 11:44 AM
Yep, I test both the profile and the built-in policy and both worked that said I have been out since the after it was released so I don't have the best memory ... working on a different issue today but hopefully, I can get back to test FV tomorrow.
C
Posted on 08-14-2019 12:28 PM
Unfortunately for me, working with non-IT managers, they still want us sitting with the users while going through the DEP process. Kinda defeats the purpose of DEP but clicking through login prompts is easy.
Posted on 08-14-2019 07:35 PM
tested a clean install of beta 5 today in a VM. Did not prompt for FV2 and it applied like it should for me
Posted on 09-30-2019 11:50 AM
@tlarkin , I have a script that I use to fix the Secure Tokens for our IT-Admin type account and it ATTEMPTS to activate FV, but it never succeeded in being zero touch in Catalina OR Mojave--the user would get caught by our configuration profile fall-back where they have to input their password on the first restart.
This, although annoying, worked okay for Mojave, but while the profile fires on Catalina for me, and I put in my password, the drive doesn't actually encrypt, so now none of my methods are working.
Would you mind sharing the script/method you're using to enable FV2 for Catalina (and earlier) via Profile? I would greatly appreciate it!
Posted on 09-30-2019 12:31 PM
I am just using the config profile to force FV2 to be enabled and enforced at next boot. That is it. Then in my DEP Notify workflow the last thing I do is apply all OS and security patches and force a reboot. User reboots, logs in and is prompted to enable FV2. That is all I am doing.
Posted on 11-18-2019 01:18 PM
I'm seeing the same behaviour as @Chris, using a profile prompts users in the same way it always has - Ask for password once.