Posted on 10-25-2021 01:17 PM
I wanted to block our users from installing Monterey until we get a chance to test it in our environment.
So I downloaded and launched the installer, then opened Activity Monitor to get the process name.
The installer showed up as:
Install macOS Monterey
But when I tried blocking that process (with Restrict exact process name checked), it didn't work.
On a hunch I changed it to this:
Install macOS Monterey.app
That worked.
I'm not sure why this is the case, because there's definitely no .app in the process name.
Solved! Go to Solution.
Posted on 10-28-2021 09:47 AM
I also have users upgrading from Mojave/Catalina to Big Sur. Restricting InstallAssistant prevents the user from launching Install macOS Big Sur.app but doesn't stop startOSinstall.
To perform the upgrades we run a policy in Self Service using this macOSUpgrade script. Users can only upgrade via this method or via Terminal. Works great and allows us to build in clean up scripts to the policy to run before the upgrade kicks off.
Posted on 10-25-2021 01:55 PM
Good call out. Just an FYI, this is noted on the Restricted Software page:
Posted on 10-25-2021 04:18 PM
Restricting "InstallAssistant" works quite well with all versions of installers. This prevents any user from running the Install macOS xxx application. However you can still call the startOSinstall command via Terminal.
Posted on 10-27-2021 05:04 PM
Domo Arigato, @MrRoboto . In my environment, users are admins and are allowed to install approved updates. I still have users running Mojave and Catalina, and I want them to update to Big Sur, but not Monterey (yet). So blocking InstallAssistant won't work for me.
Posted on 10-28-2021 09:47 AM
I also have users upgrading from Mojave/Catalina to Big Sur. Restricting InstallAssistant prevents the user from launching Install macOS Big Sur.app but doesn't stop startOSinstall.
To perform the upgrades we run a policy in Self Service using this macOSUpgrade script. Users can only upgrade via this method or via Terminal. Works great and allows us to build in clean up scripts to the policy to run before the upgrade kicks off.