I'm trying to make a configuration profile to whitelist the Windows Auto Updater (for office 2016) so it can run against a script to check for and install/apply updates without user interaction and something keeps getting snagged in all my test runs. I can see it has something to do with com.apple.security.automation.apple-events and com.microsoft.autoupdate.fba but I cannot for the life of me figure out how to approve it. I've tried both doing it manually through the Jamf GUI and with PPPC and still can't seem to get it. Do I need to allow something with com.apple.TCC:access first, or am I just not identifying something correctly? There was a com.microsoft.autoupdate.cli that was getting flagged but I was able to get that one working and replicating the steps didn't help for the .fba
Log:
2019-03-29 13:02:26.544600-0400 0x761f Error 0x0 237 0 tccd: [com.apple.TCC:access] Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for ACC:{ID: com.microsoft.autoupdate.fba, PID[7418], auid: 501, euid: 501, binary path: '/Library/Application Support/Microsoft/MAU2.0/Microsoft AutoUpdate.app/Contents/MacOS/Microsoft AU Daemon.app/Contents/MacOS/Microsoft AU Daemon'}, REQ:{ID: com.apple.appleeventsd, PID[35], auid: 55, euid: 55, binary path: '/System/Library/CoreServices/appleeventsd'}
2019-03-29 13:08:06.123945-0400 0x99ee Error 0xc032 1409 0 tccd: [com.apple.TCC:access] Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for ACC:{ID: com.microsoft.autoupdate.fba, PID[11022], auid: 501, euid: 501, binary path: '/Library/Application Support/Microsoft/MAU2.0/Microsoft AutoUpdate.app/Contents/MacOS/Microsoft AU Daemon.app/Contents/MacOS/Microsoft AU Daemon'}, REQ:{ID: com.microsoft.autoupdate.fba, PID[11022], auid: 501, euid: 501, binary path: '/Library/Application Support/Microsoft/MAU2.0/Microsoft AutoUpdate.app/Contents/MacOS/Microsoft AU Daemon.app/Contents/MacOS/Microsoft AU Daemon'}
2019-03-29 13:08:06.126015-0400 0x993b Error 0x0 237 0 tccd: [com.apple.TCC:access] Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for ACC:{ID: com.microsoft.autoupdate.fba, PID[11022], auid: 501, euid: 501, binary path: '/Library/Application Support/Microsoft/MAU2.0/Microsoft AutoUpdate.app/Contents/MacOS/Microsoft AU Daemon.app/Contents/MacOS/Microsoft AU Daemon'}, REQ:{ID: com.apple.appleeventsd, PID[35], auid: 55, euid: 55, binary path: '/System/Library/CoreServices/appleeventsd'}
2019-03-29 13:08:06.138572-0400 0x99ee Default 0xc032 1409 0 tccd: [com.apple.TCC:access] Prompting for access to indirect object Microsoft AutoUpdate by Terminal
EDIT UPDATE: I figured out what I was missing, I needed to allow 4 different applications/executables access to one another as well as giving terminal access to all 4 of them and vice verse. There is the regular Microsoft AutoUpdate.app found in /Library/Application Support/Microsoft/MAU2.0/
Then there is Microsoft AU Daemon.app, Microsoft AutoUpdate.exe, and msupdate.exe all located at /Library/Application Support/Microsoft/MAU2.0/Contents/macOS
All 4 are given full disk access and accessibility(this may be unnecessary, I'm going to run another test later without accessibility access to see if it's required) and access to System Events and SystemUIServer.