0
(0)

MDM profiles help you to set up the product on a large number of devices within your organization.

To create MDM profiles to deploy the product configuration to devices, follow these instructions:

    1. Generate MDM profiles for system preferences.

Use the following templates to create or extend your own MDM profiles.

Note: Replace all PayloadUUID and PayloadIdentifier values in templates with your own values. You can generate UUID with the uuidgen command-line tool, for example.

Allow all F-Secure kernel extensions

Note: Required on macOS 10.15.5 or earlier. For more information, see the Apple Developer documentation: https://developer.apple.com/documentation/devicemanagement/systemextensions

<?xml version=”1.0″ encoding=”UTF-8″?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>
<plist version=”1.0″>
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>AllowUserOverrides</key>
<true/>
<key>AllowedTeamIdentifiers</key>
<array>
<string>6KALSAFZJC</string>
</array>
<key>PayloadDescription</key>
<string>Allows F-Secure Kernel Extensions</string>
<key>PayloadDisplayName</key>
<string>F-Secure Kernel Extensions</string>
<key>PayloadIdentifier</key>
<string>com.apple.syspolicy.kernel-extension-policy.88C7AA59-0157-4267-B00B-E908A7D50123</string>
<key>PayloadType</key>
<string>com.apple.syspolicy.kernel-extension-policy</string>
<key>PayloadUUID</key>
<string>88C7AA59-0157-4267-B00B-E908A7D50123</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadOrganization</key>
<string>F-Secure Corporation</string>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>F-Secure CP and RDR Profile</string>
<key>PayloadIdentifier</key>
<string>SAMPLE.00000000-0000-0000-0000-000000000001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>00000000-0000-0000-0000-000000000001</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>

Allow all F-Secure system extensions

Note: Required on macOS 10.15.5 or later. For more information, see the Apple Developer documentation: https://developer.apple.com/documentation/devicemanagement/systempolicykernelextensions

<?xml version=”1.0″ encoding=”UTF-8″?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>
<plist version=”1.0″>
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>AllowUserOverrides</key>
<true/>
<key>AllowedTeamIdentifiers</key>
<array>
<string>6KALSAFZJC</string>
</array>
<key>PayloadDescription</key>
<string>Allows F-Secure System Extension</string>
<key>PayloadDisplayName</key>
<string>F-Secure System Extension</string>
<key>PayloadIdentifier</key>
<string>com.apple.system-extension-policy.B1E740C4-052A-4B64-AB54-2962327B6512</string>
<key>PayloadType</key>
<string>com.apple.system-extension-policy</string>
<key>PayloadUUID</key>
<string>B1E740C4-052A-4B64-AB54-2962327B6512</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadOrganization</key>
<string>F-Secure Corporation</string>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>F-Secure CP and RDR Profile</string>
<key>PayloadIdentifier</key>
<string>SAMPLE.00000000-0000-0000-0000-000000000001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>00000000-0000-0000-0000-000000000001</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>

Allow content filtering for F-Secure system extension

Note: Required on macOS 10.15.5 or later. For more information, see the Apple Developer documentation: https://developer.apple.com/documentation/devicemanagement/webcontentfilter

<?xml version=”1.0″ encoding=”UTF-8″?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>
<plist version=”1.0″>
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>UserDefinedName</key>
<string>F-Secure Firewall</string>
<key>PluginBundleID</key>
<string>com.f-secure.fsmac.gui</string>
<key>FilterDataProviderBundleIdentifier</key>
<string>com.f-secure.fsmac.gui.FSCSystemExtension</string>
<key>FilterDataProviderDesignatedRequirement</key>
<string>identifier “com.f-secure.fsmac.gui.FSCSystemExtension” and anchor apple generic and certificate leaf[subject.OU] = “6KALSAFZJC”</string>
<key>FilterSockets</key>
<true/>
<key>FilterPackets</key>
<false/>
<key>FilterBrowsers</key>
<false/>
<key>FilterType</key>
<string>Plugin</string>
<key>PayloadDescription</key>
<string>Allow F-Secure Firewall to filter network traffic</string>
<key>PayloadDisplayName</key>
<string>F-Secure Firewall</string>
<key>PayloadIdentifier</key>
<string>com.apple.webcontent-filter.9FF6DE99-59E2-47A1-8918-CE259D92E785</string>
<key>PayloadType</key>
<string>com.apple.webcontent-filter</string>
<key>PayloadUUID</key>
<string>9FF6DE99-59E2-47A1-8918-CE259D92E785</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadOrganization</key>
<string>F-Secure Corporation</string>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>F-Secure CP and RDR Profile</string>
<key>PayloadIdentifier</key>
<string>SAMPLE.00000000-0000-0000-0000-000000000001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>00000000-0000-0000-0000-000000000001</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>

Grant full disk access for F-Secure processes

Note: Required. For more information, see the Apple Developer documentation: https://developer.apple.com/documentation/devicemanagement/privacypreferencespolicycontrol/services

<?xml version=”1.0″ encoding=”UTF-8″?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>
<plist version=”1.0″>
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>PayloadDescription</key>
<string>Grant Full Disk Access to F-Secure processes</string>
<key>PayloadDisplayName</key>
<string>Grant Full Disk Access to F-Secure processes</string>
<key>PayloadIdentifier</key>
<string>com.apple.TCC.configuration-profile-policy.F8432F17-1ECD-420D-B3D0-2A35F0BB144E</string>
<key>PayloadUUID</key>
<string>F8432F17-1ECD-420D-B3D0-2A35F0BB144E</string>
<key>PayloadType</key>
<string>com.apple.TCC.configuration-profile-policy</string>
<key>PayloadOrganization</key>
<string>F-Secure Corporation</string>
<key>Services</key>
<dict>
<key>SystemPolicyAllFiles</key>
<array>
<dict>
<key>Identifier</key>
<string>com.f-secure.fsmac.gui</string>
<key>IdentifierType</key>
<string>bundleID</string>
<key>CodeRequirement</key>
<string>identifier “com.f-secure.fsmac.gui” and anchor apple generic and certificate leaf[subject.OU] = “6KALSAFZJC”</string>
<key>Allowed</key>
<true/>
<key>Comment</key>
<string>Grant Full Disk Access to F-Secure processes</string>
</dict>
<dict>
<key>Identifier</key>
<string>com.f-secure.fsmac.gui.FSCSystemExtension</string>
<key>IdentifierType</key>
<string>bundleID</string>
<key>CodeRequirement</key>
<string>identifier “com.f-secure.fsmac.gui.FSCSystemExtension” and anchor apple generic and certificate leaf[subject.OU] = “6KALSAFZJC”</string>
<key>Allowed</key>
<true/>
<key>Comment</key>
<string>Grant Full Disk Access to F-Secure System Extenison'</string>
</dict>
</array>
</dict>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>F-Secure CP and RDR Profile</string>
<key>PayloadIdentifier</key>
<string>SAMPLE.00000000-0000-0000-0000-000000000001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>00000000-0000-0000-0000-000000000001</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>

Allow user notifications for F-Secure processes

Note: Required. For more information, see the Apple Developer documentation: https://developer.apple.com/documentation/devicemanagement/notifications/notificationsettingsitem

<?xml version=”1.0″ encoding=”UTF-8″?>
<!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>
<plist version=”1.0″>
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>NotificationSettings</key>
<array>
<dict>
<key>AlertType</key>
<integer>2</integer>
<key>BadgesEnabled</key>
<true/>
<key>BundleIdentifier</key>
<string>com.f-secure.fsmac.gui</string>
<key>CriticalAlertEnabled</key>
<false/>
<key>NotificationsEnabled</key>
<true/>
<key>ShowInLockScreen</key>
<true/>
<key>ShowInNotificationCenter</key>
<true/>
<key>SoundsEnabled</key>
<true/>
</dict>
</array>
<key>PayloadEnabled</key>
<true/>
<key>PayloadDescription</key>
<string>Allow notifications for F-Secure products</string>
<key>PayloadDisplayName</key>
<string>Allow notifications for F-Secure products</string>
<key>PayloadIdentifier</key>
<string>com.apple.notificationsettings.A134E8B3-AE82-4AE9-8D39-F9976B5BEEE1</string>
<key>PayloadType</key>
<string>com.apple.notificationsettings</string>
<key>PayloadUUID</key>
<string>A134E8B3-AE82-4AE9-8D39-F9976B5BEEE1</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadOrganization</key>
<string>F-Secure Corporation</string>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>F-Secure CP and RDR Profile</string>
<key>PayloadIdentifier</key>
<string>SAMPLE.00000000-0000-0000-0000-000000000001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>00000000-0000-0000-0000-000000000001</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>

  1. Import the MDM profiles that you have created into your MDM service and use it to deploy the configuration to devices in the organization.

    Note: For more information, consult the documentation of your MDM service.

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 13 times, 1 visits today)