How to deploy ESET Endpoint products on Macs using Hexnode UEM?Solved

Participant
Discussion
2 days ago

Hello,

Thanks for the deployment walkthrough on Windows devices. It was really insightful. Our teams were wondering if you could help us with the macOS deployment too.

Thanks in advance.

Replies (1)

Marked SolutionPending Review
Hexnode Expert
1 day ago
Marked SolutionPending Review

Hello,

Thank you for reaching out to Hexnode Connect. I’ll walk you through the steps of deploying ESET Endpoint products via Hexnode.

Before proceeding, ensure your macOS device is enrolled in Hexnode UEM and that you have a valid ESET account with the required subscription.

Steps to deploy ESET Endpoint products on macOS

Custom installation script for ESET applications

The following script installs the ESET Endpoint Antivirus or the ESET Endpoint Security application on the Mac. The following arguments can be passed for installation to work.

  • Argument 1 (Required): Type EES (if you are installing ESET Endpoint Security) or EEA (if you are installing ESET Endpoint Antivirus).
  • Argument 2 (Optional): Specify the 20-digit alphanumerical license key in the format “XXXX-XXXX-XXXX-XXXX”.
  • Argument 3 (Optional): Specify HTTP Proxy in the format: http://10.1.0.100:3425.

There are two methods to pass the argument to the script:

  1. Update the script by replacing the placeholder variables Prod=””, KEY=””, and eraa_http_proxy_value=”” with the appropriate values provided above. Ensure the values are entered in the same order and format as used in the script.
  2. Under the Execute Custom Script action, enter the three arguments (in the same order mentioned above) separated by a space in the Arguments section.

Deploy the following installation script to macOS devices using the Execute Custom Script remote action:

A few note points to remember:

  1. For the devices running on Apple silicon chipsets, Rosetta 2 should be installed on the device for the script to execute successfully.
  2. Ensure there are no other installation policies assigned to the devices for earlier versions of ESET security solutions.
  3. ESET applications deployed via the required apps policy may return ‘error 1001,’ as these applications require installation scripts for successful installation. These scripts cannot be deployed via the required apps policy.

Additional app configurations

Upon successful installation, you need to configure System Extensions, Kernel Extensions and PPPC settings for the ESET security solutions to function properly on the devices. Kernel Extensions must be configured only if your device runs on macOS 10.14 and below. Follow the below steps for deploying the ESET security products:

  1. Navigate to Policies > Device Policies > New Policies. Select to create a New policy, choose macOS, and click Next.
  2. Choose the policy type as Enterprise and click Next.
  3. Give a Policy Name and Description (optional) of your preference.
  4. To configure System Extensions,
    1. Select System Extensions from the left menu and click on Configure.
    2. Under Systems Extensions, enter the Team Identifier P8DQRXPVLP, provide the following bundle identifiers, “com.eset.endpoint, com.eset.network, com.eset.firewall, com.eset.devices” and click on Add.
  5. To configure Kernel Extensions,
    1. Select Kernel Extensions from the left menu and click on Configure.
    2. Under Team Identifier, enter P8DQRXPVLP as the Team ID and click on Add.
  6. To configure PPPC,
    1. Select Privacy Preferences from the left menu and click on Configure.
    2. Select +Add new preferences.
    3. Set the All Files option to Allow.
    4. Click on Specify Bundle IDs/Path.
  7. Full Disk Access needs to be given for the following components:
    1. ESET Endpoint Antivirus-
      Title Identifier Identifier Type Code Requirement
      Main Product Identifier EEA com.eset.eea.6 Bundle ID identifier “com.eset.eea.6” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
      Device Identifier com.eset.devices Bundle ID identifier “com.eset.devices” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
      Realtime Identifier com.eset.endpoint Bundle ID identifier “com.eset.endpoint” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
    2. ESET Endpoint Security-
      Title Identifier Identifier Type Code Requirement
      Main product identifier EES com.eset.ees.6 Bundle ID identifier “com.eset.ees.6” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
      Device Identifier com.eset.devices Bundle ID identifier “com.eset.devices” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
      Realtime Identifier com.eset.endpoint Bundle ID identifier “com.eset.endpoint” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = P8DQRXPVLP
  8. Additionally, you can configure VPN and firewall settings based on your requirements through Hexnode UEM for added security.
  9. To associate the policy with your devices, navigate to Policy Targets, select all your required devices, and click on Save.

License the Product using Custom Scripting

If the license key is not mentioned in the script, use the following script to activate the product on the device. Replace YOUR_LICENSE_KEY in the script with your 20-digit alphanumeric license key and execute this script using either the Execute Custom Script remote action or the Live Terminal.

  1. ESET Endpoint Antivirus:

    sudo /Applications/ESET\ Endpoint\ Antivirus.app/Contents/MacOS/esets_daemon --wait-respond --activate "key=YOUR_LICENSE_KEY"

  2. ESET Endpoint Security:

    sudo /Applications/ESET\ Endpoint\ Security.app/Contents/MacOS/esets_daemon --wait-respond --activate "key=YOUR_LICENSE_KEY"

After executing the command, the ESET product will be activated using the provided license key.

Steps to be completed from the device

Upon successful execution of the custom installation script, the chosen application in the argument will be downloaded and installed.

After successfully activating the product, the device may require additional setup steps, such as installing necessary modules or prompting network content filtering permissions, to finalize the activation process. Once the setup is complete, you can verify successful activation by opening the application.

ESET app interface representing successful deployment of ESET Endpoint products on macOS device

Uninstalling ESET applications (optional)

To uninstall ESET applications:

  1. Log in to the ESET business portal.
  2. Click on Activated devices in the left panel to see the list of devices with ESET products activated using your licenses.
  3. Select the devices you want to uninstall ESET applications from by clicking on the corresponding checkboxes.
  4. Click DEACTIVATE at the bottom of the screen. A warning will appear to confirm the action; click DEACTIVATE again.
  5. The ESET product is now deactivated on the respective devices. Execute the following scripts to remotely uninstall ESET products on macOS devices. These scripts can be executed using either the Execute Custom Script remote action or the Live Terminal.
    1. ESET Endpoint Antivirus:

      sudo /Applications/ESET\ Endpoint\ Antivirus.app/Contents/Helpers/Uninstaller.app/Contents/Scripts/uninstall.sh

    2. ESET Endpoint Security

      sudo /Applications/ESET\ Endpoint\ Security.app/Contents/Helpers/Uninstaller.app/Contents/Scripts/uninstall.sh

The ESET products will be uninstalled successfully.

I hope this helps. If you have any queries, feel free to reach out; we’d be happy to help.

Best regards,
George
Hexnode UEM

Save