
The file is included in the Attachment section of this article. You can also download and import the profile configuration file. The McAfee kernel extensions have to be added in the Kernel Extension Policy payload, to load without end-user user consent.įor more information, see the following Apple articles:īelow are the details for use in the Kernel Extension Policy payload: Starting with macOS 10.13.4, enrolling in MDM doesn’t automatically disable SKEL. In this case, end-user consent isn’t needed to enable the ENSM Threat Prevention - on-access scan, Firewall, and Self-Protection features. Standalone installation and ePO deployment on macOS High Sierra and later with an MDM profileĮnrollment in MDM automatically disables SKEL with macOS 10.13.3 and earlier.

NOTE: These systems now have a compliance status of "Compliant" for on-access scan, Firewall, and Self-Protection. They can be used to identify systems where the user hasn’t yet provided consent. ePO administrators can use the canned queries for on-access scan, Firewall, and Self-Protection compliance that ship with the ENS Extensions.These systems have a compliance status of "Non-compliant" for on-access scan, Firewall, and Self-Protection until the user gives consent.The McAfee Alert appears every 30 minutes, until the user provides consent.The end user sees a McAfee Alert that prompts whether to allow the McAfee kernel extensions from the Security & Privacy System Preferences pane.ENSM tries to automatically load the McAfee kernel extensions about 10 minutes after the deployment.They’re disabled even if the ePO policy is set to enable them.

