Advanced Installation For IT Administrators with MDM Solutions or DEP Enabled

If you already have an MDM solution (such as JAMF) or use Apple's DEP (Device Enrollment Program), please copy & paste the following payload into your profile for Flextivity approval:

 

Flextivity Profile For MDM:

<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">

<plist version="1.0">

<dict>

    <key>PayloadContent</key>

    <array>

        <dict>

                <key>PayloadUUID</key>

                <string>9B77518B-65E3-47D8-B75C-7567953C6466</string>

                <key>PayloadType</key>

                <string>com.apple.syspolicy.kernel-extension-policy</string>

                <key>PayloadOrganization</key>

                <string>Intego, Inc.</string>

                <key>PayloadIdentifier</key>

                <string>9B77518B-65E3-47D8-B75C-7567953C6466</string>

                <key>PayloadDisplayName</key>

                <string>Approved Kernel Extensions</string>

                <key>PayloadDescription</key>

                <string/>

                <key>PayloadVersion</key>

                <integer>1</integer>

                <key>PayloadEnabled</key>

                <true/>

                <key>AllowUserOverrides</key>

                <true/>

                <key>AllowedKernelExtensions</key>

                <dict>

                    <key>TCG22P5KE4</key>

                    <array>

                        <string>com.intego.netbarrier.kext.monitor</string>

                        <string>com.intego.netbarrier.kext.network</string>

                        <string>com.intego.netbarrier.kext.process</string>

                        <string>com.intego.Content-Control.extension</string>

                        <string>com.intego.Content-Control.safe-boot</string>

                        <string>com.intego.virusbarrier.kext.realtime</string>

                    </array>

                </dict>

            </dict>

 

        <dict>

            <key>PayloadDescription</key>

            <string>TCC Whitelist for Flextivity Components</string>

            <key>PayloadDisplayName</key>

            <string>TCC Whitelist for Flextivity</string>

            <key>PayloadIdentifier</key>

            <string>com.intego.flextivity.tccprofile.06502194-291C-11E9-AC95-A860B63A8F47</string>

            <key>PayloadOrganization</key>

            <string>Intego, Inc</string>

            <key>PayloadType</key>

            <string>com.apple.TCC.configuration-profile-policy</string>

            <key>PayloadUUID</key>

            <string>06502194-291C-11E9-AC95-A860B63A8F47</string>

            <key>PayloadVersion</key>

            <integer>1</integer>

            <key>Services</key>

            <dict>

                <key>AppleEvents</key>

                <array>

                    <dict>

                        <key>AEReceiverCodeRequirement</key>

                        <string>identifier "com.apple.Safari" and anchor apple</string>

                        <key>AEReceiverIdentifier</key>

                        <string>com.apple.Safari</string>

                        <key>AEReceiverIdentifierType</key>

                        <string>bundleID</string>

                        <key>Allowed</key>

                        <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.Content-Control.daemon" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow Intego Content Control Daemon to send AppleEvents control to Safari</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/ContentControl.bundle/Contents/MacOS/Intego Content Control Daemon.app/Contents/MacOS/Intego Content Control Daemon</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                    <dict>

                        <key>AEReceiverCodeRequirement</key>

                        <string>identifier "com.apple.Safari" and anchor apple</string>

                        <key>AEReceiverIdentifier</key>

                        <string>com.apple.Safari</string>

                        <key>AEReceiverIdentifierType</key>

                        <string>bundleID</string>

                        <key>Allowed</key>

                        <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.Content-Control.daemon.agent" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow Intego Content Control Agent to send AppleEvents control to Safari</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/ContentControl.bundle/Contents/MacOS/Intego Content Control Daemon.app/Contents/SharedSupport/Intego Content Control Agent.app/Contents/MacOS/Intego Content Control Agent</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                    <dict>

                        <key>AEReceiverCodeRequirement</key>

                        <string>(identifier "com.google.Chrome" or identifier "com.google.Chrome.beta" or identifier "com.google.Chrome.dev" or identifier "com.google.Chrome.canary") and certificate leaf = H"c9a99324ca3fcb23dbcc36bd5fd4f9753305130a"</string>

                        <key>AEReceiverIdentifier</key>

                        <string>com.google.Chrome</string>

                        <key>AEReceiverIdentifierType</key>

                        <string>bundleID</string>

                        <key>Allowed</key>

                        <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.Content-Control.daemon" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow Intego Content Control Daemon to send AppleEvents control to Google Chrome</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/ContentControl.bundle/Contents/MacOS/Intego Content Control Daemon.app/Contents/MacOS/Intego Content Control Daemon</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                    <dict>

                        <key>AEReceiverCodeRequirement</key>

                        <string>(identifier "com.google.Chrome" or identifier "com.google.Chrome.beta" or identifier "com.google.Chrome.dev" or identifier "com.google.Chrome.canary") and certificate leaf = H"c9a99324ca3fcb23dbcc36bd5fd4f9753305130a"</string>

                        <key>AEReceiverIdentifier</key>

                        <string>com.google.Chrome</string>

                        <key>AEReceiverIdentifierType</key>

                        <string>bundleID</string>

                        <key>Allowed</key>

                        <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.Content-Control.daemon.agent" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow Intego Content Control Agent to send AppleEvents control to Google Chrome</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/ContentControl.bundle/Contents/MacOS/Intego Content Control Daemon.app/Contents/SharedSupport/Intego Content Control Agent.app/Contents/MacOS/Intego Content Control Agent</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                </array>

                <key>SystemPolicyAllFiles</key>

                <array>

                    <dict>

                        <key>Allowed</key> <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.virusbarrier.daemon.realtime" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow SystemPolicyAllFiles control for Flextivity Antivirus.app</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/localui.bundle/Contents/MacOS/Flextivity Antivirus.app</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                    <dict>

                        <key>Allowed</key>

                        <true/>

                        <key>CodeRequirement</key>

                        <string>anchor apple generic and identifier "com.intego.antivirus.daemon.emlparser" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = TCG22P5KE4)</string>

                        <key>Comment</key>

                        <string>Allow SystemPolicyAllFiles control for AV helpers referenced in Intego Antivirus.app</string>

                        <key>Identifier</key>

                        <string>/Library/Intego/Intego Antivirus.app</string>

                        <key>IdentifierType</key>

                        <string>path</string>

                    </dict>

                </array>

            </dict>

        </dict>

    </array>

    <key>PayloadDescription</key>

    <string>TCC Whitelist for Flextivity Components</string>

    <key>PayloadDisplayName</key>

    <string>TCC Whitelist for Flextivity</string>

    <key>PayloadIdentifier</key>

    <string>com.intego.flextivity.tccprofile</string>

    <key>PayloadOrganization</key>

    <string>Intego, Inc</string>

    <key>PayloadRemovalDisallowed</key>

    <false/>

    <key>PayloadScope</key>

    <string>system</string>

    <key>PayloadType</key>

    <string>Configuration</string>

    <key>PayloadUUID</key>

    <string>0650254A-291C-11E9-B0F4-A860B63A8F47</string>

    <key>PayloadVersion</key>

    <integer>1</integer>

</dict>

</plist>
 
 
 
Have more questions? Submit a request

0 Comments

Article is closed for comments.