Note: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.
We have made this process significantly easier. Our installer download now includes an MDM profile for permissions and a script for use to deploy the endpoint via MDM. Here are our instructions for how to use these. It is written for JAMF Pro, however the MDM profile and script should work in other MDM solutions.
This article describes the steps to configure JAMF to allow configure permissions for Sophos Mac Endpoint on macOS 10.15+
Applies to the following Sophos products and versionsSophos Central Mac Endpoint 10.0.0 and above,Sophos Central Intercept X 10.0.0 and above,Sophos Central Device Encryption 1.5.2 and above,Sophos Anti-Virus for Mac OS X 9.9.7 and above
With macOS 10.13, Apple introduced a new security level that required each 3rd party vendor's kernel extension to be approved. This required Team ID to be allowed, also known as the Apple Developer ID.
With macOS 10.15, Apple added a new default behavior that prevented applications from writing to the disk.
The information below covers both topics:
To alert and inform users, Sophos implement a notification popup. The endpoint will check after each reboot (and continuously every 30 minutes) if the system permissions are compatible.
Note: In Sophos for Mac 9.9.5, a notice is displayed if required permissions are not fully enabled. On October 31st, an issue was found where the notice is triggered if the permissions have been added via an MDM profile, as Apple records these in a different location. Sophos is actively working on updating the detection to correct this.
There are 2 steps required to configure compatibility for macOS 10.15.x (Catalina) and below.Note: One additional step is required if you want to apply the profile to a macOS 11 (Big Sur) device.
identifier SophosMDR and anchor apple generic and certificate 1[field.1.2.840.1136188.8.131.52.6] /* exists */ and certificate leaf[field.1.2.840.1136184.108.40.206.13] /* exists */ and certificate leaf[subject.OU] = "2H5GFH3774"
codesign --display -r - <app path from table above>
The same profile can be used, but the option "Approved Kernel Extensions" needs to be selected. If this is not configured yet, select the "open" button at the center to begin the configuration.
During configuration, 3 kernel extensions will need to be added, as well as the Sophos Team ID [2H5GFH3774]
Note: Please ensure that "Allow users to approve kernel extensions" is unchecked.
Referring to the screenshot above, add the following kernel extensions:
Make sure to save your changes.
Note: Apple has added a new, optional, method of setting authorization of applications for Privacy in Big Sur with MDM. This new method replaces an existing true/false option with a string value option instead. Here is the Apple article on it: https://developer.apple.com/documentation/devicemanagement/privacypreferencespolicycontrol/services/identity Allowed is the normal method of setting permissions, however as of Big Sur, Apple allows you to instead use Authorization. Our detection for permissions has been configured for the “Required” property (which isn’t actually required if you have Authorization instead). If you can set your MDM provider to use the Allowed True/False (Boolean) setting, it should work without any issues. To check if this applies to you, open the .mobileconfig file in a text editor and search for Sophos. Check if you see - <key>Allowed</key><True/>, or <key>Authorization</key><String>Allow</string>. If it is Authorization, this applies to you. We do recognize that there is a move to this alternate form, and as such, we have made an improvement, coming out in our 10.1.3 release in July, to detect both versions. Until this releases, we recommend using the Allowed True/False style privacy permission setting for Sophos processes.
The same profile configuration can be used.
Note: Sophos does not guarantee the security of third party applications and they should be used at your own risk.
There is a utility called PPPC Utility on Github which allows you to build a configuration profile for Privacy Preferences. It can be located here: https://github.com/jamf/PPPC-Utility. To use this, follow the guidance on the link, and drag and drop the Sophos items into it.
This profile can then be loaded into JAMF.
Special thanks to MichaelCurtis
Sophos Central MDM Configuration
How to Configure JAMF Privacy Preferences for 10.15 Compatibility
Special thanks to mscottblake for sharing this!
Within the same Configuration Profile, add a Content Filter payload (this requires Jamf Pro 10.26+) with the following keys and values configured:
Note that the Filter Name can be anything, but it is required.
Once the complete, the payload should look like this:
I have followed the instructions on this article. However, in Big Sur I am still getting the prompts to allow the System Extensions for SophosScanD and SophosWebNetworkExtension. I have a configuration profile in JAMF configured with those system extensions, successfully installed and applied to the test MacBook. When I run 'systemextensionsctl list | grep -i sophos', I can see that the extensions are there, but in the state: activated waiting for user. I have attempted this with the System Extensions configuration profile setting "Allow users to approve system extensions" both checked and unchecked - same result either way.
I understand what this means. I can see that I need to go to System Preferences-> Security & Privacy, and approve the software that "requires your attention before it can be used" just as I have seen on some of the other forum posts.
Am I correct that this article is implying that users should not see any prompts and that Jamf should preapprove those system extensions?
I have the same problem (activated waiting for user). I thought with the settings in Jamf the user should not have to allow anything here.
It is correct that users should not be prompted. However I noticed that once the request for approval has been made the profile won't affect its state. The approval (profile) has to be in place before the install request is made. Keep in mind uninstalling and then installing Sophos does not work as the extensions aren't removed in that process.
For uninstalling the extensions refer to this: community.sophos.com/.../how-to-remove-system-extensions
But that would be pretty dumb. Most people already have Sophos installed on macOS 10.15 and then want to upgrade to macOS Big Sur. That means I have to uninstall Sophos first, then install Big Sur and then install Sophos again. To automate this via Jamf with tamper protection turned on is almost impossible.
Sorry I should have made it a bit clearer. It is all about at which point the application (Sophos) requests to install a system extension (here network& scan). Sophos does this when it detects that it is running on BigSur (or higher). So the extension profile needs to be installed before the upgrade. SysExts profiles can be installed on 10.15.4 and above. On 10.15 Sophos still uses kernel extensions. So you do not have to uninstall/reinstall Sophos for an os upgrade. Sophos could implement its own logic for detecting overwriting policies pushed via config profile and re-request the install. However this would be a workaround to a limitation with the current implementation by macOS/Apple.
So are you saying this is still not resolved in 9.10.2? Our devices are still prompted to allow Proxy Configurations and SysExts in System Prefs.
You can remove sophos without tamper protection:
#!/bin/bash# next line deletes the Sophos keychainsudo rm /Library/Sophos\ Anti-Virus/SophosSecure.keychain#next line disables Sophos' tamper protection, so it can be uninstalled sudo defaults write /Library/Preferences/com.sophos.sav TamperProtectionEnabled -bool false# next line Changes Directory the application sitecd /Library/Application\ Support/Sophos/saas/Installer.app/Contents/MacOS/tools/#next line executes Sophos's uninstaller sudo ./InstallationDeployer --remove