MacOS Installation

PC Matic offers a streamlined and flexible process for deploying endpoint security solutions on Mac computers. Before initiating the download of endpoint installers, users have the ability to customize various settings to align with specific security and operational needs.

Steps to Customize and Deploy:

  1. Access the Installer:
    • Log in to the PC Matic web portal.
    • Navigate to the Devices page select the Add or Remove a Device button.
    • Select the Windows Installer tab.
  2. Customize the Windows Installer

    Options available for customization include:

    • Remote Access: Enables VNC access to endpoints or servers via the cloud console.
    • SuperShield: The real-time security component, included in every installer, ensures only allowlisted programs run on your devices.
      • System Tray Menu: Restricts user capability to alter SuperShield settings from the endpoint’s system tray.
      • Blocked File Notification: Manages visibility and access for end-users when SuperShield blocks an application.
    • Groups: Assign the installer to a specific group, automatically adding devices to the chosen group upon installation.

Deployment Methods:

  • Email: Enter an email address to send the customized installer link with installation instructions.
  • Direct URL: Copy the URL link for manual distribution or future use.
  • Direct Download: Download the .pkg file directly to your computer for on-site installation or distribution via shared directories or removable drives. It’s crucial to retain the original file name for correct installation functionality.

Step-by-Step Installation Process on Mac

  1. Downloading the Installer:
    • Download the .pkg file to your Mac device.
  2. Initiating the Installation:
    • Double-click the downloaded .pkg file to start the installation process.
    • Follow the on-screen instructions, clicking 'Continue' and then 'Install'.
  3. Authentication:
    • Enter your administrator password when prompted and select 'Install Software'.
    • The installation process may take a few minutes.
  4. System Extension Approval:
    • During installation, a prompt may appear to allow the PC Matic system extension, critical for antivirus functionality.
    • Click 'Open Security Preferences' in the prompt (if this prompt doesn't appear, proceed to the final step).
    • In the 'Security and Privacy' settings, find the message "System Software from Developer 'PC Matic Tray' was blocked" and click 'Allow'.
    • Once allowed, close the 'Security and Privacy' window.
  5. Finalizing the Installation:
    • After installation completion, click 'Close'.
    • The PC Matic Mac icon should now appear in the status bar, displayed as green, indicating protection is active and installation is complete.
    • The console window will open automatically and can be closed.
  6. Installation Completion:
    • With these steps completed, PC Matic MSP is now fully installed and operational on your Mac device.

Important: Managing System Extensions in macOS

With macOS High Sierra (10.13.2) and later, Apple introduced restrictions on applications requiring kernel access, which is crucial for antivirus products like PC Matic Mac.

Steps for Allowing System Extensions:

  1. Timely Approval:
    • Approve the system extension during initial installation. The option to allow is displayed in 'Security and Privacy' for 30 minutes post-installation.
  2. Manual Steps for Late Approval:
    • If you missed the initial approval, follow these steps:
      1. Go to the 'Applications' folder and open 'Utilities'.
      2. Launch 'Terminal'.
      3. Type sudo kextload /Library/Extensions/PCMaticListener.kext and press enter.
      4. Ignore any error messages.
      5. Return to 'System Preferences' > 'Security and Privacy' and click 'Allow'.
      6. Reboot your Mac.
    • Note: Failing to allow the system extension will result in the device being unprotected.

Best Practices for Mac Installation

  • Use Default SuperShield Settings: Use the PC Matic default settings for SuperShield to ensure the most secure environment.
  • File Name Integrity: Maintain the original filename of the .pkg file to avoid installation issues.
  • System Extension Approval: Pay special attention to the system extension approval step, as it is crucial for the antivirus to function effectively.
Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us