Skip to main content
Installing SentinelOne macOS Agents with Jamf
Updated this week

Jamf is macOS software to build packages, manage inventory and images, and run remote updates. You can use Jamf, or other MDM software, to install the SentinelOne macOS Agent.

Important

  • macOS Ventura and later require a new profile - Service Management. This profile will prevent users from disabling the SentinelOne daemons.

  • From Agent version 22.2 the Network Extension is loaded by default in environments where SentinelOne Firewall is enabled. From Agent version 23.2.2 the Network Extension is loaded by default in all environments, regardless of the SentinelOne Firewall settings. If the Network Extension and Content Filter are not pre-authorized before upgrading to this Agent version, a notification will instruct users to authorize them. To prevent user-facing notifications, pre-authorize the Network Extension and Content Filter:

    1. Create and deploy the Network Monitoring Extension Profile to pre-authorize the installation of the Network Extension.

    2. Create and deploy a Network Filter Validation Profile.

To install and upgrade the macOS kextless Agent using Jamf:

  1. Get the Site Token

  2. Upload the SentinelOne Agent PKG to Jamf

  3. Create a Privacy Control Configuration Profile

  4. Create a Network Monitoring Extension Profile

  5. Create a Network Filter Validation Profile

  6. Create a Notification Profile

  7. Create a Service Management Profile

  8. Upgrade macOS kextless Agents with Jamf

  9. Authorize Bluetooth Low Energy Permissions

  10. Monitor Status with Jamf

  11. Troubleshooting


Installing a Package with Jamf

  1. In the Sentinels toolbar, click Packages.

  2. Download the PKG of the macOS Agent version to install.

  3. Launch Jamf and log in.

  4. Click Settings > Computer Management > Packages.

  5. Click +New.

  6. Upload the SentinelOne Agent PKG file to Jamf.

  7. Set the Category to Packages.

  8. Click Save.

  9. Click Settings > Computer Management > Scripts.

  10. Enter these lines, with your values for the Site or Group Token and SentinelAgent_macos_version.pkg:

    sudo echo "token" > /Library/Application\ Support/JAMF/Waiting\ Room/com.sentinelone.registration-token sudo /usr/sbin/installer -pkg /Library/Application\ Support/JAMF/Waiting\ Room/SentinelAgent_macos_version.pkg -target /

    Example:

    sudo echo "eyfdgfdgdfgfdgfdgcvbvcbfydfdsfdsfdsfdsfsdfhyJ9" > /Library/Application\ Support/JAMF/Waiting\ Room/com.sentinelone.registration-token sudo /usr/sbin/installer -pkg /Library/Application\ Support/JAMF/Waiting\ Room/SentinelAgent_macos_v21_12_2_6003.pkg -target /
  11. Click Save.

  12. In Computers > Policies.

  13. Click Packages and change Action to Cache.

  14. Click Scripts and change Priority to After.

  15. Click Save.

    The Agent installs the next time the selected endpoint connects with Jamf.


Creating a Privacy Control Configuration Profile

Use the Privacy Control Configuration profile to grant the Full Disk Access permissions.

To Upload a New Configuration Profile:

  1. Click Computers > Configuration Profiles.

  2. Click Upload.

  3. Click Choose File.

  4. Select the Privacy Control configuration profile mobileconfig file you downloaded, and click Upload.

    1. Recommend: Open the profile in a text editor, and replace Your Company with your company's name.

    2. Alternatively, copy this text, replace Your Company with your company's name, save it as a mobileconfig file, and upload it:

    3. SentinelOne - Privacy Control Agent version 21.5 and lower.mobileconfig:

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">;
      <plist version="1.0">
      <dict>
      <key>PayloadContent</key>
      <array>
      <dict>
      <key>PayloadDescription</key>
      <string></string>
      <key>PayloadDisplayName</key>
      <string>Privacy Preferences Policy Control</string>
      <key>PayloadIdentifier</key>
      <string>236FFBB3-159D-4A5F-B146-AAA7BBA11FF0</string>
      <key>PayloadOrganization</key>
      <string>Your Company</string>
      <key>PayloadType</key>
      <string>com.apple.TCC.configuration-profile-policy</string>
      <key>PayloadUUID</key>
      <string>236FFBB3-159D-4A5F-B146-AAA7BBA11FF0</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      <key>Services</key>
      <dict>
      <key>SystemPolicyAllFiles</key>
      <array>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentineld" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>Identifier</key>
      <string>com.sentinelone.sentineld</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentineld-helper" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>Identifier</key>
      <string>com.sentinelone.sentineld-helper</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentinel-shell" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>Identifier</key>
      <string>com.sentinelone.sentinel-shell</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      </array>
      </dict>
      </dict>
      </array>
      <key>PayloadDescription</key>
      <string>Provides access to all disk to Sentinel One processes</string>
      <key>PayloadDisplayName</key>
      <string>SentinelOne - Privacy Control</string>
      <key>PayloadIdentifier</key>
      <string>0F7D9FAD-1257-402C-A942-354723513881</string>
      <key>PayloadOrganization</key>
      <string>Sentinel Labs, Inc.</string>
      <key>PayloadRemovalDisallowed</key>
      <true/>
      <key>PayloadScope</key>
      <string>System</string>
      <key>PayloadType</key>
      <string>Configuration</string>
      <key>PayloadUUID</key>
      <string>5961E10D-A589-4A7E-9790-8F1C55511014</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      </dict>
      </plist>

    4. SentinelOne - Privacy Control Agent version 21.7 and later.mobileconfig:

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">;
      <plist version="1.0">
      <dict>
      <key>PayloadContent</key>
      <array>
      <dict>
      <key>PayloadDescription</key>
      <string></string>
      <key>PayloadDisplayName</key>
      <string>Privacy Preferences Policy Control</string>
      <key>PayloadIdentifier</key>
      <string>236FFBB3-159D-4A5F-B146-AAA7BBA11FF0</string>
      <key>PayloadOrganization</key>
      <string>Your Company</string>
      <key>PayloadType</key>
      <string>com.apple.TCC.configuration-profile-policy</string>
      <key>PayloadUUID</key>
      <string>236FFBB3-159D-4A5F-B146-AAA7BBA11FF0</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      <key>Services</key>
      <dict>
      <key>SystemPolicyAllFiles</key>
      <array>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentineld" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>Identifier</key>
      <string>com.sentinelone.sentineld</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentineld-helper" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>Identifier</key>
      <string>com.sentinelone.sentineld-helper</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      <dict>
      <key>Allowed</key>
      <integer>1</integer>
      <key>CodeRequirement</key>
      <string>anchor apple generic and identifier "com.sentinelone.sentineld-shell" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>

      <key>Identifier</key>
      <string>com.sentinelone.sentineld-shell</string>
      <key>IdentifierType</key>
      <string>bundleID</string>
      <key>StaticCode</key>
      <integer>0</integer>
      </dict>
      </array>
      </dict>
      </dict>
      </array>
      <key>PayloadDescription</key>
      <string>Provides access to all disk to Sentinel One processes</string>
      <key>PayloadDisplayName</key>
      <string>SentinelOne - Privacy Control</string>
      <key>PayloadIdentifier</key>
      <string>0F7D9FAD-1257-402C-A942-354723513881</string>
      <key>PayloadOrganization</key>
      <string>Sentinel Labs, Inc.</string>
      <key>PayloadRemovalDisallowed</key>
      <true/>
      <key>PayloadScope</key>
      <string>System</string>
      <key>PayloadType</key>
      <string>Configuration</string>
      <key>PayloadUUID</key>
      <string>5961E10D-A589-4A7E-9790-8F1C55511014</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      </dict>
      </plist>
  5. Click Scope.

  6. Select Targets and set the devices to receive the configuration profile.

  7. Click Save.


Creating a Network Monitoring Extension Profile

Use the Network Monitoring Extension profile to pre-authorize the installation of the Network Extension.

The instructions here show the steps in Jamf. Use a similar procedure in other MDM tools.

To Upload a New Configuration Profile:

  1. Click Computers > Configuration Profiles.

  2. Click Upload.

  3. Click Choose File.

  4. Select the Network Monitoring Extension mobileconfig file you downloaded, and click Upload.

    Alternatively, copy this text, save it as a mobileconfig file, then upload it:

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    <key>PayloadContent</key>
    <array>
    <dict>
    <key>AllowUserOverrides</key>
    <true/>
    <key>AllowedSystemExtensions</key>
    <dict>
    <key>4AYE5J54KN</key>
    <array>
    <string>com.sentinelone.network-monitoring</string>
    </array>
    </dict>
    <key>PayloadDescription</key>
    <string></string>
    <key>PayloadDisplayName</key>
    <string>System Extensions</string>
    <key>PayloadIdentifier</key>
    <string>1BDD5153-6C81-4E0F-B409-1C321FF5E251</string>
    <key>PayloadOrganization</key>
    <string>Gete.Net Consulting</string>
    <key>PayloadType</key>
    <string>com.apple.system-extension-policy</string>
    <key>PayloadUUID</key>
    <string>1BDD5153-6C81-4E0F-B409-1C321FF5E251</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </array>
    <key>PayloadDescription</key>
    <string>Enables automatic loading of SentinelOne System Extension.</string>
    <key>PayloadDisplayName</key>
    <string>SentinelOne - Network Monitoring Extension</string>
    <key>PayloadIdentifier</key>
    <string>C957C35F-004C-4CF4-B075-9CAE5739081B</string>
    <key>PayloadOrganization</key>
    <string>Sentinel Labs, Inc.</string>
    <key>PayloadRemovalDisallowed</key>
    <true/>
    <key>PayloadScope</key>
    <string>System</string>
    <key>PayloadType</key>
    <string>Configuration</string>
    <key>PayloadUUID</key>
    <string>67BEF468-52BF-4DC9-96E2-2CCF1FEA127E</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </plist>
  5. Optional: Create a Removable System Extension to pre-authorize the removal of the Network Monitoring Extension when the Agent is uninstalled.

    1. Note

      • Supported on macOS Monterey and later.

      • By default, if you use the Removable System Extension mobileconfig file, end users cannot approve unspecified system extensions. End users may experience unwanted behavior if they cannot approve unspecified system extensions.

        To let end users approve unspecified system extensions, click Edit and enable Allow users to approve system extensions after you upload the mobileconfig file.

    2. To create a Removable System Extension, download the Removable System Extension mobileconfig file and redo steps 2 through 5 to upload it.

    3. Alternatively, copy this text, save it as a mobileconfig file, then upload it:

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
      <plist version="1">
      <dict>
      <key>PayloadUUID</key>
      <string>B8F1F9C1-AE66-4939-BEFD-8BB6F597E279</string>
      <key>PayloadType</key>
      <string>Configuration</string>
      <key>PayloadOrganization</key>
      <string>Sentinel Labs, Inc.</string>
      <key>PayloadIdentifier</key>
      <string>B8F1F9C1-AE66-4939-BEFD-8BB6F597E279</string>
      <key>PayloadDisplayName</key>
      <string>SentinelOne Removable System Extension</string>
      <key>PayloadDescription</key>
      <string/>
      <key>PayloadVersion</key>
      <integer>1</integer>
      <key>PayloadEnabled</key>
      <true/>
      <key>PayloadRemovalDisallowed</key>
      <true/>
      <key>PayloadScope</key>
      <string>System</string>
      <key>PayloadContent</key>
      <array>
      <dict>
      <key>PayloadUUID</key>
      <string>2B453873-A72A-4389-908A-9BF11B98790F</string>
      <key>PayloadType</key>
      <string>com.apple.system-extension-policy</string>
      <key>PayloadOrganization</key>
      <string>Sentinel Labs, Inc.</string>
      <key>PayloadIdentifier</key>
      <string>2B453873-A72A-4389-908A-9BF11B98790F</string>
      <key>PayloadDisplayName</key>
      <string>System Extensions</string>
      <key>PayloadDescription</key>
      <string/>
      <key>PayloadVersion</key>
      <integer>1</integer>
      <key>PayloadEnabled</key>
      <true/>
      <key>AllowUserOverrides</key>
      <false/>
      <key>AllowedTeamIdentifiers</key>
      <array>
      <string>4AYE5J54KN</string>
      </array>
      <key>RemovableSystemExtensions</key>
      <dict>
      <key>4AYE5J54KN</key>
      <array>
      <string>com.sentinelone.network-monitoring</string>
      </array>
      </dict>
      </dict>
      </array>
      </dict>
      </plist>
  6. Click Scope.

  7. Select Targets and set the devices to receive the configuration profile.

  8. Click Save.


Creating a Network Filter Validation Profile

Use the Network Filter Validation profile to pre-authorize the usage of the SentinelOne Network Filter by the Network Monitoring Extension.

The instructions here show the steps in JAMF. Use a similar procedure in other MDM tools.

To Upload a New Configuration Profile:

  1. Click Computers > Configuration Profiles.

  2. Click Upload.

  3. Click Choose File.

  4. Select the Network Filter Validation mobileconfig file you downloaded, and click Upload.

    1. Alternatively, copy this text, save it as a mobileconfig file, and upload it:

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">

      <plist version="1.0">
      <dict>
      <key>PayloadContent</key>
      <array>
      <dict>
      <key>FilterDataProviderBundleIdentifier</key>
      <string>com.sentinelone.network-monitoring</string>
      <key>FilterDataProviderDesignatedRequirement</key>
      <string>identifier "com.sentinelone.network-monitoring" and anchor apple generic and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "4AYE5J54KN")</string>
      <key>FilterGrade</key>
      <string>firewall</string>
      <key>FilterPackets</key>
      <false/>
      <key>FilterSockets</key>
      <true/>
      <key>FilterType</key>
      <string>Plugin</string>
      <key>PayloadDisplayName</key>
      <string>Web Content Filter Payload</string>
      <key>PayloadIdentifier</key>
      <string>14DDD990-E2D8-4DD1-8CC6-72FEFB5F252B</string>
      <key>PayloadOrganization</key>
      <string>JAMF Software</string>
      <key>PayloadType</key>
      <string>com.apple.webcontent-filter</string>
      <key>PayloadUUID</key>
      <string>14DDD990-E2D8-4DD1-8CC6-72FEFB5F252B</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      <key>PluginBundleID</key>
      <string>com.sentinelone.extensions-wrapper</string>
      <key>UserDefinedName</key>
      <string>SentinelOne Extensions</string>
      </dict>
      </array>
      <key>PayloadDescription</key>
      <string>Authorizes SentinelOne Network Filter automatic validation.</string>
      <key>PayloadDisplayName</key>
      <string>SentinelOne - Network Filter Validation</string>
      <key>PayloadIdentifier</key>
      <string>7889BE15-9387-4CDD-B2D7-D57B65EDA1E5</string>
      <key>PayloadOrganization</key>
      <string>Sentinel Labs, Inc.</string>
      <key>PayloadRemovalDisallowed</key>
      <true/>
      <key>PayloadScope</key>
      <string>System</string>
      <key>PayloadType</key>
      <string>Configuration</string>
      <key>PayloadUUID</key>
      <string>2C480E0F-AA21-420F-8BC8-0E1AC975BC51</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      </dict>
      </plist>
  5. Click Scope.

  6. Select Targets and set the devices to receive the configuration profile.

  7. Click Save.


Creating a Notification Profile

Use the Notification profile to approve all notifications from the SentinelOne Agent.

To create a New Configuration Profile:

  1. Click Computers > Configuration Profiles.

  2. Click + New.

  3. In the sidebar on the left click Notifications

  4. Create a new Notifications profile:

    • App Name: SentinelOne

    • Bundle ID: com.sentinelOne.SentinelAgent

    • Critical Alerts: Enabled

    • Notifications:

    • Banner alert type

    • Notifications on Lock screen: Display

    • Notifications in Notification Center: Display

    • Badge app icon: Display

    • Play sound for notifications: Enable

  5. Click Save.

  6. Click Scope.

  7. Select Targets and set the devices to receive the configuration profile.

  8. Click Save.


Creating a Service Management Profile

Agents: macOS 22.2.3 Kextless + | Ventura 13.0+

Use the Service Management Profile to approve the SentinelOne Agent in the Login Items on macOS Ventura. This profile will prevent users from disabling the SentinelOne daemons.

To Upload a New Configuration Profile:

  1. Click Computers > Configuration Profiles.

  2. Click Upload.

  3. Click Choose File.

  4. Select the Service Management configuration profile you downloaded, and click Upload.

    1. Alternatively, copy this text, save it as a mobileconfig file, and upload it:

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">;
      <plist version="1.0">
      <dict>
      <key>PayloadContent</key>
      <array>
      <dict>
      <key>PayloadType</key>
      <string>com.apple.servicemanagement</string>
      <key>PayloadIdentifier</key>
      <string>com.apple.servicemanagement.E01FDD5D-6953-4F89-AE9C-98EC6AF31483</string>
      <key>PayloadUUID</key>
      <string>E01FDD5D-6953-4F89-AE9C-98EC6AF31483</string>
      <key>Rules</key>
      <array>
      <dict>
      <key>RuleType</key>
      <string>LabelPrefix</string>
      <key>RuleValue</key>
      <string>com.sentinelone.</string>
      <key>Comment</key>
      <string>Prevent removal of SentinelOne Launch Agents and Launch Daemons</string>
      </dict>
      <dict>
      <key>RuleType</key>
      <string>BundleIdentifierPrefix</string>
      <key>RuleValue</key>
      <string>com.sentinelone.</string>
      <key>Comment</key>
      <string>Prevent removal of SentinelOne Launch Agents and Launch Daemons</string>
      </dict>
      </array>
      </dict>
      </array>
      <key>PayloadDescription</key>
      <string>Manage components that run at start up</string>
      <key>PayloadDisplayName</key>
      <string>Service Management</string>
      <key>PayloadIdentifier</key>
      <string>2B752EEE-3A7D-4995-94C2-41532A4479E4</string>
      <key>PayloadOrganization</key>
      <string>SentinelOne</string>
      <key>PayloadRemovalDisallowed</key>
      <true/>
      <key>PayloadScope</key>
      <string>System</string>
      <key>PayloadType</key>
      <string>Configuration</string>
      <key>PayloadUUID</key>
      <string>8F211DB0-7065-4A0D-8738-7277C7CDD384</string>
      <key>PayloadVersion</key>
      <integer>1</integer>
      </dict>
      </plist>
  5. Click Scope.

  6. Select Targets and set the devices to receive the configuration profile.

  7. Click Save.


Upgrading macOS kextless Agents with Jamf

  1. Download the PKG of the new macOS Agent version.

  2. Launch Jamf and log in.

  3. Create a configuration profile with the same values as the installation profile.

  4. Add the new Agent PKG file to Jamf.

  5. Click Script and enter this line, with your values for the PKG_pathname:

    sudo sentinelctl upgrade-pkg PKG_pathname
  6. Click Save.

    The Agent updates the next time the selected endpoints connect with Jamf.


Monitoring Status with Jamf

You can monitor macOS endpoints with Jamf. Configure a custom Extension Attribute on the install base. Then deploy the script (below) that returns the status of the Agent on each endpoint. To learn how to configure Extension Attributes in Jamf, see the Jamf documentation (Computer Extension Attributes).

#!/bin/sh

# This script will check the status of the SentinelOne Agent
if command -v sentinelctl 1>/dev/null; then
echo "<result> SentinelOne agent is installed with version `sentinelctl version | awk '{print $2}'` and was connected to management console `sentinelctl config Server Address | tail -1 | awk '{print $2}'` </result>"
else
s1_agent=$(ps aux | grep -Ei "sentineld$" | awk '{ print $11 };' | grep -v grep)
if [ -z $s1_agent ]; then
echo "<result>SentinelOne Agent is not Installed.</result>";
else
s1_agent=$(echo $s1_agent | sed 's|sentineld|sentinelctl|g')
echo "<result>SentinelOne Agent is running but could not locate SentinelCtl in the default PATH /usr/local/bin. The full path is - $s1_agent </result>" ;
fi
fi

Troubleshooting

  • If you see this error message An unexpected error occurred while moving files to the final destination:

    • It is possible that there is an Agent already installed on the endpoint.

    • It is possible that there is an issue with the required permissions, or that there is a security product that is blocking the SentinelOne Agent.

  • Upload Configuration Profile "File cannot be processed" - If an error occurs when you upload the SentinelOne Notification OS X Configuration Profile to Jamf, this error message will show. To resolve, copy the contents of the .mobileconfig file directly to Jamf.

    Workaround:

    1. Click Computers > Configuration Profiles.

    2. Click + New .

    3. In the General tab:

      • Name: SentinelOne Notifications

      • Description: SentinelOne Notifications Profile

      • Category: None (default)

      • Distribution Method: Install Automatically (default)

      • Level: Computer Level (default)

    4. In the sidebar on the left click Application & Custom Settings and select Upload.

    5. Click + Add

    6. Create a new notifications profile:

      • Preference Domain: com.apple.notificationsettings

      • Property List:

        <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1"><dict><key>PayloadUUID</key><string>06E3D125-98B1-4B71-92FA-6AFF1914A958</string><key>PayloadType</key><string>Configuration</string><key>PayloadOrganization</key><string>Your Company</string><key>PayloadIdentifier</key><string>06E3D125-98B1-4B71-92FA-6AFF1914A958</string><key>PayloadDisplayName</key><string>SentinelOne - Accept all Notifications</string><key>PayloadDescription</key><string>Automatically authorizes Notifications for SentinelOne.</string><key>PayloadVersion</key><integer>1</integer><key>PayloadEnabled</key><true/><key>ConsentText</key><dict><key>default</key><string/></dict><key>PayloadRemovalDisallowed</key><false/><key>PayloadScope</key><string>System</string><key>PayloadContent</key><array><dict><key>PayloadUUID</key><string>6201B936-C953-4717-9929-4944F3EC4CA4</string><key>PayloadType</key><string>com.apple.notificationsettings</string><key>PayloadOrganization</key><string>Your Company</string><key>PayloadIdentifier</key><string>GNC-MacBook-Pro.03b46baa-3c3d-4c9b-913b-870fc79ebe21.com.apple.notificationsettings.6201B936-C953-4717-9929-4944F3EC4CA4</string><key>PayloadDisplayName</key><string>Notifications</string><key>PayloadDescription</key><string/><key>PayloadVersion</key><integer>1</integer><key>PayloadEnabled</key><true/><key>NotificationSettings</key><array><dict><key>ShowInNotificationCenter</key><true/><key>AlertType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>CriticalAlertEnabled</key><true/><key>GroupingType</key><integer>0</integer><key>ShowInLockScreen</key><true/><key>BadgesEnabled</key><true/><key>ShowInCarPlay</key><false/><key>SoundsEnabled</key><true/><key>BundleIdentifier</key><string>com.sentinelOne.SentinelAgent</string></dict></array></dict></array></dict></plist><?xml version="1.0" encoding="UTF-8"?>
        <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">;
        <plist version="1">
        <dict>
        <key>PayloadUUID</key>
        <string>06E3D125-98B1-4B71-92FA-6AFF1914A958</string>
        <key>PayloadType</key>
        <string>Configuration</string>
        <key>PayloadOrganization</key>
        <string>Your Company</string>
        <key>PayloadIdentifier</key>
        <string>06E3D125-98B1-4B71-92FA-6AFF1914A958</string>
        <key>PayloadDisplayName</key>
        <string>SentinelOne - Accept all Notifications</string>
        <key>PayloadDescription</key>
        <string>Automatically authorizes Notifications for SentinelOne.</string>
        <key>PayloadVersion</key>
        <integer>1</integer>
        <key>PayloadEnabled</key>
        <true/>
        <key>ConsentText</key>
        <dict>
        <key>default</key>
        <string/>
        </dict>
        <key>PayloadRemovalDisallowed</key>
        <false/>
        <key>PayloadScope</key>
        <string>System</string>
        <key>PayloadContent</key>
        <array>
        <dict>
        <key>PayloadUUID</key>
        <string>6201B936-C953-4717-9929-4944F3EC4CA4</string>
        <key>PayloadType</key>
        <string>com.apple.notificationsettings</string>
        <key>PayloadOrganization</key>
        <string>Your Company</string>
        <key>PayloadIdentifier</key>
        <string>GNC-MacBook-Pro.03b46baa-3c3d-4c9b-913b-870fc79ebe21.com.apple.notificationsettings.6201B936-C953-4717-9929-4944F3EC4CA4</string>
        <key>PayloadDisplayName</key>
        <string>Notifications</string>
        <key>PayloadDescription</key>
        <string/>
        <key>PayloadVersion</key>
        <integer>1</integer>
        <key>PayloadEnabled</key>
        <true/>
        <key>NotificationSettings</key>
        <array>
        <dict>
        <key>ShowInNotificationCenter</key>
        <true/>
        <key>AlertType</key>
        <integer>0</integer>
        <key>NotificationsEnabled</key>
        <true/>
        <key>CriticalAlertEnabled</key>
        <true/>
        <key>GroupingType</key>
        <integer>0</integer>
        <key>ShowInLockScreen</key>
        <true/>
        <key>BadgesEnabled</key>
        <true/>
        <key>ShowInCarPlay</key>
        <false/>
        <key>SoundsEnabled</key>
        <true/>
        <key>BundleIdentifier</key>
        <string>com.sentinelOne.SentinelAgent</string>
        </dict>
        </array>
        </dict>
        </array>
        </dict>
        </plist>
    7. Click Save.

    8. Click Scope.

    9. Select Targets and set the devices to receive the configuration profile.

    10. Click Save.

Did this answer your question?