Views:

Grant the permissions required to allow the Secure Access Module to run on macOS endpoints.

Important
Important
The steps and screens contained in these instructions were valid as of February 2024. The screens were taken using macOS 13 (Ventura).
After the Secure Access Module is deployed to a macOS endpoint, the end user must grant a series of required permissions when opening or signing into Zero Trust Secure Access for the first time.

Procedure

  1. Allow the Zero Trust Secure Access system extension to control network access.
    1. Open Zero Trust Secure Access on the end-user device.
    2. Click Continue on the dialog box that appears.
      required-permission.jpg
      A screen with instructions for allowing system extensions appears along with a pop-up message stating that the system extension has been blocked.
      system-extension-blo.jpg
    3. Click Open System Settings.
      The Privacy & Security menu opens.
      privacysecurity-1.jpg
    4. Scroll to the Security sub-menu.
    5. Click Allow next to the message stating that Trend Vision One Zero Trust Secure Access system software was blocked from loading.
      privacysecurity-2.jpg
  2. Grant notification permissions to be alerted when Zero Trust Secure Access blocks network access.
    1. Open Zero Trust Secure Access on the end-user device.
    2. Click Options on the notification that appears.
    3. Click Allow.
      notification.jpg
      Tip
      Tip
      Notifications can also be enabled later from Permission Management within Zero Trust Secure Access.
      permission-managemen.jpg
  3. Allow Zero Trust Secure Access to access system events to enable the collection of device posture information.
    1. Sign into Zero Trust Secure Access on the end-user device.
    2. Click OK when asked to allow control of system events.
      system-events.jpg
      Tip
      Tip
      System event access can also be enabled later from Permission Management within Zero Trust Secure Access.
  4. Allow Zero Trust Secure Access to set up the required VPN.
    1. Sign into Zero Trust Secure Access on the end-user device.
    2. Click Allow when asked to allow Zero Trust Secure Access to add VPN configurations.
      vpn.jpg