Skip to content

Commit a80916c

Browse files
Missing Screenshots
1 parent 9bbc538 commit a80916c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+208
-832
lines changed

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/applicationlaunch.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,9 @@ Refer back to the Application Launch section earlier and make a matching rule. F
2020
might want to make a matching rule for Firefox Browser.  You may need multiple rules if a product
2121
has multiple executables.
2222

23-
![A screen shot of a computer
23+
![A screen shot of a computer Description automatically generated](/images/endpointpolicymanager/mac/using_macos_admin_approval.webp)
2424

25-
Description automatically
26-
generated](/images/endpointpolicymanager/mac/using_macos_admin_approval.webp)
27-
28-
![A computer screen with a screen showing a login page
29-
30-
Description automatically
31-
generated](/images/endpointpolicymanager/mac/using_macos_admin_approval_1.webp)
25+
![A computer screen with a screen showing a login page Description automatically generated](/images/endpointpolicymanager/mac/using_macos_admin_approval_1.webp)
3226

3327
:::note
3428
The Endpoint Policy Manager Least Privilege Admin Approval tool for Windows must be used
@@ -38,7 +32,4 @@ to perform approval requests.
3832

3933
The following options are honored in the Mac (and Windows) client:
4034

41-
![A screenshot of a computer
42-
43-
Description automatically
44-
generated](/images/endpointpolicymanager/mac/using_macos_admin_approval_2.webp)
35+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/using_macos_admin_approval_2.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/installclient.md

Lines changed: 7 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -9,53 +9,35 @@ sidebar_position: 10
99
After logging into Endpoint Policy Manager Cloud, head to Company Details, locate Download PolicyPak
1010
Cloud Client for MacOS Installer, and follow the directions.
1111

12-
![A screenshot of a computer
13-
14-
Description automatically
15-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager.webp)
12+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager.webp)
1613

1714
Then follow the directions on the Mac and the Endpoint Policy Manager Least Privilege Manager pieces
1815
contained within the Endpoint Policy Manager Cloud Client.
1916

20-
![A screenshot of a computer
21-
22-
Description automatically
23-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_1.webp)
17+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_1.webp)
2418

2519
Then use the details provided earlier to install the certificate and register with the Endpoint
2620
Policy Manager Cloud service.
2721

28-
![A screenshot of a computer
29-
30-
Description automatically
31-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_2.webp)
22+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_2.webp)
3223

3324
## Endpoint Policy Manager Commands after Installation
3425

3526
Endpoint Policy Manager on Mac has a variety of commands you can perform.  Start with
3627
`policypak –help` to see all the commands which might be different than what is presented here.
3728

38-
![A screenshot of a computer
39-
40-
Description automatically
41-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_3.webp)
29+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_3.webp)
4230

4331
A few important commands to try out would be:
4432

4533
`Policypak cloud-sync` which shows the list of policies affecting this Mac. Tip: This command may be
4634
run by any user (without Sudo / admin rights.)
4735

48-
![A black screen with white text
49-
50-
Description automatically
51-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_4.webp)
36+
![A black screen with white text Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_4.webp)
5237

5338
`Policypak license-list –verbose` to get the license list from Cloud service.
5439

55-
![A computer screen with white text
56-
57-
Description automatically
58-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_5.webp)
40+
![A computer screen with white text Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_5.webp)
5941

6042
And `policypak policy-list` to get a total list of what is happening on the machine.
6143

@@ -64,7 +46,4 @@ And `policypak policy-list` to get a total list of what is happening on the mach
6446
Mac policies are then created in the in-cloud editors against the All | MacOS groups or any Company
6547
Groups’ macOS group like what’s seen here.
6648

67-
![A screenshot of a computer
68-
69-
Description automatically
70-
generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_7.webp)
49+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/how_to_install_the_endpointpolicymanager_7.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/conditions.md

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,7 @@ sidebar_position: 30
88

99
To make a match you need to match one or more Conditions: Path, Hash or Signature.
1010

11-
![A screenshot of a computer
12-
13-
Description automatically
14-
generated](/images/endpointpolicymanager/mac/scenarios/conditions_1.webp)
11+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/conditions_1.webp)
1512

1613
- Path – The name of the file and/or the location. This is the least secure method so use it with
1714
caution. You may also provide a folder or folder recursively.
@@ -20,21 +17,15 @@ generated](/images/endpointpolicymanager/mac/scenarios/conditions_1.webp)
2017

2118
You can see the dialogs for Path, Hash and Signature condition here:
2219

23-
![A screenshot of a computer
24-
25-
Description automatically
26-
generated](/images/endpointpolicymanager/mac/scenarios/conditions_2.webp)
20+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/conditions_2.webp)
2721

2822
To acquire the Path, you may use the Finder.
2923

3024
![conditions_3](/images/endpointpolicymanager/mac/scenarios/conditions_3.webp)
3125

3226
To acquirethe application's Hash or Signature, you can use the `ppfileinfo` tool:
3327

34-
![A computer screen with white text
35-
36-
Description automatically
37-
generated](/images/endpointpolicymanager/mac/scenarios/conditions_4.webp)
28+
![A computer screen with white text Description automatically generated](/images/endpointpolicymanager/mac/scenarios/conditions_4.webp)
3829

3930
Actions:
4031

@@ -44,10 +35,7 @@ Actions:
4435
- Elevate — Gives the user elevated privileges for actions, e.g. can perform actions without admin
4536
rights.
4637

47-
![A screenshot of a computer
48-
49-
Description automatically
50-
generated](/images/endpointpolicymanager/mac/scenarios/conditions_5.webp)
38+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/conditions_5.webp)
5139

5240
Additional Approve settings may be:
5341

@@ -64,7 +52,4 @@ Teacher2, etc.) to perform the work.
6452
:::
6553

6654

67-
![A screenshot of a computer
68-
69-
Description automatically
70-
generated](/images/endpointpolicymanager/mac/scenarios/conditions_6.webp)
55+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/conditions_6.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/launchcontrol.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,24 +26,15 @@ In this example we are using a Signing Identifier: `org.mozilla.firefox`.
2626

2727
Then use that as your condition:
2828

29-
![A screenshot of a computer
30-
31-
Description automatically
32-
generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_2.webp)
29+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_2.webp)
3330

3431
The result of the policy is that the application will be blocked on launch.
3532

36-
![A screenshot of a computer
37-
38-
Description automatically
39-
generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_3.webp)
33+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_3.webp)
4034

4135
Other actions besides Deny Execution are Allow Execution, with some options:
4236

43-
![A screenshot of a computer
44-
45-
Description automatically
46-
generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_4.webp)
37+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_4.webp)
4738

4839
- No Confirmation — Application launches
4940
- Confirmation — Provides a pop-up asking user to confirm the actual launch
@@ -53,7 +44,4 @@ generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approv
5344

5445
Examples of the dialog boxes may be seen here:
5546

56-
![Screens screenshot of a computer
57-
58-
Description automatically
59-
generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_5.webp)
47+
![Screens screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/application_launch_approval_5.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/mountunmount.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,7 @@ video for an overview of this section.
1717

1818
You might want to manage when USB devices and/or .DMG disk files can be mounted (or unmounted).
1919

20-
![A screenshot of a computer
21-
22-
Description automatically
23-
generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and.webp)
20+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and.webp)
2421

2522
You can perform the following functions:
2623

@@ -49,15 +46,9 @@ Targets:
4946

5047
For a simple demo, let's Block All USB and DMG devices.
5148

52-
![A screenshot of a computer
53-
54-
Description automatically
55-
generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and_1.webp)
49+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and_1.webp)
5650

5751
The result of trying to attach a new device by USB can be seen here, as Endpoint Policy Manager has
5852
blocked it.
5953

60-
![A screenshot of a computer
61-
62-
Description automatically
63-
generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and_2.webp)
54+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/mount_unmount_for_usb_and_2.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/overview.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,4 @@ Endpoint Policy Manager for Mac supports a variety of scenarios:
1616
- Finder Policy — Elevate application installs and uninstalls
1717
- Privilege Elevation — Elevate applications which have helper applications
1818

19-
![A screenshot of a computer
20-
21-
Description automatically
22-
generated](/images/endpointpolicymanager/mac/scenarios/supported_scenarios_and_policy.webp)
19+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/supported_scenarios_and_policy.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/packageinstallation.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,4 @@ video for an overview of this section.
1616
When a standard user attempts to install a .PKG file they are not allowed to do so. In this example,
1717
Skype for Business prompts the user for admin credentials before installing.
1818

19-
![A screenshot of a computer
20-
21-
Description automatically
22-
generated](/images/endpointpolicymanager/mac/scenarios/package_installation_policy.webp)
19+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/package_installation_policy.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/sudo.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,11 @@ provide actual admin credentials. In this example the user wants to perform the
2222
Sudo mkdir /Users/Sudo/test1 but is blocked with a password request.
2323
```
2424

25-
![A screenshot of a computer
26-
27-
Description automatically
28-
generated](/images/endpointpolicymanager/mac/scenarios/sudo.webp)
25+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/sudo.webp)
2926

3027
To overcome this, create a SUDO rule like this one:
3128

32-
:![A screenshot of a computer
33-
34-
Description automatically
35-
generated](/images/endpointpolicymanager/mac/scenarios/sudo_1.webp)
29+
:![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/sudo_1.webp)
3630

3731
The Actions are:
3832

@@ -47,7 +41,4 @@ For this example policy, choose **Elevate**.
4741
After the policy is synced, the result on the client can be seen here, where the same command now
4842
runs without password requirement.
4943

50-
![A screenshot of a computer
51-
52-
Description automatically
53-
generated](/images/endpointpolicymanager/mac/scenarios/sudo_2.webp)
44+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/sudo_2.webp)

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/macos/scenarios/systemsettings.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,7 @@ video for an overview of this section.
1616
Standard Users are prompted when they access System Settings in MacOS. For instance, trying to
1717
modify Date&Time or Wi-Fi settings prompts standard users for admin credentials.
1818

19-
![Screens screenshot of a computer
20-
21-
Description automatically
22-
generated](/images/endpointpolicymanager/mac/scenarios/system_settings_policy.webp)
19+
![Screens screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/system_settings_policy.webp)
2320

2421
System Settings Policy enables you to:
2522

@@ -31,10 +28,7 @@ System Settings Policy enables you to:
3128
In this example, we are permitting a Standard User to overcome restricted access to Date&Time and
3229
Wi-Fi System Settings.
3330

34-
![A screenshot of a computer
35-
36-
Description automatically
37-
generated](/images/endpointpolicymanager/mac/scenarios/system_settings_policy_1.webp)
31+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/mac/scenarios/system_settings_policy_1.webp)
3832

3933
Without Endpoint Policy Manager policy, the system asks for administrator confirmation to change
4034
system settings for the standard user. With Endpoint Policy Manager you are able to provide the

docs/endpointpolicymanager/components/endpointprivilegemanager/manual/windows/adminapproval/avoidpopups.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,7 @@ This will generally happen when two things are true:
2424
When an application is detected as an installer, even if a user doesn’t click on it, pop-ups may
2525
still come up.. Two examples of pop-ups that users might see, OneDrive and Java, are shown here.
2626

27-
![A screenshot of a computer
28-
29-
Description automatically
30-
generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval.webp)
27+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval.webp)
3128

3229
There are two ways to overcome these messages:
3330

@@ -51,10 +48,7 @@ The first way to see which applications are causing unwanted pop-ups is via Endp
5148
operational logs, as seen here. To find this log, go to `Users\<username>\AppData\Local\PolicyPak`
5249
Least Privilege Manager, and open ppUser_operational.log.
5350

54-
![A screenshot of a computer program
55-
56-
Description automatically
57-
generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval_1.webp)
51+
![A screenshot of a computer program Description automatically generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval_1.webp)
5852

5953
:::note
6054
Some applications may have different ways to self-update, possibly calling more than one
@@ -69,10 +63,7 @@ You can get similar information from the Endpoint Policy Manager event logs, whi
6963
**Application and Services Logs** > **Endpoint Policy Manager**. An event will appear showing
7064
canceled dialogs, like the one shown here.
7165

72-
![A screenshot of a computer
73-
74-
Description automatically
75-
generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval.webp)
66+
![A screenshot of a computer Description automatically generated](/images/endpointpolicymanager/leastprivilege/adminapproval/avoid_pop_ups_with_admin_approval.webp)
7667

7768
There is more information on using Event Viewer with Endpoint Policy Manager at the end of this
7869
guide, with specific event IDs to search for.

0 commit comments

Comments
 (0)