
This should show what KEXTs have been approved on your Mac. To view approved KEXTs in the sqlite3 database: Sqlite3 /var/db/SystemPolic圜onfiguration/KextPolicy To verify kernel extensions, run this to look at the KextPolicy database on your system: Keep in mind that Kext(Kernel extensions) are different than PPPC configuration profile. Manually Creating PPPC Configuration Profiles:Īs noted by codesign -dr - /path/to/app will help with creating PPPC Profiles manually on Jamf if not using the PPPC Utility to automate the tasks.

Make sure you build the PPPC Profile with the same Adobe Package(s) you are creating/uploading from the Adobe Admin Console. If a user gets prompted for something I have not seen yet and they click on Do Not Allow when they should have clicked Allow, will a PPPC profile installed afterward override that denial of access? It's all the background, support processes/apps, and plugins that will get you because you, as the admin, may never in a million years try each and every possible option within an app to discover the ones that trigger PPPC prompts, but the users might.

This will be a full time job just creating PPPC and approved kext profiles.
Scroll reverser mojave how to#
I hate to see what i'm going to have to do with homebrew!!! Today I had to figure out how to create a freaking PPPC profile for the Zoom Outlook Plugin. In my limited testing, I've seen prompts to allow the various shells to have access to various things. I don't know that I could ever do this because we do a lot of java development and our devs do things in bash, sh, zsh, and a few other shells. I am also coming to the conclusion that every single app that has ever seen the light of day here will need a PPPC config created for it.
