Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
AfterMath
Collaborator
Jump to solution

Harmony Endpoint Security macOS Installation – Step-by-Step Guide Needed

Hi everyone,

I need to install Harmony Endpoint Security 89.10 on macOS computers.
I’m using R81.20, on-premises, with Web UI Management and SmartEndpoint.
I’ve already looked for official documentation but haven’t found detailed instructions. Could someone share the step-by-step procedure for installation and deployment on this OS?

0 Kudos
2 Solutions

Accepted Solutions
PhoneBoy
Admin
Admin

I imagine the steps would be similar to this video: https://community.checkpoint.com/t5/Check-Point-for-Beginners/How-to-deploy-and-upgrade-Endpoint-Sec... 
Except instead of an .img, you'd use the .pkg file.

View solution in original post

the_rock
MVP Platinum
MVP Platinum

Hey @AfterMath 

I would definitely open TAC case if any issues after deployment.

Btw, FWIW, I ran your query through MS AI copilot and below is what it gave me:

****************************************************************************

Hi — here’s a practical, step-by-step runbook for deploying Harmony / Endpoint Security Client E89.10 on macOS when your management is R81.20 on‑prem (Web UI Management + SmartEndpoint). I’ll cover package prep in SmartEndpoint, deployment options (manual vs Tiny Agent), macOS permissions (Full Disk Access + Network Extension), and verification / uninstall.


0) Quick compatibility checklist (do this first)

  1. Management server compatibility\ E89.x macOS clients (including E89.10) are supported with Endpoint Security Management Servers R81.10 / R81.20 / R82 (on‑prem and cloud), with E89.00 and higher = “yes”. [sc1.checkpoint.com]

  2. macOS version support\ E89.x supports macOS releases per the “Client Requirements” table; notably macOS Sequoia (15) is GA-supported starting E89.00 and later, and other versions map accordingly.\ Also, the E89.10 download entry lists supported macOS versions (e.g., macOS 13/14/15 in the download details). [sc1.checkpoint.com] [support.ch…kpoint.com]

  3. Know the “two macOS approvals” you’ll need\ Starting E88.00+:


1) Get the E89.10 macOS installer package

Option A — download from Check Point Support (most common)

  • Download the E89.10 macOS package (example filename shown as EPS_E89.10_ALL_app.zip on the download page). [support.ch…kpoint.com]
  • If you need to confirm the exact build mapping for E89.10 on macOS, Check Point publishes build numbers in their “Standalone Clients – Versions and Build Numbers” SK. [support.ch…kpoint.com]

Option B — if you already have the ZIP from another environment

  • You can still upload it into your Endpoint package repository from SmartEndpoint (next section). [sc1.checkpoint.com]

2) Upload the client package into the Package Repository (SmartEndpoint)

This is the part that’s often missing from “short” docs: you must load/upload the package into the repository so SmartEndpoint can produce the customized Mac installer ZIP you distribute.

  1. Open SmartEndpoint
  2. Go to Deployment tab
  3. Use Load client installer file (or equivalent repository load action) to upload the new client package into the repository. [sc1.checkpoint.com], [sc1.checkpoint.com]
  4. Notes / pitfalls:
    • Check Point warns you cannot mix package “types” in one repository for a given release (for Windows they mention Dynamic vs MSI); repository hygiene matters for successful deployments. [sc1.checkpoint.com]
    • After upload, packages are stored on the server (default path is documented). [sc1.checkpoint.com]

3) Build the macOS installer ZIP from SmartEndpoint (the one you deploy)

In SmartEndpoint → Deployment tab:

  1. Under Mac Client, click Download. [sc1.checkpoint.com], [sc1.checkpoint.com]
  2. In the download window:
  3. SmartEndpoint outputs Endpoint_Security_Installer.zip — this is what you distribute to Macs. [sc1.checkpoint.com], [sc1.checkpoint.com]

Important design constraint: macOS client packages are distributed manually and do not use the classic “Software Deployment” flow the way Windows does. [sc1.checkpoint.com], [sc1.checkpoint.com]


4) Choose your deployment method

Method 1 — Manual distribution (simple / small fleets)

You distribute Endpoint_Security_Installer.zip using:

Method 2 — “Tiny Agent” for automatic initial install (better for scale)

Check Point’s Tiny Agent is a small app that downloads and installs the initial client automatically.\ It is available for on‑prem deployments with Endpoint Security Management Server R81.20 or higher. [sc1.checkpoint.com]

To download Tiny Agent (per Check Point flow):

  • In Web UI, click Overview → Download Endpoint (top banner), or
  • Policy → Deployment Policy → Software Deployment → Download Endpoint (top banner).\ This downloads EPS_TINY.zip, unzip it and run the app. [sc1.checkpoint.com]

5) Pre-approve macOS permissions (MDM best practice)

Why this matters

Without MDM profiles, end users must manually approve system components and Full Disk Access; Check Point explicitly recommends using MDM (Jamf/Intune) to avoid user prompts by deploying the necessary payloads. [sc1.checkpoint.com]

What you need to push via MDM

Check Point’s MDM deployment guide lists profile files including:

If you do not have MDM, you can still proceed—users will just need to approve permissions interactively. [sc1.checkpoint.com], [sc1.checkpoint.com]


6) Install on the Mac (end-user or scripted hands-on steps)

On the macOS endpoint:

  1. Copy Endpoint_Security_Installer.zip to a local disk (not a file share). [sc1.checkpoint.com]
  2. Double‑click the ZIP to expand it. [sc1.checkpoint.com], [sc1.checkpoint.com]
  3. Launch the extracted .app (“Check Point Endpoint Security Installer”). [sc1.checkpoint.com], [sc1.checkpoint.com]
  4. Click Install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  5. Enter macOS admin username/password to authorize the install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  6. Wait for “installed successfully” and click Close; the menu bar icon should appear. [sc1.checkpoint.com], [sc1.checkpoint.com]

7) Post-install: approve permissions (if not already handled by MDM)

A) Full Disk Access (FDA)

Starting E88.00+, only the main executable “Check Point Endpoint Security” needs Full Disk Access.\ If not pre-approved by MDM, the user must allow it in macOS privacy settings. [sc1.checkpoint.com] [sc1.checkpoint.com], [sc1.checkpoint.com]

B) Network Extension

Starting E88.00+, the client needs approval for “Check Point Network Extension”.\ On newer macOS versions (example shared in the community), the setting is typically found under:\ System Settings → General → Login Items & Extensions → Network Extensions. [sc1.checkpoint.com] [community….kpoint.com]

(If you’re using MDM, push the Network Extension .mobileconfig so the user doesn’t need to do this manually.) [sc1.checkpoint.com], [sc1.checkpoint.com]


8) Verify the client is enrolled and healthy

  1. Confirm the Endpoint Security icon is in the macOS menu bar after install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  2. From SmartEndpoint/Web UI, confirm the endpoint appears and pulls policy (normal heartbeat).
  3. If you see “Endpoint Security needs user authentication”, it can occur because internal communication may require a valid Kerberos ticket, and the user may need to run Authenticate from the client menu. [sc1.checkpoint.com]

9) Upgrades and blade changes

  • Upgrades can be performed the same way as installations; additionally, the Endpoint Web Management Console Software Deployment can push new versions or add/remove blades.\ (Even though macOS packages are “manual distribution,” Check Point still documents upgrade operations via the web console for certain workflows.) [sc1.checkpoint.com]

10) Uninstall (and mandatory “Reset computer” step)

On the Mac, run the uninstall script:

sudo "/Library/Application Support/Checkpoint/Endpoint Security/uninstall.sh"

[sc1.checkpoint.com], [sc1.checkpoint.com]

After uninstall, the admin must reset the computer object in SmartEndpoint (Check Point explicitly calls this out). [sc1.checkpoint.com], [sc1.checkpoint.com]


Common pitfalls / troubleshooting tips (quick)


Two questions so I can tailor this to your environment (no need to answer if you just want the generic runbook)

  1. Are your Macs MDM-managed (Jamf / Intune / Kandji), or is this a manual install scenario? [sc1.checkpoint.com]
  2. Which blades are you deploying (e.g., Threat Prevention, Firewall/App Control, Media Encryption, Remote Access VPN)? This matters for which MDM profiles you must push. [sc1.checkpoint.com], [sc1.checkpoint.com]

If you tell me MDM type + target macOS versions + blades, I can provide a more “copy/paste” deployment recipe (e.g., Jamf policy layout or Intune profile checklist) aligned to the exact permissions your blade set requires.

 

Best,
Andy

View solution in original post

0 Kudos
4 Replies
PhoneBoy
Admin
Admin

I imagine the steps would be similar to this video: https://community.checkpoint.com/t5/Check-Point-for-Beginners/How-to-deploy-and-upgrade-Endpoint-Sec... 
Except instead of an .img, you'd use the .pkg file.

AfterMath
Collaborator

Hi @PhoneBoy 
Thanks for feedback


The steps mentioned were followed as suggested — including the fact that Deployment Rules are already configured in the platform.
The issue is not related to deployment itself, but rather to the initial communication between the macOS endpoint and the Endpoint Security Server.

On Windows, when downloading the Initial Client, a lightweight package is provided whose primary purpose is only to establish communication with the server. The installation of blades is then handled later through Deployment Rules.

On macOS, the behavior is different and expected:

  • The so-called initial package is delivered as a full package

  • During the download process, it is necessary to select the blades

  • The installer is provided as a ZIP archive containing multiple files, where the .app file is the main installer

The question is: what should be done with the ZIP file, since it contains multiple files?

0 Kudos
PhoneBoy
Admin
Admin

If my past experience is any indication, you only need to run the .app file.
Not sure anything else from the .zip is necessary.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Hey @AfterMath 

I would definitely open TAC case if any issues after deployment.

Btw, FWIW, I ran your query through MS AI copilot and below is what it gave me:

****************************************************************************

Hi — here’s a practical, step-by-step runbook for deploying Harmony / Endpoint Security Client E89.10 on macOS when your management is R81.20 on‑prem (Web UI Management + SmartEndpoint). I’ll cover package prep in SmartEndpoint, deployment options (manual vs Tiny Agent), macOS permissions (Full Disk Access + Network Extension), and verification / uninstall.


0) Quick compatibility checklist (do this first)

  1. Management server compatibility\ E89.x macOS clients (including E89.10) are supported with Endpoint Security Management Servers R81.10 / R81.20 / R82 (on‑prem and cloud), with E89.00 and higher = “yes”. [sc1.checkpoint.com]

  2. macOS version support\ E89.x supports macOS releases per the “Client Requirements” table; notably macOS Sequoia (15) is GA-supported starting E89.00 and later, and other versions map accordingly.\ Also, the E89.10 download entry lists supported macOS versions (e.g., macOS 13/14/15 in the download details). [sc1.checkpoint.com] [support.ch…kpoint.com]

  3. Know the “two macOS approvals” you’ll need\ Starting E88.00+:


1) Get the E89.10 macOS installer package

Option A — download from Check Point Support (most common)

  • Download the E89.10 macOS package (example filename shown as EPS_E89.10_ALL_app.zip on the download page). [support.ch…kpoint.com]
  • If you need to confirm the exact build mapping for E89.10 on macOS, Check Point publishes build numbers in their “Standalone Clients – Versions and Build Numbers” SK. [support.ch…kpoint.com]

Option B — if you already have the ZIP from another environment

  • You can still upload it into your Endpoint package repository from SmartEndpoint (next section). [sc1.checkpoint.com]

2) Upload the client package into the Package Repository (SmartEndpoint)

This is the part that’s often missing from “short” docs: you must load/upload the package into the repository so SmartEndpoint can produce the customized Mac installer ZIP you distribute.

  1. Open SmartEndpoint
  2. Go to Deployment tab
  3. Use Load client installer file (or equivalent repository load action) to upload the new client package into the repository. [sc1.checkpoint.com], [sc1.checkpoint.com]
  4. Notes / pitfalls:
    • Check Point warns you cannot mix package “types” in one repository for a given release (for Windows they mention Dynamic vs MSI); repository hygiene matters for successful deployments. [sc1.checkpoint.com]
    • After upload, packages are stored on the server (default path is documented). [sc1.checkpoint.com]

3) Build the macOS installer ZIP from SmartEndpoint (the one you deploy)

In SmartEndpoint → Deployment tab:

  1. Under Mac Client, click Download. [sc1.checkpoint.com], [sc1.checkpoint.com]
  2. In the download window:
  3. SmartEndpoint outputs Endpoint_Security_Installer.zip — this is what you distribute to Macs. [sc1.checkpoint.com], [sc1.checkpoint.com]

Important design constraint: macOS client packages are distributed manually and do not use the classic “Software Deployment” flow the way Windows does. [sc1.checkpoint.com], [sc1.checkpoint.com]


4) Choose your deployment method

Method 1 — Manual distribution (simple / small fleets)

You distribute Endpoint_Security_Installer.zip using:

Method 2 — “Tiny Agent” for automatic initial install (better for scale)

Check Point’s Tiny Agent is a small app that downloads and installs the initial client automatically.\ It is available for on‑prem deployments with Endpoint Security Management Server R81.20 or higher. [sc1.checkpoint.com]

To download Tiny Agent (per Check Point flow):

  • In Web UI, click Overview → Download Endpoint (top banner), or
  • Policy → Deployment Policy → Software Deployment → Download Endpoint (top banner).\ This downloads EPS_TINY.zip, unzip it and run the app. [sc1.checkpoint.com]

5) Pre-approve macOS permissions (MDM best practice)

Why this matters

Without MDM profiles, end users must manually approve system components and Full Disk Access; Check Point explicitly recommends using MDM (Jamf/Intune) to avoid user prompts by deploying the necessary payloads. [sc1.checkpoint.com]

What you need to push via MDM

Check Point’s MDM deployment guide lists profile files including:

If you do not have MDM, you can still proceed—users will just need to approve permissions interactively. [sc1.checkpoint.com], [sc1.checkpoint.com]


6) Install on the Mac (end-user or scripted hands-on steps)

On the macOS endpoint:

  1. Copy Endpoint_Security_Installer.zip to a local disk (not a file share). [sc1.checkpoint.com]
  2. Double‑click the ZIP to expand it. [sc1.checkpoint.com], [sc1.checkpoint.com]
  3. Launch the extracted .app (“Check Point Endpoint Security Installer”). [sc1.checkpoint.com], [sc1.checkpoint.com]
  4. Click Install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  5. Enter macOS admin username/password to authorize the install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  6. Wait for “installed successfully” and click Close; the menu bar icon should appear. [sc1.checkpoint.com], [sc1.checkpoint.com]

7) Post-install: approve permissions (if not already handled by MDM)

A) Full Disk Access (FDA)

Starting E88.00+, only the main executable “Check Point Endpoint Security” needs Full Disk Access.\ If not pre-approved by MDM, the user must allow it in macOS privacy settings. [sc1.checkpoint.com] [sc1.checkpoint.com], [sc1.checkpoint.com]

B) Network Extension

Starting E88.00+, the client needs approval for “Check Point Network Extension”.\ On newer macOS versions (example shared in the community), the setting is typically found under:\ System Settings → General → Login Items & Extensions → Network Extensions. [sc1.checkpoint.com] [community….kpoint.com]

(If you’re using MDM, push the Network Extension .mobileconfig so the user doesn’t need to do this manually.) [sc1.checkpoint.com], [sc1.checkpoint.com]


8) Verify the client is enrolled and healthy

  1. Confirm the Endpoint Security icon is in the macOS menu bar after install. [sc1.checkpoint.com], [sc1.checkpoint.com]
  2. From SmartEndpoint/Web UI, confirm the endpoint appears and pulls policy (normal heartbeat).
  3. If you see “Endpoint Security needs user authentication”, it can occur because internal communication may require a valid Kerberos ticket, and the user may need to run Authenticate from the client menu. [sc1.checkpoint.com]

9) Upgrades and blade changes

  • Upgrades can be performed the same way as installations; additionally, the Endpoint Web Management Console Software Deployment can push new versions or add/remove blades.\ (Even though macOS packages are “manual distribution,” Check Point still documents upgrade operations via the web console for certain workflows.) [sc1.checkpoint.com]

10) Uninstall (and mandatory “Reset computer” step)

On the Mac, run the uninstall script:

sudo "/Library/Application Support/Checkpoint/Endpoint Security/uninstall.sh"

[sc1.checkpoint.com], [sc1.checkpoint.com]

After uninstall, the admin must reset the computer object in SmartEndpoint (Check Point explicitly calls this out). [sc1.checkpoint.com], [sc1.checkpoint.com]


Common pitfalls / troubleshooting tips (quick)


Two questions so I can tailor this to your environment (no need to answer if you just want the generic runbook)

  1. Are your Macs MDM-managed (Jamf / Intune / Kandji), or is this a manual install scenario? [sc1.checkpoint.com]
  2. Which blades are you deploying (e.g., Threat Prevention, Firewall/App Control, Media Encryption, Remote Access VPN)? This matters for which MDM profiles you must push. [sc1.checkpoint.com], [sc1.checkpoint.com]

If you tell me MDM type + target macOS versions + blades, I can provide a more “copy/paste” deployment recipe (e.g., Jamf policy layout or Intune profile checklist) aligned to the exact permissions your blade set requires.

 

Best,
Andy
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events