- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
Hi everyone,
I need to install Harmony Endpoint Security 89.10 on macOS computers.
I’m using R81.20, on-premises, with Web UI Management and SmartEndpoint.
I’ve already looked for official documentation but haven’t found detailed instructions. Could someone share the step-by-step procedure for installation and deployment on this OS?
I imagine the steps would be similar to this video: https://community.checkpoint.com/t5/Check-Point-for-Beginners/How-to-deploy-and-upgrade-Endpoint-Sec...
Except instead of an .img, you'd use the .pkg file.
Hey @AfterMath
I would definitely open TAC case if any issues after deployment.
Btw, FWIW, I ran your query through MS AI copilot and below is what it gave me:
****************************************************************************
Hi — here’s a practical, step-by-step runbook for deploying Harmony / Endpoint Security Client E89.10 on macOS when your management is R81.20 on‑prem (Web UI Management + SmartEndpoint). I’ll cover package prep in SmartEndpoint, deployment options (manual vs Tiny Agent), macOS permissions (Full Disk Access + Network Extension), and verification / uninstall.
Management server compatibility\ E89.x macOS clients (including E89.10) are supported with Endpoint Security Management Servers R81.10 / R81.20 / R82 (on‑prem and cloud), with E89.00 and higher = “yes”. [sc1.checkpoint.com]
macOS version support\ E89.x supports macOS releases per the “Client Requirements” table; notably macOS Sequoia (15) is GA-supported starting E89.00 and later, and other versions map accordingly.\ Also, the E89.10 download entry lists supported macOS versions (e.g., macOS 13/14/15 in the download details). [sc1.checkpoint.com] [support.ch…kpoint.com]
Know the “two macOS approvals” you’ll need\ Starting E88.00+:
This is the part that’s often missing from “short” docs: you must load/upload the package into the repository so SmartEndpoint can produce the customized Mac installer ZIP you distribute.
In SmartEndpoint → Deployment tab:
✅ Important design constraint: macOS client packages are distributed manually and do not use the classic “Software Deployment” flow the way Windows does. [sc1.checkpoint.com], [sc1.checkpoint.com]
You distribute Endpoint_Security_Installer.zip using:
Check Point’s Tiny Agent is a small app that downloads and installs the initial client automatically.\ It is available for on‑prem deployments with Endpoint Security Management Server R81.20 or higher. [sc1.checkpoint.com]
To download Tiny Agent (per Check Point flow):
Without MDM profiles, end users must manually approve system components and Full Disk Access; Check Point explicitly recommends using MDM (Jamf/Intune) to avoid user prompts by deploying the necessary payloads. [sc1.checkpoint.com]
Check Point’s MDM deployment guide lists profile files including:
If you do not have MDM, you can still proceed—users will just need to approve permissions interactively. [sc1.checkpoint.com], [sc1.checkpoint.com]
On the macOS endpoint:
Starting E88.00+, only the main executable “Check Point Endpoint Security” needs Full Disk Access.\ If not pre-approved by MDM, the user must allow it in macOS privacy settings. [sc1.checkpoint.com] [sc1.checkpoint.com], [sc1.checkpoint.com]
Starting E88.00+, the client needs approval for “Check Point Network Extension”.\ On newer macOS versions (example shared in the community), the setting is typically found under:\ System Settings → General → Login Items & Extensions → Network Extensions. [sc1.checkpoint.com] [community….kpoint.com]
(If you’re using MDM, push the Network Extension .mobileconfig so the user doesn’t need to do this manually.) [sc1.checkpoint.com], [sc1.checkpoint.com]
On the Mac, run the uninstall script:
sudo "/Library/Application Support/Checkpoint/Endpoint Security/uninstall.sh"
[sc1.checkpoint.com], [sc1.checkpoint.com]
After uninstall, the admin must reset the computer object in SmartEndpoint (Check Point explicitly calls this out). [sc1.checkpoint.com], [sc1.checkpoint.com]
If you tell me MDM type + target macOS versions + blades, I can provide a more “copy/paste” deployment recipe (e.g., Jamf policy layout or Intune profile checklist) aligned to the exact permissions your blade set requires.
I imagine the steps would be similar to this video: https://community.checkpoint.com/t5/Check-Point-for-Beginners/How-to-deploy-and-upgrade-Endpoint-Sec...
Except instead of an .img, you'd use the .pkg file.
Hi @PhoneBoy
Thanks for feedback
The steps mentioned were followed as suggested — including the fact that Deployment Rules are already configured in the platform.
The issue is not related to deployment itself, but rather to the initial communication between the macOS endpoint and the Endpoint Security Server.
On Windows, when downloading the Initial Client, a lightweight package is provided whose primary purpose is only to establish communication with the server. The installation of blades is then handled later through Deployment Rules.
On macOS, the behavior is different and expected:
The so-called initial package is delivered as a full package
During the download process, it is necessary to select the blades
The installer is provided as a ZIP archive containing multiple files, where the .app file is the main installer
The question is: what should be done with the ZIP file, since it contains multiple files?
If my past experience is any indication, you only need to run the .app file.
Not sure anything else from the .zip is necessary.
Hey @AfterMath
I would definitely open TAC case if any issues after deployment.
Btw, FWIW, I ran your query through MS AI copilot and below is what it gave me:
****************************************************************************
Hi — here’s a practical, step-by-step runbook for deploying Harmony / Endpoint Security Client E89.10 on macOS when your management is R81.20 on‑prem (Web UI Management + SmartEndpoint). I’ll cover package prep in SmartEndpoint, deployment options (manual vs Tiny Agent), macOS permissions (Full Disk Access + Network Extension), and verification / uninstall.
Management server compatibility\ E89.x macOS clients (including E89.10) are supported with Endpoint Security Management Servers R81.10 / R81.20 / R82 (on‑prem and cloud), with E89.00 and higher = “yes”. [sc1.checkpoint.com]
macOS version support\ E89.x supports macOS releases per the “Client Requirements” table; notably macOS Sequoia (15) is GA-supported starting E89.00 and later, and other versions map accordingly.\ Also, the E89.10 download entry lists supported macOS versions (e.g., macOS 13/14/15 in the download details). [sc1.checkpoint.com] [support.ch…kpoint.com]
Know the “two macOS approvals” you’ll need\ Starting E88.00+:
This is the part that’s often missing from “short” docs: you must load/upload the package into the repository so SmartEndpoint can produce the customized Mac installer ZIP you distribute.
In SmartEndpoint → Deployment tab:
✅ Important design constraint: macOS client packages are distributed manually and do not use the classic “Software Deployment” flow the way Windows does. [sc1.checkpoint.com], [sc1.checkpoint.com]
You distribute Endpoint_Security_Installer.zip using:
Check Point’s Tiny Agent is a small app that downloads and installs the initial client automatically.\ It is available for on‑prem deployments with Endpoint Security Management Server R81.20 or higher. [sc1.checkpoint.com]
To download Tiny Agent (per Check Point flow):
Without MDM profiles, end users must manually approve system components and Full Disk Access; Check Point explicitly recommends using MDM (Jamf/Intune) to avoid user prompts by deploying the necessary payloads. [sc1.checkpoint.com]
Check Point’s MDM deployment guide lists profile files including:
If you do not have MDM, you can still proceed—users will just need to approve permissions interactively. [sc1.checkpoint.com], [sc1.checkpoint.com]
On the macOS endpoint:
Starting E88.00+, only the main executable “Check Point Endpoint Security” needs Full Disk Access.\ If not pre-approved by MDM, the user must allow it in macOS privacy settings. [sc1.checkpoint.com] [sc1.checkpoint.com], [sc1.checkpoint.com]
Starting E88.00+, the client needs approval for “Check Point Network Extension”.\ On newer macOS versions (example shared in the community), the setting is typically found under:\ System Settings → General → Login Items & Extensions → Network Extensions. [sc1.checkpoint.com] [community….kpoint.com]
(If you’re using MDM, push the Network Extension .mobileconfig so the user doesn’t need to do this manually.) [sc1.checkpoint.com], [sc1.checkpoint.com]
On the Mac, run the uninstall script:
sudo "/Library/Application Support/Checkpoint/Endpoint Security/uninstall.sh"
[sc1.checkpoint.com], [sc1.checkpoint.com]
After uninstall, the admin must reset the computer object in SmartEndpoint (Check Point explicitly calls this out). [sc1.checkpoint.com], [sc1.checkpoint.com]
If you tell me MDM type + target macOS versions + blades, I can provide a more “copy/paste” deployment recipe (e.g., Jamf policy layout or Intune profile checklist) aligned to the exact permissions your blade set requires.
Hi are you asking this because you are having trouble installing on macOS?
We've been installing it on 3 new Macbooks running macOS 26 and shortly after installing, the client will not open. Only computers running the client prior to having macOS 26 will the client actually run.
So I'm curious if maybe you are running into the same thing
What client version?
I've tried 88.7, 89.1, and 89.2
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 3 | |
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesThu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY