{"id":299,"date":"2022-04-06T15:22:52","date_gmt":"2022-04-06T19:22:52","guid":{"rendered":"https:\/\/blogs.uml.edu\/information-security\/?p=299"},"modified":"2022-04-06T15:30:24","modified_gmt":"2022-04-06T19:30:24","slug":"mac-endpoint-protection-update","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2022\/04\/06\/mac-endpoint-protection-update\/","title":{"rendered":"Mac endpoint protection update"},"content":{"rendered":"\n<p>On Monday April 11th, Information Technology will be pushing out an update to all Apple Mac computers which will include the following:<\/p>\n\n\n\n<div class=\"wp-container-1 wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<ol><li><strong>The removal of Sophos endpoint protection software and the installation of Microsoft Defender endpoint protection software.<\/strong>  <\/li><\/ol>\n\n\n\n<ul><li>This only applies to systems running macOS 10.15 (Catalina) and higher. Systems running versions less than macOS 10.15 (Catalina) will receive a future communication shortly. \u00a0After completion, you will see this notification and your computer will restart in 15 minutes to allow you to save your documents.<\/li><\/ul>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/Screen-Shot-2022-04-06-at-2.59.35-PM-1.png\"><img loading=\"lazy\" src=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/Screen-Shot-2022-04-06-at-2.59.35-PM-1.png\" alt=\"\" class=\"wp-image-302\" width=\"481\" height=\"256\" srcset=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/Screen-Shot-2022-04-06-at-2.59.35-PM-1.png 457w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/Screen-Shot-2022-04-06-at-2.59.35-PM-1-300x160.png 300w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/figure>\n\n\n\n<p><strong>2. The installation of a new filevault encryption key to ensure the data on your computer remains protected.   <\/strong>This will prompt you to enter the password you use to log into your mac.<\/p>\n\n\n\n<ul><li>This process will occur on all mac systems and you will see the following 3 prompts to guide you through this process:<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1.png\"><img loading=\"lazy\" src=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1-1024x634.png\" alt=\"\" class=\"wp-image-303\" width=\"511\" height=\"316\" srcset=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1-1024x634.png 1024w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1-300x186.png 300w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1-768x475.png 768w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1-485x300.png 485w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message1.png 1170w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2.png\"><img loading=\"lazy\" src=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2-1024x562.png\" alt=\"\" class=\"wp-image-304\" width=\"533\" height=\"293\" srcset=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2-1024x562.png 1024w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2-300x165.png 300w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2-768x422.png 768w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2-500x274.png 500w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message2.png 1064w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3.png\"><img loading=\"lazy\" src=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3.png\" alt=\"\" class=\"wp-image-305\" width=\"552\" height=\"340\" srcset=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3.png 988w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3-300x185.png 300w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3-768x474.png 768w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2022\/04\/filevault-message3-486x300.png 486w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Please contact Tech Services at 978 934 3457 should you have further questions or difficulties.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Monday April 11th, Information Technology will be pushing out an update to all Apple Mac computers which will include the following: The removal of Sophos endpoint protection software and the installation of Microsoft Defender endpoint protection software. This only &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2022\/04\/06\/mac-endpoint-protection-update\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":272,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":3,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/299\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}