Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

How to set Deep Packet Inspection on macOS Monterey

Information

This only applies starting with 5.4.0.5 server version and 2.4.0.9 client version.

After the Endpoint Protector Client is installed and the desired Content Aware Policy is created, follow the next steps:

1. Reach Endpoint Protector Server and activate Deep Packet Inspection from the desired Device Control subsection: User/Computer/Group/Global Settings -> Manage Settings -> Endpoint Protector Client -> Deep Packet Inspection.



2. Go to System Configuration -> System Settings -> Server Certificate Stack -> Regenerate Server Certificate Stack and hit the Regenerate button.



3. Wait a few moments until the server certificate is regenerated.

4. Go to System Configuration -> System Settings -> Deep Packet Inspection Certificate -> Deep Packet Inspection certificate download -> ON -> Download Client CA Certificate.



5. Open the Keychain Access application from your macOS and make sure System is selected.



6. Decompress the downloaded ClientCerts file.

7. Select cacert.pem file and drag and drop it on Keychain Access - > System



8. The newly added certificate will have an ‘x’ on it. Double click on it and at Trust -> When using this certificate select ‘Always Trust’.



9. Save the changes.
Request Demo
check mark

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.

* Your privacy is important to us. Check out our Privacy Policy for more information.