![]() ![]() Although that’s far from simple in macOS, you’ll find third-party tools like my own SilentKnight, silnite and XProCheck a good start. If this article does nothing else, please take the opportunity to check that your Macs are fully up to date and that their protection is functioning properly. We all like systems that don’t trouble us with unnecessary alerts or notifications, but when they’re so secretive that ordinary users don’t know that macOS security protection isn’t working, they’re a vulnerability in themselves. he hadn’t been informed that there were security updates waiting to be installed. ![]() he hadn’t been informed that his Mac’s security software was woefully out of date.he didn’t know that macOS had new protection that regularly scans for known malware and can remove it.He would have taken whatever action was necessary to download and install the current version of XProtect Remediator, and after his small slip could have had immediate confidence that he hadn’t installed malware.īut being one of the tens of millions of ordinary users of macOS: John’s problems wouldn’t have happened if macOS had alerted him to the fact that its security protection was so badly out of date. Unravelling just what went wrong with Software Update is unlikely to prove possible, as is often the case. In John’s case, this doesn’t appear to be the result of the known and reported bug in installing security data updates through a local Content Caching server. It wasn’t until a week later that he was able to use third-party software to download and install the latest security data updates, and provide his Mac with the full protection that he had been expecting all the time. John had his little misadventure on 4 September. Somehow, though, Software Update had failed to install any of those six updates, and not even bothered to inform John. It was then that I got him to check the version of XProtect Remediator installed on his Mac, which turned out to be 62, pushed by Apple on 17 June, and subsequently updated six times to reach the current version 72. Whatever XProtect Remediator was doing, it wasn’t prepared to let anyone else know. I encouraged him to install the waiting update to macOS 12.5.1, but that didn’t help. These were completely unhelpful, consisting only of entries containingĪnd nothing else. Sadly, he wasn’t able to identify a suitable product to perform a one-off scan for malicious software without starting to pay for it by subscription, so his only check is that from XProtect Remediator.Īs XProtect Remediator in current macOS only reports its scans in the log, he downloaded and ran my free utility XProCheck to view its scan reports. I also suggested that he looked at a third-party anti-malware product for a second opinion. If they didn’t detect any malware, then he’d be more than half way to knowing that what he’d done hadn’t caused something to regret. It had an attachment which made him wonder if he had perhaps run the risk of malware being installed.Īs he was running Monterey 12.4 at the time, my immediate suggestion was for him to check the results from his XProtect Remediator scans. ![]() Although he’s diligent about not opening suspicious emails, when trying to open an innocent message, he inadvertently opened something that looked more unpleasant in intent. This particular user, I’ll call him John, posed a common problem. The reason, as always, is because macOS is so secretive about its protection that the user doesn’t know when it has failed. It isn’t the first time that a Mac user has asked me a simple question, only to discover that, while they thought their Mac was fully protected against malicious software, because of shortcomings in macOS, their Mac has been vulnerable all the time. ![]()
0 Comments
Leave a Reply. |