In Symantec Endpoint Protection (SEP) 14.1.x and later, you have at least two options for downloading LiveUpdate (LU) content to Symantec Endpoint Protection clients for Mac and Linux.
- Open Downloads On Mac
- How To Allow Downloads On Mac From Unidentified Developers
- How To Allow Downloads On Mac From Gmail
- How To Allow Safari Downloads On Mac
An increasing number of people are finding a wide range of websites – including ours – are asking permission to allow downloads to your Mac from googlesyndication.com. The problem is a. Jan 04, 2020 Mac: How to always allow downloads in Safari. Open Safari on your Mac. Click Safari in the menu bar (top left corner) then choose Preferences. At the top of the window, click Websites.
Note: Linux client support is added with Symantec Endpoint Protection 12.1.5 and is only available starting with that release.
- Use Symantec LiveUpdate Administrator 2.x (LUA 2.x). This is the best option for installations with larger numbers of Mac and/or Linux computers.
- For smaller installations, you can configure the Apache web server as a reverse proxy. This enables the Apache web server installed along with Symantec Endpoint Protection Manager (SEPM) to download and cache the LU content for Mac and Linux clients locally whenever new content is published. This configuration results in saving of external network bandwidth.
Below are the instructions to set up the Apache web server in Symantec Endpoint Protection Manager to allow Symantec Endpoint Protection clients for Mac and Linux to download LiveUpdate (LU) content by the webserver. Please note that this solution enables Symantec Endpoint Protection Manager to act as a cache: it does not process Mac or Linux definitions into .dax files as it does with Windows definitions. It does not enable Symantec Endpoint Protection clients for Mac or Linux to update from a Group Update Provider (GUP).
Note: You can only make these configuration changes on the enterprise version of Symantec Endpoint Protection. These instructions do not apply to Symantec Endpoint Protection Small Business Edition 12.1 (SEP SBE).

- Configure the Apache web server in Symantec Endpoint Protection Manager
- Update LiveUpdate policy for Mac and Linux clients to point to new LiveUpdate server
- Manage cache file size
- Performance and scale
- Security and compatibility
Configure the Apache web server in Symantec Endpoint Protection Manager
Take the following steps to configure Apache web server to serve as a reverse proxy:
- Stop semwebsrv (Symantec Endpoint Protection Manager Webserver) and semsrv (Symantec Endpoint Protection Manager).
- Create a folder called cache-root in the Apache folder of your Symantec Endpoint Protection Manager installation directory, e.g.
SEPM_Installapachecache-root
The default path of SEPM_Install is as follows:
Ensure that the account running Symantec Endpoint Protection Manager Webserver has full control of SEPM_Installapachecache-root.- 64-bit systems: C:Program Files (x86)SymantecSymantec Endpoint Protection Manager
- 32-bit systems: C:Program FilesSymantecSymantec Endpoint Protection Manager (12.1.x only)
- Verify if the following files are present in the folder apachemodules:
If the files are not present, copy the files from the downloaded installation folder or DVD from ToolsApache-ReverseProxy to SEPM_Installapachemodules. Refer to the section Security and Compatibility for more details.
- mod_cache.so
- mod_cache_disk.so (12.1.5 and later)
- mod_proxy.so
- mod_proxy_http.so
- mod_setenvif.so
- To make a backup of the original configuration file, navigate to SEPM_Installapacheconf, and then copy httpd.conf to httpd-orig.conf.
- Make the following changes to httpd.conf:
- Locate the following line, and add the character
#
to comment it out, as shown:#AsyncSendFile anydirectory
- Locate the following lines and remove the character # to uncomment them, and make the following change, where SEPM_Install is the actual path of your Symantec Endpoint Protection Manager installation (use forward slashes).
AsyncSendFile givendirectory
ForceAsyncSendFile 'SEPM_Install/Inetpub/content' - Optionally, to add cache logging, search for the following line in httpd.conf:
LogFormat '%h %l %u %t '%r' %>s %b' common
... and replace it with:LogFormat '%h %l %u %t %{cache-status}e '%r' %>s %b' common
- Add the following lines to the end. Replace SEPM_Install in the text below with the actual path of your Symantec Endpoint Protection Manager installation.
For 12.1.5 and later:
Note: Red text indicates file names that have changed from the version of Apache included with 12.1.4. If you previously implemented this functionality for 12.1.4, you only need to update the changed file names in httpd.conf.
- Locate the following line, and add the character
- Save and then close the file.
- Start semwebsrv (Symantec Endpoint Protection Manager Webserver) and semsrv (Symantec Endpoint Protection Manager).
To test that the proxy server is running by downloading an LU file, click Start > Run, and then enter http://localhost:8014/luproxy/masttri.zip. If your Symantec Endpoint Protection Manager Apache web server uses a different port than 8014, replace 8014 with your actual port number in the above URL.
Note: While the massttri.zip file is requested via a local URL address, the request is passed to Symantec's public LiveUpdate server. Make sure that the connection to LiveUpdate web domains can be established from the Symantec Endpoint Protection Manager server according to TECH102059. The reverse proxy also requires a direct connection to Symantec's LiveUpdate servers - it cannot itself go through another proxy.
The LU download requests to the Apache web server are logged in a separate log file, located in SEPM_Installapachelogsaccess-%Z.log.
Update LiveUpdate policy for Mac and Linux clients to point to new LiveUpdate server
Take the following steps to update your LiveUpdate policy for Mac and Linux clients for your desired groups. Once the policy is updated, these clients will point to the newly configured Apache web server for downloading LU content.
- Within Symantec Endpoint Protection Manager, click Policies > LiveUpdate. On the LiveUpdate Settings tab, double-click the LiveUpdate Settings policy that applies to your desired groups.
- Click Use a specified internal LiveUpdate Server under Mac Settings > Server Settings (or Linux Settings > Server Settings) and specify the name 'SEPM HTTP LU Proxy,' with the corresponding URL: 'http://ServerIP:8014/luproxy' or 'http://ServerName:8014/luproxy'
Where ServerIP or ServerName represents the IP number or name of the server that hosts Symantec Endpoint Protection Manager. If the Symantec Endpoint Protection Manager Apache web server uses a different port that 8014, replace 8014 with your actual port number in the above URL. - Add Symantec LiveUpdate server as a fallback mechanism (this is optional, because this is always a fallback option). Use http://liveupdate.symantecliveupdate.com.
- Enable download randomization under Mac Settings > Schedule (or Linux Settings > Schedule). If the option is not greyed out, check Randomize the start time. This prevents the Apache web server from getting overloaded at certain times in a day.
Additionally, on SEP 12.1.x clients for Linux, edit the liveupdate.conf file and set serverlogging=false. SEP For Linux 14.0 does not require this setting. See TECH230862.
Managing cache file size
To manage the size of your cache file, take the following steps.
- Verify if the htcacheclean.exe file is present in the following folder:
SEPM_Installapachebin - If the file is not present in the mentioned location, copy htcacheclean.exe from the ToolsApache-ReverseProxy folder on your DVD to SEPM_Installapachebin
- Enter the following command while logged in with an account that has full access rights on the cache-root folder:
htcacheclean -n -t -d1440 -l1024M -p'SEPM_Install/apache/cache-root'
This will run the htcacheclean tool in daemon mode. The cache cleaning will be done on a daily interval. The maximum cache size allowed on disk is 1 GB.
To automatically start the htcacheclean daemon every time Windows starts, take the following steps.
- Hold down the Windows key on your keyboard and press the letter R to open the Run dialog. Type taskschd.msc, and then click OK.
- In the Task Scheduler, in the right pane, click Create Basic Task.
- Name the new task with a description such as Manage Apache Cache Size, and then click Next.
- To set the task to run every time Windows starts, in the Task Trigger pane, click When the computer starts, and then click Next.
- In the Action dialog box, click Start a program, and then click Next.
- Enter the full path to htcacheclean into Program/script:
SEPM_Installapachebinhtcacheclean.exe - Enter the following arguments into Add arguments (optional), and then click Next.
-n -t -d1440 -l1024M -p'SEPM_Install/apache/cache-root' - To complete adding the scheduled task, click Finish.
- In the Windows Task Scheduler library, right-click the task you created, and then click Properties.
- In the Settings tab, click to deselect Stop the task if it runs longer than, and then click OK.
Since the task does not run until you restart the system, you can run it now. In the Task Scheduler, right-click the task you created, and then click Run.
Note: Ensure that the user account running the task has full control on the folder SEPM_Installapachecache-root.
Performance and scale
This configuration is designed for small numbers of Mac and/or Linux clients. You should only use this setup if there are only a few Mac and/or Linux clients and the network connecting clients and Symantec Endpoint Protection Manager has good bandwidth throughput. Assuming that each client downloads roughly 500KB of LU content on daily basis, 2000 Mac or Linux clients will result in a download of approximately 1 GB of LU content daily from the Apache web server. For configurations having large numbers of clients, you should consider an alternative like Symantec LiveUpdate Administrator.
Security and compatibility
Symantec suggests the use of only Symantec-signed binaries for Apache modules that are mentioned in this article. These signed binaries are available on the Symantec Endpoint Protection downloaded installation file. Note that the required binaries also get installed along with Symantec Endpoint Protection Manager for versions 12.1.4 and later.
For Symantec Endpoint Protection 14:
- The downloaded full installation file, ToolsApache-ReverseProxy
Because new vulnerabilities may be published after the publication of this article, please check the vulnerabilities published by the Apache project for the appropriate version of Apache web server: http://httpd.apache.org/security/
SEPM Upgrades
Note that upgrading the SEP Manager may reset or overwrite this configuration file. As such, post-SEPM upgrade ensure the changes made to httpd.conf are checked and corrected.
NOTE:
Between mid October 2019 and mid February 2020 everyone in the Army was migrated to use their PIV Authentication certificate for Email access. You no longer use the Email certificate for Enterprise Email or any CAC enabled websites
Mac users who choose to upgrade (or already have upgraded) to Mac OS Catalina (10.15.x) or Big Sur (11.xx.x) will need to uninstall all 3rd Party CAC enablers per https://militarycac.com/macuninstall.htm AND reenable the native smart card ability (very bottom of macuninstall link above)
If you purchased your Mac with OS Catalina (10.15.x) or Big Sur (11.xx.x) already installed, you can skip the uninstall part above and follow the instructions below.
6 'high level' steps needed, follow down the page to make this a painless systematic process
1. | Is your CAC reader 'Mac friendly'? |
2. | Can your Mac 'see' the reader? |
3. | Verify which version of Mac OS you have |
4. | Figure out which CAC (ID card) you have |
5. | Install the DoD certificates |
5a. | Additional DoD certificate installation instructions for Firefox users |
6. | Decide which CAC enabler you want to use (except for 10.12-.15 & 11) |
Step 1: Is your CAC reader Mac friendly?
Visit the USB Readers page to verify the CAC reader you have is Mac friendly.
Visit the USB-C Readers page to verify the CAC reader you have is Mac friendly.
'Some, not all' CAC readers may need to have a driver installed to make it work.
NOTE: Readers such as: SCR-331 & SCR-3500A may need a firmware update (NO OTHER Readers need firmware updates).
Information about these specific readers are in Step 2
Step 2: Can your Mac 'see' the reader?
Plug the CAC reader into an open USB port before proceeding, give it a few moments to install
Step 2a: Click the Apple Icon in the upper left corner of the desktop, select 'About This Mac'
Step 2b: Click 'System Report...' (button)
Step 2c: Verify the CAC reader shows in Hardware, USB, under USB Device Tree. Different readers will show differently, most readers have no problem in this step. See Step 2c1 for specific reader issues.
Step 2c1: Verify firmware version on your SCR-331, SCR-3310 v2.0, GSR-202, 202V, 203, or SCR-3500a reader. If you have a reader other than these 6, Proceed directly to step 3
Step 2c1a-SCR-331 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCRx31 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 5.25, you need to update your firmware to 5.25. If you are already at 5.25, your reader is installed on your system, and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1b-SCR-3310 v2.0 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCR3310 v2.0 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 6.02, it will not read the 'G+D FIPS 201 SCE 7.0' CAC on Mac OS 11.xx.x or 10.15.7. I contacted HID (the company that makes these readers) on 14 DEC 2020 to find a way to update the firmware to 6.02. They said there is not firmware update for the reader. If your reader is older, you may need a new one. Please look at: https://militarycac.com/usbreaders.htm to find a compatible one. If you are already at version 6.02, your reader should work fine on your Mac and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1c-SCR-3500A reader
If you have the SCR3500A P/N:905430-1 CAC reader,you may need to install this driver, as the one that installs automatically will not work on most Macs. Hold the control key [on your keyboard] when clicking the .pkg file [with your mouse], select [the word] Open
Step 3: Verify which version of MacOS you have?
(You need to know this information for step 6)
Step 3a: Click the Apple Icon in the upper left corner of your desktop and select 'About This Mac'
Step 3b: Look below Mac OS X for: Example: Version 10.X.X, or 11.X
Step 4: Figure out which CAC (ID Card) you have
(You need to know this information for step 6)
Look at the top back of your ID card for these card types. If you have any version other than the seven shown below, you need to visit an ID card office and have it replaced. All CACs [other than these six] were supposed to be replaced prior to 1 October 2012.
Find out how to flip card over video
Step 5: Install the DoD certificates (for Safari and Chrome Users)
Go to Keychain Access
Click: Go (top of screen), Utilities, double click Keychain Access.app
(You can also type: keychain access using Spotlight (this is my preferred method))
Select login (under Keychains),and All Items (under Category).
Download the 5 files via links below (you may need to <ctrl> click, select Download Linked File As... on each link) Save to your downloads folder
Please know... IF You have any DoD certificates already located in your keychain access, you will need to delete them prior to running the AllCerts.p7b file below.
https://militarycac.com/maccerts/AllCerts.p7b,
https://militarycac.com/maccerts/RootCert2.cer,
https://militarycac.com/maccerts/RootCert3.cer,
https://militarycac.com/maccerts/RootCert4.cer, and
Double click each of the files to install certificates into the login section of keychain
Select the Kind column, verify the arrow is pointing up, scroll down to certificate, look for all of the following certificates:
DOD DERILITY CA-1
DOD EMAIL CA-39 through DOD EMAIL CA-44,
DOD EMAIL CA-49 through DOD EMAIL CA-52,
DOD EMAIL CA-59,
DOD EMAIL CA-62 through DOD EMAIL CA-65
DOD ID CA-39 through DOD ID CA-44,
DOD ID CA-49 through DOD ID CA-52,
DOD ID CA-59,
DOD ID CA-62 through DOD ID CA-65
DOD ID SW CA-45 through DOD ID SW CA-48,
DoD Root CA 2 through DoD Root CA 5,
DOD SW CA-53 through DOD SW CA-58,
DOD SW CA-60 through DOD SW CA-61, and
DOD SW CA-66 through DOD SW 67
NOTE: If you are missing any of the above certificates, you have 2 choices,

1. Delete all of them, and re-run the 5 files above, or
2. Download the allcerts.zip file and install each of the certificates you are missing individually.
Errors:
Error 100001 Solution
Error 100013 Solution
You may notice some of the certificates will have a red circle with a white X . This means your computer does not trust those certificates
You need to manually trust the DoD Root CA 2, 3, 4, & 5 certificates
Double click each of the DoD Root CA certificates, select the triangle next to Trust, in the When using this certificate: select Always Trust, repeat until all 4 do not have the red circle with a white X.
You may be prompted to enter computer password when you close the window
Once you select Always Trust, your icon will have a light blue circle with a white + on it.
The 'bad certs' that have caused problems for Windows users may show up in the keychain access section on some Macs. These need to be deleted / moved to trash.
The DoD Root CA 2 & 3 you are removing has a light blue frame, leave the yellow frame version. The icons may or may not have a red circle with the white x
or | DoD Interoperability Root CA 1 or CA 2 | certificate | |
DoD Root CA 2 or 3 (light blue frame ONLY) | certificate | ||
or | Federal Bridge CA 2016 or 2013 | certificate | |
or | Federal Common Policy CA | certificate | |
or | or | SHA-1 Federal Root CA G2 | certificate |
or | US DoD CCEB Interoperability Root CA 1 | certificate |
If you have tried accessing CAC enabled sites prior to following these instructions, please go through this page before proceeding
Clearing the keychain (opens a new page)
Please come back to this page to continue installation instructions.
Step 5a: DoD certificate installation instructions for Firefox users
NOTE: Firefox will not work on Catalina (10.15.x), or last 4 versions of Mac OS if using the native Apple smartcard ability
Download AllCerts.zip, [remember where you save it].
double click the allcerts.zip file (it'll automatically extract into a new folder)
Option 1 to install the certificates (semi automated):
From inside the AllCerts extracted folder, select all of the certificates
<control> click (or Right click) the selected certificates, select Open With, Other...
In the Enable (selection box), change to All Applications
Select Firefox, then Open
You will see several dozen browser tabs open up, let it open as many as it wants..
You will eventually start seeing either of the 2 messages shown next
If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
or
'Alert This certificate is already installed as a certificate authority.' Click OK
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Option 2 to install the certificates (very tedious manual):
Click Firefox (word) (upper left of your screen)
Preferences
Advanced (tab on left side of screen)
Certificates (tab)
View Certificates (button)
Authorities (tab)
Open Downloads On Mac
Import (button)
How To Allow Downloads On Mac From Unidentified Developers
Browse to the DoD certificates (AllCerts) extracted folder you downloaded and extracted above.
Note: You have to do this step for every single certificate
Note2: If the certificate is already in Firefox, a window will pop up stating: 'Alert This certificate is already installed as a certificate authority (CA).' Click OK
Note3: If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Step 6: Decide which CAC enabler you can / want to use
Only for Mac El Capitan (10.11.x or older)
After installing the CAC enabler, restart the computer and go to a CAC enabled website
NOTE: Mac OS Sierra (10.12.x), High Sierra (10.13.x), Mojave (10.14.x), Catalina (10.15.x), and Big Sur (11.x) computers no longer need a CAC Enabler.
How To Allow Downloads On Mac From Gmail
Try to access the CAC enabled site you need to access now
How To Allow Safari Downloads On Mac
Mac support provided by: Michael Danberry