System Integrity Protection Disabled

System Integrity Protection (SIP) protects the entire system by preventing the execution of unauthorized code on macOS devices. During development, temporarily disabling SIP may be required in order to install and test code.

Creating a new System Integrity Protection Disabled policy

To create a new System Integrity Protection Disabled policy:

  1. From the Device Posture tab, select + ADD :

    Add new device posture policy

  2. Select Add to macOS .

    Coro displays the Add new device policy to macOS dialog.

    note

    The System Integrity Protection Disabled device policy is currently supported for macOS devices.

  3. Select System Integrity Protection Disabled from the Select policy type dropdown:

    Add new System Integrity Protection Disabled policy

  4. Select the policy Action :
    • Review : No auto-remediation is performed and a ticket is raised and classified as requiring review. The ticket remains open until either the admin user closes it manually or the vulnerability is observed by the Coro endpoint agent as being resolved.
  5. Enter label names (predefined or custom) to the Labels field listed under Apply policy to devices with these labels to apply the new policy to specific groups of devices.

    Apply device policy labels

  6. Select SAVE .

    Coro creates the policy with the configured settings.

    note

    When System Integrity Protection is disabled on a macOS device, a System Integrity Protection disabled ticket type is created.

Select the dropdown next to System Integrity Protection Disabled on the Device Posture tab to view the policy. See Device posture configuration overview.

Coro displays the following policy details:

  • Device labels applicable to the policy.
  • The action(s) applicable to the policy, for example, Review .

    View Apple Mobile File Integrity Disabled policy