With some testing, does not seem to be a TCC Profile Issue. If you do a "sudo log stream -debug -predicate 'subsystem == "com.apple.TCC"' | grep 'eset'" when restarting the client on a machine with a SystemPolicyAllFiles Profile for com.eset.eea.6, you see "2018-11-30 12:30:26.438122-0500 0x477bbInfo0x534e23140tccd: [com.apple.TCC:access] Override: found override in <TCCDMDMPolicyOverride: 0x7f8cbc4009a0> for kTCCServiceSystemPolicyAllFiles and com.eset.eea.6". I'm assuming that whatever methodology ESET is using to check for access is not taking into account MDMOverrides.plist. Funnily enough, version 6.866 worked fine with the a PPPC Payload deployed. Currently engaged with support over this.
ESET 6.7.500.0 and 10.14 Mojave TCC issue)
in ESET Endpoint Products
Posted
With some testing, does not seem to be a TCC Profile Issue. If you do a " sudo log stream -debug -predicate 'subsystem == "com.apple.TCC"' | grep 'eset'" when restarting the client on a machine with a SystemPolicyAllFiles Profile for com.eset.eea.6, you see "2018-11-30 12:30:26.438122-0500 0x477bb Info 0x534e2 314 0 tccd: [com.apple.TCC:access] Override: found override in <TCCDMDMPolicyOverride: 0x7f8cbc4009a0> for kTCCServiceSystemPolicyAllFiles and com.eset.eea.6". I'm assuming that whatever methodology ESET is using to check for access is not taking into account MDMOverrides.plist. Funnily enough, version 6.866 worked fine with the a PPPC Payload deployed. Currently engaged with support over this.