macOS Agent
Install the NetRecon agent on macOS endpoints for continuous monitoring and inventory reporting.
Prerequisites
- macOS 12 (Monterey) or later
- Administrator privileges (for installation)
- Network connectivity to the probe (direct or via Cloudflare Tunnel)
- An enrollment token from the probe dashboard
Manual Installation
Step 1: Download the PKG
Download netrecon-agent-macos-universal.pkg from the probe dashboard:
- Log into the probe dashboard
- Navigate to Agents > Downloads
- Click macOS (PKG)
The package is a universal binary supporting both Intel (x86_64) and Apple Silicon (arm64).
Step 2: Run the Installer
- Double-click the downloaded PKG file
- Follow the installation wizard
- When prompted, enter:
- Server URL: your probe's URL
- Enrollment Token: paste the token from the probe dashboard
- Enter your macOS admin password when prompted
- Click Install and wait for completion
The agent installs to /Library/NetRecon/Agent/ and registers as a launchd service.
Step 3: Verify Installation
Open Terminal:
sudo launchctl list | grep netrecon
You should see com.netrecon.agent in the output. Check enrollment in the probe dashboard under Agents.
Command-Line Installation
For scripted installation:
sudo installer -pkg netrecon-agent-macos-universal.pkg -target /
# Configure the agent
sudo /Library/NetRecon/Agent/netrecon-agent configure \
--server-url "https://probe.netreconapp.com" \
--enrollment-token "your-token-here"
# Start the agent
sudo launchctl load /Library/LaunchDaemons/com.netrecon.agent.plist
Jamf Deployment
Deploy the agent at scale using Jamf Pro.
Step 1: Upload the Package
- Log into Jamf Pro
- Navigate to Settings > Computer Management > Packages
- Click New
- Upload
netrecon-agent-macos-universal.pkg - Save the package
Step 2: Create a Policy
- Navigate to Computers > Policies
- Click New
- Configure the policy:
- General: Name it "NetRecon Agent Deployment"
- Packages: Add the NetRecon agent PKG, set to Install
- Scripts: Add a post-install script (see below)
- Scope: Target your desired computer groups
- Trigger: Set to Enrollment Complete and/or Recurring Check-in
Post-Install Script
#!/bin/bash
/Library/NetRecon/Agent/netrecon-agent configure \
--server-url "https://probe.netreconapp.com" \
--enrollment-token "your-fleet-token"
launchctl load /Library/LaunchDaemons/com.netrecon.agent.plist
Step 3: Deploy
- Save the policy
- Monitor deployment in Computers > Policy Logs
MDM Deployment
Deploy via any MDM solution that supports PKG distribution.
Configuration Profile
Create a configuration profile to pre-configure the agent:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
"http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>PayloadType</key>
<string>com.netrecon.agent</string>
<key>ServerURL</key>
<string>https://probe.netreconapp.com</string>
<key>EnrollmentToken</key>
<string>your-fleet-token</string>
<key>HeartbeatInterval</key>
<integer>30</integer>
<key>ReportInterval</key>
<integer>900</integer>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>NetRecon Agent Configuration</string>
<key>PayloadIdentifier</key>
<string>com.netrecon.agent.config</string>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>
Deploy this profile alongside the PKG package through your MDM.
macOS Permissions
The agent may require the following macOS permissions:
| Permission | Purpose | How to Grant |
|---|---|---|
| Full Disk Access | Read installed software list | System Settings > Privacy & Security |
| Network Access | Send data to probe | Granted automatically |
For MDM-managed deployments, grant Full Disk Access via a PPPC (Privacy Preferences Policy Control) profile:
<key>Services</key>
<dict>
<key>SystemPolicyAllFiles</key>
<array>
<dict>
<key>Identifier</key>
<string>com.netrecon.agent</string>
<key>IdentifierType</key>
<string>bundleID</string>
<key>Allowed</key>
<true/>
</dict>
</array>
</dict>