Endpoint Security is an approach to the protection of computer networks that are remotely bridged to client devices.

Customers who want to continue using High Sierra without upgrading to Mojave can continue to use the McAfee products listed in the High Sierra and earlier column, and stay protected. 2 Based on the earlier communication from Apple regarding the migration of third-party applications to 64-bit, McAfee migrated the products listed under macOS 10.14.x, to 64-bit.

The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.

Is this software right for me?

Student Use: This type of software is for use by students on their computers, whether that is a laptop or home desktop.

What does this software do?

McAfee Endpoint Security protects your computer against viruses and other malware.

Can you explain in more detail?

Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.

Steps on Computer. Run WO Mic Client package that you just install on your PC or Mac. Click Connection menu and choose Connect option. Select WiFi option from dialog box and type the IP address that you see on your Android device. Once done hit the OK button and your Android phone is connected. Use android as microphone for mac.

Endpoint security management is a software approach which helps to identify and manage the users' computers access over a corporate network.

This allows the network administrator to restrict certain website access to specific users in order to maintain and comply with the organization's policies and standards. The components involved in aligning the endpoint security management systems include a virtual private network (vpn) client, an operating system and an updated antivirus software.

Computer devices that are not in compliance with the organization's policy are provisioned with limited access, to a virtual Lan.

Mac version : 10.6

Support Level : None

Staff :

Mcafee Endpoint Security For Mac High Sierra 10.2.3

Staff are unable to download this version of the software, but other versions are available to staff.

If you need a version for your campus computer, please see McAfee Endpoint Security 10.6 Campus Use for Mac.

If you need a version for your home computer, please see McAfee Endpoint Security 10.6 Home Use for Mac.

Student :

Available to download via Pegsus.

Type : Site licence

End Date : Renewed annually

Licence Details :

Please read licence details before downloading software:

Usage :


For use on a computer system owned by a student.

Personal Licence : Not Applicable

When downloading this software, an automated email will be sent to your university email account. Please read this email as it contains information and instructions.

If you have any problems downloading or installing this software, please contact:software-request@strath.ac.uk

More information about Anti-virus is available from McAfee.

If you want older versions of this software, other versions are available on the Available Licensed Software page on Pegasus.

The Development & Training Resource Centre has a wealth of online training resources including video tutorials, tutor-led material, self-study material and links to external best practice sites. Follow the link(s) below for more information:

Who is it for?

Staff :

This version is not available to staff

Student :

Free to download to personal PC/Laptop

System Requirements

Minimum Operating System:

  • High Sierra 10.13 or later
  • Mac OS X server

Minimum Hardware:

Mac that can run with the supported operating system configuration.

When it comes to cybersecurity, we’ve seen our fair share of device flaws. Sometimes, hackers leverage these vulnerabilities to execute complicated attacks that compromise your data. And sometimes, there are flaws that hardly require cybercriminals to lift a finger. Just yesterday, a massive flaw emerged that embodies the latter. This vulnerability is found in High Sierra Macs, and allows anyone to log into a device just by typing “root” in the user name field.

How it works

Anyone can access this flaw by first going to “System Preferences” on the home page of a Mac computer and then entering one of the panels that has a lock in the lower left-hand corner. This is usually where you would go to enter in your name and password, which is required when installing an application or changing settings. From there, simply type “root” as a username, leave the password field blank, click “unlock” twice, and you’ll immediately gain full access to the device.

This essentially means that anyone that gets their hands on your computer could gain the deepest level of access to your device, otherwise known as “root” privileges. They could add administrators, change critical settings, even lock out the current owner. What’s more – this flaw could allow malware to install itself deep within your computer, especially since no password is required for access.

Fortunately, Apple has stated that a fix is on the way and workaround is available in the interim. They explained, “in the meantime, setting a root password prevents unauthorized access to your Mac. To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the ‘Change the root password’ section.”

How to stay protected

So, the next question is – what can you do to ensure your Mac stays secure? Start by following these tips:

  • Do not leave your Mac unattended until this is resolved. With this vulnerability, the main way someone can access your files is by first and foremost accessing your physical device. So be sure to never leave your computer unattended, or hand it over to someone you don’t know that well.
  • Update regularly. It’s an important security rule of thumb: always update your software whenever an update is available, as security patches are usually included with each new version. And even though a fix for this particular flaw has not been issued yet, it’s certainly on the way.
  • Install comprehensive security. After you’ve updated your devices with the latest software, be sure to install comprehensive security. A solution like McAfee LiveSafe can ensure your devices are protected from cybercriminals wishing to leverage this vulnerability in order to steal your personal data.

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.