This guide applies to Mac computers
Prerequisites
- Bitdefender installer package(s) from your Bitdefender admin portal. Ensure that an uninstall password is set in the package settings
- If you have a mixed environment of both Intel and Apple Silicon Mac computers, you will need to download both the macOS kit (Intel x86) and macOS kit (Apple Silicon) packages, but you will only need to include one of the install.xml files. The post-install script used in this guide will account for both installer types
- If you are only deploying to one architecture, you will still need that install package and the included install.xml file
- Bitdefender PFX Certificate Generator script (GitHub Link)
- Bitdefender Settings Profile (GitHub Link)
- This configuration profile enables full disk access for Notifications, System Extensions, Bitdefender SSL CA certificate, Privacy Preferences (PPPC), and a Network content filter
- Bitdefender macOS 15+ Settings Profile (GitHub Link)
- This configuration profile includes the NonRemovableFromUISystemExtensions field for macOS 15+ devices
- Bitdefender Service Management Profile (GitHub Link)
- This configuration profile allows managed background items for Bitdefender
- Bitdefender Audit and Enforce Script (GitHub Link)
- Bitdefender Postinstall Script (GitHub Link)
Creating a PFX Certificate
This section steps through the creation of a PFX certificate for Bitdefender that can be uploaded to Iru Endpoint in a Certificate Library Item.Bitdefender requires that a PFX certificate be created and deployed to macOS. This section is based on BitDefender’s guide, which you can refer to for more information.
Open Certificate Generator Script
Open the PFX Certificate Generator script in a text editor or IDE such as VScode or BBEdit.
Enter Password
When prompted, enter and verify the password used in the Bitdefender installer settings you defined in your Bitdefender portal.
Copy Password Hash
When the script is finished, you should see the password hash used to generate the certificate. Copy the generated hash and paste it in the password field when creating the Certificate Library Item in Iru Endpoint:
Locate Certificate File
A Finder.app window should open on your Desktop, showing the certificate.pfx file.
Upload Certificate
Upload this certificate to Iru Endpoint in a Certificate Library Item.

Add a Custom Profile Library Item
To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.Configure the Bitdefender Profiles
Upload Configuration File
Upload the
bitdefender_settings.mobileconfig file you downloaded previously.Create Additional Profiles
Repeat the previous steps for the 
bitdefender_settings_macOS15.mobileconfig and the bitdefender_service_management.mobileconfig files you downloaded in the prerequisites section.
Zipping the Installer Files
Before uploading the installer files to Iru Endpoint, you will need to zip them up together first.Locate Installer Files
Go to the Bitdefender installer files that you downloaded from the Bitdefender console earlier. If you downloaded the Intel and Apple ARM DMG files, you might need to mount them first and then pull the installer files out.
Organize Files
Put the installer package(s), installer.xml file, and certificate.pfx file in the same location, such as your Desktop. Only one installer.xml file is needed; either the one from the Intel download or the ARM download will work.
Compress Files
Hold the Control(⌃) key and click on the selected files. Then, in the menu, click Compress. You should see a dialog showing the compression progress.
Custom App
To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.Configure Audit Script
Copy the bitdefender_ae_script.zsh script you downloaded in the prerequisites section and paste into the Audit & Enforce text box. No modification needed.
The script looks for two profile identifiers and the name of the installed Bitdefender app before attempting an install. Additionally, the script looks for two Launch Daemons on computers where the app is already installed to ensure that the app is running as expected. If you would like to use this script with another profile, update the profile identifier prefix information to match what is in your profile:

Set Deployment Type
Select ZIP File (unzip contents into specified directory) as the deployment type.
Configure Postinstall Script
Copy the post-install script you downloaded in the prerequisites section and paste it into the post-installer text field. Be sure to copy all text, including the #!/bin/sh (shebang) line at the top.
- Ensure that the package names match the names downloaded from Bitdefender
- Ensure that the certificate file name matches the cert file you created using the Bitdefender KB
Deploying with Assignment Maps
Two of the Bitdefender Custom Profiles need conditional logic to ensure they are deployed to the correct devices. An Assignment Map provides an easy solution for all of your devices in one convenient view. Please review our Creating a Blueprint and Using Conditional Logic in Assignment Maps articles.Assign Custom App
Assign the Bitdefender Custom App to the block.
If multiple Custom Apps are needed, create a conditional block with conditions for the different versions of the installer.
Set macOS 13+ Condition
Set the top of the conditional block to If macOS is greater than or equal to 13.0.
Assign Service Management Profile
Assign the bitdefender_service_management Custom Profile to the conditional block.
Set macOS 15+ Condition
Set the top of the conditional block to If macOS is greater than or equal to 15.0.

