Once the update is installed, the others are updated. But it seems more likely that SilentKnight is returning correct info, and that the uninstalled update is blocking the update of XProtect, Gatekeeper, and MRT. If SilentKnight is returning erroneous info, perhaps it is because of a bug fixed in or other change made to the command line tools. ![]() There was one update available in the App Store: “Command Line Tools (macOS El Capitan version 10.11) for Xcode 8-2” version 8.2.Īfter installing that update via the App Store, SilentKnight reports all is now up-to-date and shows XProtect, Gatekeeper, and MRT updated at about the same time as the “Command Line Tools” update. SilentKnight 1.4 reported XProtect 2103 installed, Gatekeeper 166 installed, and MRT 1.41 installed. I had the same problem on macOS El Capitan 10.11.6 (Build 15G22010) in a VM but fixed it by using the App Store to install a “recommended” update. Hope this is a bit more helpful and whether it can be fixed or not we will have to wait & see In the meantime Lock Rattler appears to be working fine, If someone else who has been stuck in the past can double check this by doing the same and report back perhaps, I imagine that this will prove that apple is still pushing out the updates. In a Terminal and shortly thereafter maybe 10 mins it had updated. To try and rectify my blue I did a Time Machine restore back to August and downloaded and ran Silent Knight and it appears that yes there is a problem as after several attempts, to update it wasn’t happening.Īs I’ve been using Lock Rattler and familiar with the documentation that you supplied I ran the command My apologies to everyone, somewhere I must have had a Seniors moment and missed this or it didn’t sink in “SilentKnight appears to return erroneous information. Thanks to David for raising this, for providing the screenshot above, and for allowing me to use it. If you’d like to download either of these free tools, they’re available from their Product Page and have extensive built-in Help. If you’re running either SilentKnight or LockRattler on such an older system, or on a version of macOS which isn’t supported on that model, please let us know whether you’re still receiving security updates. But if this is what is happening, users need to be aware that, for example, they no longer enjoy current protection, particularly in Gatekeeper, which could leave their Macs vulnerable. I can’t see any article or other information from Apple which informs users (or developers) of this practice. Again, their updates cease, and no more are offered by Apple’s servers.Īt present, I’ve only heard of a handful of cases, but sufficient to make me wonder whether Apple has discontinued support for some or all of these older systems. This can occur, for instance, when an older Mac is upgraded to an unsupported version of macOS, such as High Sierra or Mojave. I also hear occasionally from other SilentKnight and LockRattler users that they’re stuck on out of date versions of some of these important protections. SilentKnight is connecting correctly with those update servers, though – if you block its outgoing connection or it fails, it should return an error, sometimes after waiting for a very long timeout first. The last installed updates to them were on, but SilentKnight isn’t able to get Apple’s servers to offer anything more recent than those. Here’s a screenshot:Īs you can see, the XProtect, Gatekeeper and MRT versions are frozen as they were back in May 2019. It’s that latter system which worries me: it appears to have stopped being pushed security updates back in May 2019, and is now well out of date. One SilentKnight user, for example, has Macs running Mojave and Catalina, and a lovely old Mac mini which is stuck on El Capitan and can’t go any further. If the servers offer updates, you can then download and install them. Its last step is to check with Apple’s servers for any available “system data files and security updates”, as Apple terms them in the Advanced sheet of the Software Update pane. It does a rather more complex job with EFI firmware versions which I’ll gloss over here. It fetches a Property List from my GitHub site, which lists the expected versions, and compares the results it obtained with those it should expect. When you open the app, it checks currently installed versions of known security data files. SilentKnight – which automates the same checks in LockRattler and compares results against my database of current versions – does a relatively simple job. Recently, a couple of those still using El Capitan have remarked that SilentKnight appears to return erroneous information. ![]() Both my utilities for checking and installing Apple’s silent and pushed security updates, LockRattler and SilentKnight, run on El Capitan and later versions of macOS, but I seldom hear from users running older versions.
0 Comments
Leave a Reply. |