1.5 Ensure System Data Files and Security Updates Are Downloaded Automatically Is Enabled - CriticalUpdateInstall

Information

Ensure that system and security updates are installed after they are available from Apple. This setting enables definition updates for XProtect and Gatekeeper. With this setting in place, new malware and adware that Apple has added to the list of malware or untrusted software will not execute. These updates do not require reboots or end user admin rights.

Silently updated security data files in Monterey

https://support.apple.com/en-us/HT202491

XProtect is Apple's built-in, signature-based security tool for detection and removal of malware.

Protecting against malware in macOS

Rationale:

Patches need to be applied in a timely manner to reduce the risk of vulnerabilities being exploited.

Impact:

Unpatched software may be exploited.

Solution

Graphical Method:
Perform the following steps to enable system data files and security updates to install automatically:

Open System Preferences

Select Software Updates

Select Advanced

Set Install system data files and security updates to enabled

Terminal Method:
Run the following commands to enable automatic checking of system data files and security updates:

$ /usr/bin/sudo /usr/bin/defaults write /Library/Preferences/com.apple.SoftwareUpdate ConfigDataInstall -bool true

$ /usr/bin/sudo /usr/bin/defaults write /Library/Preferences/com.apple.SoftwareUpdate CriticalUpdateInstall -bool true

Note: This remediation requires a log out and log in to show in the GUI.

Profile Method:
Create or edit a configuration profile with the following information:

The PayloadType string is com.apple.SoftwareUpdate

The key to include is ConfigDataInstall

The key must be set to <true/>

The key to also include is CriticalUpdateInstall

The key must be set to <true/>

See Also

https://workbench.cisecurity.org/files/4176

Item Details

Category: RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|RA-5, 800-53|RA-5(2), 800-53|SI-2, 800-53|SI-2(2), CSCv7|3.4, CSCv7|3.5

Plugin: Unix

Control ID: 04eadd192e11d8d1a88ee9c25b13514c9731f5ba12b8a4305ee5ee0094b96cf1