Configuring the configuration profile
When deploying FortiClient (macOS) without Intune configuration profiles, the endpoint displays the following prompts to the user:
- To grant network access to the following extensions:
- Web Filter
- VPN
- Proxy
- To grant full disk access to FortiClient processes
- To grant FortiTray permission to load the following extensions. This occurs if the user has not previously installed FortiClient on the macOS device:
com.fortinet.forticlient.macos.webfilter
com.fortinet.forticlient.macos.vpn.nwextension
- com.fortinet.forticlient.macos.proxy
Silently deploying FortiClient (macOS) so that the user does not view these prompts requires an Intune custom configuration profile that allows all prompts. This single custom configuration profile grants the following:
- Full disk access for FortiClient processes:
- FortiClient
- fmon2
- fcaptmon
- fctservctl2
- Permission for loading system extensions
- Network access for the following:
- VPN
- Web Filter
- Proxy
- Permission for adding zero trust network access (ZTNA) root CA certificate to the keychain
You can silence certificate prompts in one of the following ways:
- Add certificate content to the configuration profile between
<data>and</data>as To grant the permissions: describes - Directly upload the certificate as a trusted certificate in the Intune configuration profiles after changing the extension type
This document provides instructions for the first method. For the second method, see To directly upload the ZTNA certificate as trusted certificate:.
To grant the permissions:
- Download the FortiClient_Configuration_Profile.Intune.mobileconfig sample configuration profile file:
- Go to Fortinet Service & Support > Support > Firmware Download.
- From the Select Product dropdown list, select FortiClientMac.
- On the Download tab, go to Mac > v7.00 > 7.2 > 7.2.9
- Download the FortiClient_Configuration_Profile.Intune.mobileconfig sample configuration profile file.
- Prepare the configuration profile with the FortiSASE root and ZTNA root CA certificates:
To obtain the FortiSASE root certificate, in FortiSASE, go to Configuration > Security.
Click Configure SSL.
- Beside the CA certificate value, click Download.

- To obtain the ZTNA root CA certificate, on a macOS endpoint where FortiClient is connected to FortiSASE, go to
/Library/Application Support/Fortinet/FortiClient/data/ca_certs/ztna_certs.
- In a text editor, open the FortiSASE root certificate and ZTNA root CA certificate.
- Copy the certificates content to an accessible location.
- Open the FortiClient_Configuration_Profile.Intune.mobileconfig file in a text editor. The file contains two entries for
PayloadCertificateFileName. You will leave the first entry, forFortiClient DNS Root.cer, as-is. You will overwrite the second entry, forEMS_ZTNA.cer, with the following content. Copy and paste the following content in to the profile, overwriting theEMS_ZTNA.cerentry. Replace<!-- Add your FortiSASE root certificate here -->and<!-- Add your FortiSASE ZTNA certificate here -->in the sample with the FortiSASE root certificate content and ZTNA root CA certificate, respectively, that you copied in step f:<dict> <key>PayloadCertificateFileName</key> <string>FortiSASE_Root.cer</string> <key>PayloadContent</key> <data> <!-- Add your FortiSASE root certificate here --> </data> <key>PayloadDescription</key> <string>Adds a CA root certificate</string> <key>PayloadDisplayName</key> <string>FortiSASE Root Certificate for SSL Decryption</string> <key>PayloadIdentifier</key> <string>com.apple.security.root.1255DA5E-C9F1-4FBF-9967-4000DDF1DFC5</string> <key>PayloadType</key> <string>com.apple.security.root</string> <key>PayloadUUID</key> <string>1255DA5E-C9F1-4FBF-9967-4000DDF1DFC5</string> <key>PayloadVersion</key> <integer>1</integer> </dict> <dict> <key>PayloadCertificateFileName</key> <string>FortiSASE_ZTNA.cer</string> <key>PayloadContent</key> <data> <!-- Add your FortiSASE ZTNA certificate here --> </data> <key>PayloadDescription</key> <string>Adds a CA root certificate</string> <key>PayloadDisplayName</key> <string>FortiSASE ZTNA Certificate</string> <key>PayloadIdentifier</key> <string>com.apple.security.root.1255DA5E-C9F1-4FBF-9967-4000DDF1DFC6</string> <key>PayloadType</key> <string>com.apple.security.root</string> <key>PayloadUUID</key> <string>1255DA5E-C9F1-4FBF-9967-4000DDF1DFC6</string> <key>PayloadVersion</key> <integer>1</integer> </dict>
- Sign in to the Microsoft Endpoint Manager Admin Center.
- Go to Devices > macOS > Configuration Profiles > Create Profile > Profile Type > Templates > Custom and click Create.
- Enter the profile name and description as desired, then click Next.
- Under Configuration settings, from the Deployment channel dropdown list, select Device channel.
- In the Configuration profile file field, import the FortiClient_Configuration_Profile.Intune.mobileconfig sample configuration profile file. The text field shows the sample XML configuration in the file. Click Next.

- Assign this profile to the macOS device group by selecting Add Groups under Included Groups. Click Next.
- Review the summary, then click Create. Intune creates the custom profile to grant access to the Web Filter and VPN extensions.