Several utilities access the log. When there are problems getting entries, they each report details. Here’s what each error report means, and what you can do to fix it.
SilentKnight
Want to stay running Sequoia or earlier? Want to install security updates such as XProtect data as well? Here’s how to do that without risking being upgraded unintentionally.
Ten years ago, a firmware worm that could have inserted malware into Mac boot flash storage was demonstrated, and shortly afterwards many Macs were found to be running outdated firmware. We’ve come a long way since.
Until Sequoia, it was simply downloaded and installed as any other software update. Since then it has changed frequently and its behaviour can now confuse.
Six years ago, the old MRT saved millions of Macs from coming under attack. XPR could one day do the same. A new deep dive into its function has just been presented at Black Hat. Also updates on status_code 30 and missed scans.
With macOS support for Intel Macs coming to an end with Tahoe, it’s time to reconsider the role of SilentKnight in the future. Plus two more updates.
Although primarily for compatibility with Tahoe, these include a general refresh and are recommended for all versions of macOS from Big Sur onwards.
There are no changes for Sonoma and earlier macOS, and Sequoia 15.0-15.1.1 will also continue working as before. But 15.2 and later work differently, as explained here.
Did you spot the change that didn’t take place as expected in the 15.2 update this week? It marks the end of the Intel era for Macs.
It’s easy to ensure that SilentKnight won’t inadvertently install an upgrade to Sequoia, but still updates the security data files you want. Here’s how.
