Installing the Secure Profile for Mac

Mac workstations require a two-step setup process. First, download the Secure Profile from the link below, install it, and restart your computer. The Secure Profile can also be installed on multiple devices all at once using any commercially available mobile device management (MDM) application you already use to manage your devices.

The Secure Profile is new for 2019-2020 and automates a lot of the previously manual steps that would need to happen to secure the device after installing the Secure Browser. The profile disables the hot keys for enabling Dictation, Mission Control, and Spaces and the trackpad gestures for accessing Lookup, Space Switching, Expose, and Notification Center and also sets function keys to standard functions.

After you’ve installed the Secure Profile, download the Secure Browser from the link above and install it using the instructions below.

Download the Secure Profile

Click here to download the Secure Profile.

Installing the Secure Browser for Mac

This procedure installs the Secure Browser on desktop and laptop computers running Mac OS X or macOS. The steps in this procedure may vary depending on your version of Mac OS X or macOS and your web browser.

1.Remove any previous versions of the Secure Browser by dragging its folder to the Trash.

2.Click the Download Browser link above. A dialog window opens. If prompted for a download location, select the desktop.

3.Open Downloads from the Dock, and double-click DeSSASecureBrowserX.X-YYYY-MM-DD-signed.dmg to display its contents. 

4.Drag the DeSSASecureBrowser icon to the folder. This installs the Secure Browser into Applications.

5.Double-click the DeSSASecureBrowser icon on the desktop to launch the Secure Browser. (You must launch the Secure Browser to complete the installation.) The Secure Browser opens displaying the student login screen. The browser fills the entire screen and hides the dock.

6.To exit the browser, click X in the upper-right corner of the screen.

7.Ensure all background jobs, such as virus scans or software updates, are scheduled outside of test windows. For example, if your testing takes place between 8:00 a.m. and 3:00 p.m., schedule background jobs outside of these hours.