Cisco Secure Client (macOS) - Intune

Purpose

This guide explains how to deploy Cisco Secure Client (AnyConnect) to macOS devices using Microsoft Intune, including the required configuration profiles for system extensions, managed login items, and kernel/network extensions.

Cisco Secure Client requires additional configuration compared to standard macOS PKG or DMG apps due to:

Without these configurations, the client may install but not function correctly.


Scope

Applies to

Out of scope


Prerequisites

You need:


Cisco Secure Client 5 for macOS


Step 1 – Download Cisco Secure Client

Sign in to https://cisco.com.

Navigate to:

Support → Products and Downloads → Secure Client → Secure Client 5

Select macOS

Download:

cisco-secure-client-macos-{latest version}-webdeploy-k9.pkg

Accept the terms and save the file.


Step 2 – Extract the Core VPN Installer

Cisco’s WebDeploy package contains multiple components.
Only the Core VPN PKG is required.

Windows (7‑Zip)

/binaries/

Cisco Secure Client macOS <version> Core VPN WebDeploy.dmg

Cisco Secure Client AnyConnect VPN <version>

This PKG will be uploaded to Intune later.


macOS (Optional – if extracting on a Mac)

Note: Cisco “WebDeploy” .pkg files are ZIP archives on macOS and cannot be opened with pkgutil.

Option A – Finder (GUI)

Shell

unzip Cisco_Secure_Client_macOS_<version>_WebDeploy

Show more lines

Then:

/binaries/

Cisco Secure Client macOS <version> Core VPN WebDeploy.dmg

Cisco Secure Client AnyConnect VPN <version>

This PKG will be uploaded to Intune later.


Step 3 – Configuration Profile: System Extensions

Intune path

Devices → macOS → Configuration → Create profile
Profile type: Settings catalog

Profile name

Cisco VPN – System Extensions

Settings

Allowed system extension types

Allowed system extensions

Assignments

Assign to a macOS pilot group.


Step 4 – Configuration Profile: Managed Login Items

Intune path

Devices → macOS → Configuration → Create profile
Profile type: Settings catalog

Profile name

Cisco VPN – Managed Login Items

Settings path

Service Management → Login Items → Managed Login Items

Rule

Assign to the same pilot group.


Step 5 – Configuration Profile: Kernel & System Extensions (Custom XML)

secure-client.mobileconfig

Upload to Intune

Devices → macOS → Configuration → Create profile
Profile type: Templates → Custom

Upload secure-client.mobileconfig and assign to the pilot group.


Step 6 – Deploy the Application

Intune path

Apps → macOS → Add → macOS PKG

App info

Assignment


Step 7 – Sync and Validate

Confirm:

Validation


Result

Cisco Secure Client is now:


potential visual indicators for the end user :