Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Installation
Quint on macOS ships as a signed.pkg containing:
/Applications/QuintAgent.app— container app holding the NE + ES system extensions/usr/local/bin/quint-proxy— the daemon binary/Library/LaunchDaemons/dev.quintai.agent.plist— LaunchDaemon that keeps the daemon alive/etc/quint/config.yaml— deploy token + API URL
Requirements
- macOS 11+ (EndpointSecurity framework)
- Admin user for installation
- User approval of system extensions (two separate prompts)
First-run flow
- Install the
.pkg. macOS triggers Gatekeeper and notarization checks. - The installer writes
/etc/quint/config.yamlwith your enrollment token. - On first launch,
QuintAgent.apprequests activation of the NE and ES extensions. - User approves both in System Settings → General → Login Items & Extensions:
- Endpoint Security Extensions → enable “QuintEndpointExtension”
- Network Extensions → enable “QuintNetworkExtension”
- A VPN configuration profile is also installed (NE requires it)
- The daemon starts via LaunchDaemon. It reads the enrollment token, calls
POST /v1/machines/register, and exchanges it for a long-lived service token.
Verification
After install, confirm all four components are alive:Uninstall
MDM / fleet rollout
For multi-machine enrollment, the.pkg supports a predeploy config.yaml drop at /etc/quint/config.yaml with the enrollment token. Pair with an MDM profile that auto-approves the two system extensions and the VPN profile so end users don’t see prompts.
See Cloud → Fleet for enrollment token provisioning and fleet-wide policy distribution.
If installation fails
See Troubleshooting for common issues:- NE extension not running after install
- Code signature invalid (
SIGKILLon launch) - Two extensions active with different TeamIDs
- Daemon can’t reach the cloud API