Add the JumpCloud Agent to an Allow List

Next-generation antivirus products aren't just relying on signature and heuristic-based detection anymore; they are using some focused artificial intelligence to identify unusual behaviors.

Because the JumpCloud Agent executes background tasks that could be flagged as unusual, this could be flagged by your antivirus vendor; however, this is how the Agent works by design, and is not malicious. Antivirus software may flag the JumpCloud Agent at any time, even if it hasn’t happened previously. 

It's recommended to add the JumpCloud installation folder as well as the JumpCloud Agent application for Mac, Windows, and Linux systems to an allow list. If the JumpCloud Agent or scripts run by the Agent are flagged as suspicious after you have added the JumpCloud Agent to your allow list, we recommend contacting your antivirus vendor.


If you are using JumpCloud Remote Assist, see Understanding the Remote Assist Agent for endpoint security exclusions.

Finding the Allowlist Folder and Application


  • C:\Program Files\JumpCloud
    • jumpcloud-agent.exe and jumpcloud-agent-updater.exe in the above directory
  • C:\Program Files\JumpCloud\jumpcloud-user-agent
    • jumpcloud-user-agent.exe in the above directory


  • /opt/jc
  • /opt/jc_user_ro
  • /Library/LaunchDaemons
    • com.jumpcloud.darwin-agent​.plist in the above directory
  • /Library/LaunchAgents
    • com.jumpcloud.user-agent.plist in the above directory


  • /opt/jc
  • /opt/jc_user_ro
  • /etc/pam.d/jcprotect
  • /etc/pam.d/jcprotect-prompt
  • (64-bit only) /lib/x86_64-linux-gnu/security/
  • (64-bit only) /lib/x86_64-linux-gnu/security/
  • (64-bit only) /lib/x86_64-linux-gnu/security/
  • (32-bit only) /lib/i386-linux-gnu/security/
  • (32-bit only) /lib/i386-linux-gnu/security/
  • (32-bit only) /lib/i386-linux-gnu/security/

Understanding JumpCloud’s Allowlisted Login Items

With macOS 13 Ventura, end users have the ability to switch off persistent software, such as the JumpCloud Agent. Ventura also introduces the concept of allow listed Login Items, which is a list of third-party apps that users are allowed to log in to with Mobile Device Management (MDM). 

JumpCloud uses an allow list so that these Login Items can use JumpCloud’s MDM:

  • Apple’s code-signing identity for apps signed by our team ID. For example, N985MXSH86.
  • JumpCloud Launch Daemons and Launch Agents that are labeled as com.jumpcloud. You can see what is running on your device by reviewing the /Library/LaunchDaemons directory and the /Library/LaunchAgents directory. For example:


If you are not using JumpCloud’s MDM, but you are using another MDM vendor, you can use JumpCloud’s Mac Managed Login Items Policy to add Login Items to an allow list for your macOS devices. For more detail and instructions, see Create a Mac Managed Login Items Policy.

Back to Top

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case