Update Your Mac

Update your Mac

It is Partners policy to download all current Operating System & software updates for your Mac. Vulnerabilities are discovered frequently in software, and they put your Mac, your data, and the enterprise at risk. In order to stay protected, ensure that you are running a current, supported Operating System, and that your software applications are up to date. 

To update your Operating System, launch Apple's App Store from the Apple Menu Icon > App Store, then click Updates in the menu. Proceed to download and install all available updates. 

Update Your Software Applications

Software Applications also need to be kept current to ensure your security and your ability to operate in the enterprise. Apps that should be checked for updates include Microsoft Office, Java, Adobe Flash, Cisco AnyConnect VPN client, and any other application you rely upon to conduct business. PEAS Self Service in your Applications folder has all current enterprise software available for download. 

Supported Mac Operating Systems

Apple supports their current Operating System and two versions prior. Vendors only release updates for supported Operating Systems, so Partners enterprise services like Email, Citrix, and VPN rely upon a Mac that is up to date. Check your Operating System version from the Apple Menu Icon > About This Mac. The supported Apple Operating Systems are:

  • macOS Catalina 10.15 (2019)
  • macOS Mojave 10.14 (2018)
  • macOS High Sierra 10.13 (2017)

Updates are not released for out of date Operating Systems, so running 10.12, 10.11, 10.10, 10.9, 10.8, 10.7 and lower all put you at risk. If you are running an out of date Operating System, open a Service Desk request for assistance with an upgrade.


System owners are responsible for timely implementation of software patches, firmware updates, configuration updates and any other corrective measure that has been identified to reduce risks associated with information technology resources that are out of date, misconfigured, missing software or firmware patches, and are otherwise configured in a manner which increases the risk of remote exploit of the resource.