How to Spot a Malicious Configuration Profile on Mac
Configuration Profiles can override your homepage, install certificates, and lock settings. Here is how to find and read them.
6 min read · Beginner friendly
Configuration Profiles are intended for companies and schools to manage Macs at scale. Adware and scam apps abuse them to lock browser settings, install root certificates, and prevent you from changing things back.
If you do not work for an MDM-managed organisation, you should have zero Configuration Profiles installed. Anything present is suspicious by default.
Step 1: Open Device Management
- System Settings → General → Device Management
- On older macOS this is System Preferences → Profiles
- If the section is missing entirely, you have no profiles installed — that is the safe default
Step 2: Read each profile
- Profile name and signer — does it match a company you work for?
- What it controls (browser homepage, search engine, certificates, restrictions)
- When it was installed
Common malicious names include AdminPrefs, Chromium, generic developer IDs ending in .com.adobe.xyz impersonating Adobe, or anything tied to your hijacked search engine.