Overview
This guide provides IT administrators with the necessary steps to ensure Cluely’s automatic updates work properly on managed work computers. Cluely uses secure, signed updates to deliver new features and security patches to ensure optimal performance and security.”An Update Is Ready To Start”
If you are getting a native macOS Update Helper request every 5- 15 minutes, **please note that these are not Update Requests. **Cluely only releases every 2 days. You are using Cluely on a laptop that is strictly IT or MDM managed. Cluely requests system access every 5 minutes to refresh for calendar events, audio changes, and update checking. This is not something we can disable, but you can intro your IT team to our sales team to get Cluely approved system wide. In the meantime, please use Cluely on a non-work laptop.Common Issues
Update Helper: Admin Password
Seeing a request to enter MacOS password to approve an update? This is a sign you have a corporate managed device and an IT Admin did not approve or install Cluely. The root of the problem is that these apps were installed system-wide (and thus triggering the work level approval), instead of local user storage.-
**Local Applications Fix: **
The immediate workaround is to copy Cluely to a place where your current user has write access:killall Slack && rsync -av --delete /Applications/Slack.app/ ~/Applications/Slack.app/ && open ~/Applications/Slack.app(if you prefer the Finder, drag and drop instead).
Now when the Cluely application’s built-in update mechanism tries to write to its files, it can. No more annoying pop-up windows! - Delete the Cluely.dmg and Have an IT Admin Install Cluely Instead
Network Requirements
Required Domain Whitelisting
To allow Cluely auto-updates, whitelist the following domains in your firewall, proxy, and network security settings: Core Cluely Services:platform.cluely.comservice.transcribe.cluely.comapp.cluely.comdesktop.cluely.comdesktop.app.cluely.comflags.cluely.comimg.cluely.com
updates.cluely.com(primary update server)downloads.cluely.com(update package downloads)api.cluely.com(update check API)
Network Protocol Requirements
Ensure the following protocols are allowed:- HTTPS (443) - For secure update downloads and API communication
- WebSocket Secure (WSS) - For real-time update notifications
- HTTP/2 - For efficient update package delivery
Corporate Network Considerations
If your organization uses:- Corporate Proxy: Configure proxy settings to allow Cluely update traffic
- SSL Inspection: Add Cluely domains to SSL inspection bypass list
- Content Filtering: Whitelist Cluely domains to prevent update blocking
Code Signing Certificate Management
Cluely signs all update packages with digital certificates to ensure authenticity and integrity. You must recognize and trust these certificates on managed devices.- macOS
- Windows
1. Retrieve Cluely’s Code-Signing Certificate
Download the latest Cluely application from cluely.com/downloads and extract the certificate information:Authority field in the output, which shows the certificate’s Common Name (CN).2. Configure Application Whitelisting
For Google Santa:- Navigate to Configuration Profiles
- Create new profile for Application & Custom Settings
- Add Cluely’s team identifier to allowed applications
- Deploy to managed devices
- Go to Device Configuration > macOS > Configuration Profiles
- Create new profile with “Application & Custom Settings”
- Add Cluely’s bundle identifier and team ID
- Assign to device groups
3. Gatekeeper Configuration
Ensure Gatekeeper allows Cluely updates:4. Notarization Trust
Cluely updates are notarized by Apple. Ensure your devices trust notarized applications:Update Mechanism Configuration
Automatic Update Settings
Cluely checks for updates automatically. Ensure these settings are configured: macOS:- System Preferences > Software Update (ensure automatic updates are enabled)
- Allow Cluely to run background processes for update checks
- Windows Update settings should allow automatic updates
- Ensure Windows Defender doesn’t block Cluely update processes
Update Frequency
Cluely typically checks for updates:- On application startup
- Every 24 hours when running
- When manually triggered by user
Monitoring and Troubleshooting
Update Status Monitoring
Monitor update success through: macOS:Common Issues and Solutions
Updates Blocked by Antivirus:- Add Cluely update directories to antivirus exclusions
- Whitelist Cluely processes in real-time protection
- Verify all required domains are whitelisted
- Test connectivity to update servers
- Check proxy configuration
- Re-import Cluely’s certificate
- Verify certificate hasn’t expired
- Check certificate chain validation
Security Considerations
Certificate Validation
- Regularly verify Cluely’s certificates haven’t been revoked
- Monitor for certificate expiration dates
- Subscribe to Cluely security notifications
Update Integrity
- All updates are cryptographically signed
- Verify update packages before deployment
- Monitor for any security advisories from Cluely
Network Security
- Use HTTPS for all update communications
- Implement proper firewall rules
- Monitor update traffic for anomalies
Best Practices
- Test Updates: Deploy updates to a test group before organization-wide rollout
- Monitor Performance: Track update success rates and user experience
- Document Changes: Keep records of certificate updates and policy changes
- Regular Reviews: Periodically review and update whitelist and certificate configurations
- User Communication: Inform users about update schedules and expected behavior
Support and Resources
For additional support with Cluely auto-updates on managed devices:- Technical Support: Contact Cluely support with your organization’s details
- Certificate Updates: Monitor cluely.com/downloads for certificate changes
- Security Advisories: Subscribe to Cluely security notifications
- Documentation: Refer to Cluely’s enterprise documentation for additional configuration options
Compliance and Audit
Maintain compliance with your organization’s security policies by:- Documenting all certificate installations
- Recording network whitelist configurations
- Auditing update success rates
- Maintaining logs of update activities
- Following your organization’s change management procedures