Skip to content

Device Setup

Meridian Seven operates a BYOD (Bring Your Own Device) model. Your personal device needs to meet our security requirements before accessing company systems. The setup script automates this process.

git clone https://github.com/Meridian7-io/m7-security.git
cd m7-security
chmod +x scripts/device-setup-macos.sh
./scripts/device-setup-macos.sh
git clone https://github.com/Meridian7-io/m7-security.git
cd m7-security
Set-ExecutionPolicy RemoteSigned -Scope CurrentUser
.\scripts\device-setup-windows.ps1

The script automatically configures your device to meet Meridian Seven’s security requirements:

StepWhat Happens
OS CheckVerifies macOS 14+ or Windows 11 22H2+
1PasswordInstalls the app and CLI if missing
1Password Sign-InPrompts you to sign in (only manual step)
CrowdStrikeDownloads and installs the endpoint security sensor
Disk EncryptionEnables FileVault (macOS) or BitLocker (Windows)
Screen LockChecks timeout is 5 minutes or less
FirewallEnables the system firewall if not already on

The only step requiring your input is signing in to 1Password. Everything else is automated.

  1. Re-run the script to confirm all checks pass (all ✓)
  2. Restart your computer if prompted (FileVault or CrowdStrike may require it)
  3. Verify CrowdStrike — ask the CTO to confirm your device appears in the Falcon Console
  4. Save your FileVault recovery key in 1Password if you were prompted to enable encryption
RequirementmacOSWindows
OS VersionmacOS 14 (Sonoma)+Windows 11 22H2+
Disk EncryptionFileVaultBitLocker
Screen Lock≤ 5 min timeout≤ 5 min timeout
FirewallEnabledEnabled
EDRCrowdStrike FalconCrowdStrike Falcon
Password Manager1Password + CLI1Password + CLI

Close and reopen your terminal after installation. On macOS, you may need to run:

eval "$(/opt/homebrew/bin/brew shellenv)"

If the script says credentials are unavailable, contact the CTO — the Doppler service token may need to be configured.

FileVault starts encrypting after you restart. This is normal — restart and re-run the script.

Post in Slack #security or ask the CTO directly.

For the complete device setup guide with detailed troubleshooting, see the Device Setup Guide in the security documentation.

For the full BYOD policy, see the BYOD Endpoint Security Policy.