Need help to understand if my machine is compromised

I have a Macbook Pro which I got from my office Mac Os Monterey.

I am noticing very strange logs in my machine. Can anyone let me know If my system has compromised or not.

Please find attache sample log.


I think ms team and edge are in use in my case. Also some times I can see there are changes in my display



Regards,

Partha


Posted on Jul 11, 2022 12:30 PM

Reply
12 replies

Jul 11, 2022 12:49 PM in response to PSP1986

I see nothing but ordinary chatter, but log files are about the least-best way to search for issues. Not until you have a specific target to search for, then logs get more interesting. Logs? Lots and lots of haystacks of data. Whether there’s even a needle in one of the haystacks, and what that needle even looks like, not so much.


What symptoms or concerns or issues or errors do you have about this particular Mac?


Log files are routinely filled with cryptic and scarily-worded messages, and contain contents intended for the app developers that created the apps and the messages.


And the word you were looking for was “redacted”.

Jul 11, 2022 01:11 PM in response to PSP1986

Why do you particularly suspect your display is being mirrored? Is the screen-mirroring warning active?


What have you already done to secure your Mac? Monterey? Two-factor authentication on your Apple ID?


Is this Mac one you received pre-installed from your IT organization, or was this a hand-me-down of sorts and not (re)installed for your use?


As for Microsoft Teams, you’ll want to check with your IT organization or with Microsoft about the behavior of that app.


More generally, this concern is best directed to your IT team for a look, as they know what’s supposed to be installed here.

Jul 12, 2022 02:23 AM in response to PSP1986

If this is a computer that was setup and provided by your work, then I'd suggest talking to your IT department. If you used the computer for something you shouldn't then rap your knuckles with a wooden ruler.


Never use a work computer for anything you shouldn't. Buy a personal computer to separate business from personal. If you know of a coworker who is tech smart, consider asking him/her for help. Otherwise, you may have to fall on your sword and talk to IT.


Some companies monitor use of the computer and install key loggers and other software to see if you are working and those will likely phone home and rat you out. It is difficult to determine if you are not computer savvy. Use the Activity Monitor and look up the processes that look suspicious. If possible use a different computer to look them up to keep your company from figuring out what you're doing.

Jul 12, 2022 02:35 AM in response to PSP1986

Whenever you look at things like system logs you will inevitably find lots of things you don't understand (and nor do most of us). That per se does not indicate any signs of malfeasance.


As already noted, this being a work machine, you may take your concerns to the IT guys from your work. They are responsible for setting things up.


If you want a little more comfort, you could download and run the diagnostic tool Etrecheck and post its report here, using the "additional text" button below your message area. That is something that we can understand and it will report on any installed system modifications.


Jul 21, 2022 01:27 AM in response to David Stempnakowski

my device was hacked and my Apple ID is also compromised. I am using a new I’d to reply this.

When it department was investigating the device suddenly rebooted and my mac was not usable. The recovery disk was gone.


my I’d which was with my I phone that also compromised apple support team is not helping me to retrieve that I’d rather than wasting time on this and transferring the call to various customer care agents.


Regard

Partha

Jul 21, 2022 02:23 AM in response to ParthaSarathiPqnde

To Hack the Computer that is Registered to a Mobile Digital Managements Service ( MDM ) the IT Department that is responsible for the Computer is really the only Source for resolution to this issue.


The MDM controls the computer, what you the user can or can do with this computer and the overall security of this computer.


That said, contact the Responsible Party ( IT Department ) for resolution


There is next to nothing we can do except urge the User ( you ) to follow the previous advices

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Need help to understand if my machine is compromised

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.