Skip to main content

How to use a firewall and stealth mode on a Mac

While the general consensus regarding whether a Mac is more secure than Windows leans toward Apple’s system, it doesn’t mean a Mac is still unable to be affected by hackers and malware; it's still vulnerable. When it comes to security, the Mac includes a few built-in features that go a long way in providing a secure user experience. We take a look at how to use some of these, namely the firewall and stealth mode on a Mac.

Related Videos




5 minutes

What You Need

  • A Mac system

How to use a firewall

Before we explain the steps in using a firewall on a Mac, it’s important to understand the actual purpose behind a firewall. Firewalls protect the system from an outside threat actor or a harmful connection gaining access to your Mac when you’re connected to the internet or to a given network. With this in mind, it doesn’t necessarily work in the same way traditional antivirus software operates, but that’s not to say it’s a redundant feature.

Macs can always be targeted in order for someone to infiltrate your system when utilizing a network that’s not trusted or unknown. That being said, let’s take a look at the steps you can take for using a firewall on a Mac.

Step 1: Select the Apple logo on the top left of your Mac screen and open System Preferences, choose Security & Privacy, and click the Firewall tab.

how to use a firewall and stealth mode on mac macfirewallwindow

Step 2: You’ll need to click the lock button located at the bottom-left corner. Enter your username and password (providing you’re an administrator).

Step 3: Select the Turn on Firewall button.

If you know what you’re doing and require more specific control over the firewall, select the Firewall Options button. Here, you’ll have access to the following (for macOS Monterey):

Allow only specified apps and services to connect: Click the Add (or "+" sign for earlier versions of macOS) button, and choose the app or service you wish to include. With each application you add, you have the ability to either allow or block incoming connections.

Allow only essential apps and services to connect: Choose the Block All Incoming Connections box.

Automatically allow built-in software to receive incoming connections: This option is enabled by default and allows default Apple apps integrated into the Mac to receive incoming connections.

Automatically allow downloaded signed software to receive incoming connections: This is also enabled by default and allows any software that is signed by a valid certificate authority to provide services accessed from the network.

Enable stealth mode: The final configuration option when it comes to the Mac’s firewall is a feature that strengthens the overall security of your Mac, consequently making it more challenging for hackers and malware to infiltrate your system. One example of this is unexpected requests such as ICMP (ping) being ignored by your system. Stealth mode will also prevent your Mac from responding to probing requests. That said, the system will still be capable of answering incoming requests for authorized apps. It’s a particularly relevant feature for when a Mac is connected to external networks — more on that in the next section.

Ultimately, upon your Mac detecting an attempt to connect to an app that hasn’t been included within the list of apps that can access your Mac (as explained in Step 3), an alert will pop up giving you the choice to allow or deny the connection over either the network or internet.

If you attempt to open an unsigned app that is not listed within the firewall list, a message that gives you options to Allow or Deny connections for that app is shown. Clicking Allow will make your Mac’s operating system sign the application, as well as adding it to the firewall list automatically. Selecting Deny, meanwhile, makes the Mac add the program to the list but denies incoming connections for the app itself.

how to use a firewall and stealth mode on mac macfirewalloptions

How to use stealth mode

As we touched on above, stealth mode is a useful feature that will essentially make your Mac invisible to outside networks. It’s not necessarily essential when you’re confined to your own private network when at home. However, it can prove to be useful when you’re exposed through a public or shared network in settings such as coffee shops that provide Wi-Fi or an internet hotspot point when you’re commuting, university Wi-Fi access, etc.

Hackers and criminals can target a Mac if it’s connected to a public or shared network. By enabling stealth mode, no one else that has access to the same network you’re using can discover your system.

Step 1: Go to System Preferences, click Security & Privacy, and select Firewall.

how to use a firewall and stealth mode on mac macstealthmode

Step 2: You’ll need to have the Mac’s firewall enabled. Click Firewall Options and then click the Enable Stealth Mode button. Click OK to confirm the change.

It should be noted that with stealth mode enabled, it could potentially make it difficult to diagnose and troubleshoot an issue pertaining to network access. It can offer an additional layer of security when you’re using a public network, but when at home, a Mac that has stealth mode switched on won’t be capable of receiving or responding to ping requests. Connection attempts from a closed TCP or UDP network will also be completely rejected.

You won’t even receive a message from the Mac that lets you know a connection is attempting to be made to your system. As such, just be sure to know whether you have the setting enabled or you may spend countless hours trying to fix connectivity issues.

Editors' Recommendations

How to use DALL-E 2 to generate AI images
DALL-E 2DALL-E 2 Image on OpenAI.

As AI image generation skyrockets in popularity, many people are looking for easy ways to do it, such as how to use DALL-E 2 to generate AI images on your own computer. DALL-E (yes, named after WALL-E, as well as Salvador Dali) and its successor DALL-E 2 brought their own brand of AI image generation to the internet, developed by OpenAI, the creator of ChatGPT. but access to the software has been highly restricted.

Read more
Bing Chat: how to use Microsoft’s own version of ChatGPT
Bing Chat shown on a laptop.

Microsoft has added AI to its Edge browser and Bing search engine, and it's powered by the same advanced technology that OpenAI used to create ChatGPT. It's also available in mobile apps, enabling AI interaction by voice.

Here's how to sign up and use Bing Chat today.
How to get Bing Chat

Read more
Your Windows 11 screenshots may not be as private as you thought
Person sitting and using an HP computer with Windows 11.

When you capture a screenshot and crop out sensitive information, it's still possible to recover a portion of the image that was supposedly removed in some circumstances.

This isn't the first time redacted documents have turned out to have left hidden data intact and readable with the right tools and knowledge. A recent bug in Google's Markup tool for the Pixel phone, humorously dubbed the "Acropalypse," shows this issue might be surprisingly common.

Read more