Apple Business Essentials User Guide
- Welcome
-
-
- Intro to buying content
- Review content payment and billing information
- Select and buy content
- Configure app installation
- Monitor app installation status and license tracking
- Learn about Custom Apps
- Transfer licenses
- Manage content tokens
- Migrate content tokens
- Invite VPP purchasers
- Plan for migration to Apps
-
- Intro to configuring settings
-
- AirDrop settings
- AirPlay settings
- AirPrint settings
- App Access settings
- Apple Intelligence & Siri settings
- Application Layer Firewall settings
- Certificate settings
- Content Caching settings
- Configure a Custom setting
- Data Management settings
- Energy Saver settings
- FileVault settings
- Gatekeeper settings
- iCloud settings
- Lock Screen settings
- Password and Screen Lock settings
- Software Update settings
- VPN settings
- Web Clip settings
- Web Filter settings
- Wi-Fi settings
- Edit a setting
- Apply Collections
- Document revision history
- Copyright and trademarks

Configure an Application Layer Firewall setting in Apple Business Essentials
The Application Layer Firewall setting is used to turn on the firewall in macOS to prevent unwanted connections from the internet or other networks.
A Mac can still allow access through the firewall for some services and apps. For example:
If you turn on a sharing service, such as file sharing, macOS opens a specific port for the service to communicate through.
An app or service on another system can request and be given access through the firewall, or it might have a trusted certificate and therefore be allowed access.
In Apple Business Essentials, sign in with a user who has the role of Administrator.
Select Settings
in the sidebar, then select All Settings.
This setting is available only for macOS.
Select the Add button
next to Application Layer Firewall
, then do one or both of the following:
Block all incoming connections: This option blocks all incoming connections except those required for basic network and internet services, such as DHCP, Bonjour, and IPsec. This also prevents connections to all other sharing services.
Turn on Stealth mode: This option prevents a Mac from responding to probing requests that can be used to reveal its existence. The Mac still answers requests from authorized apps, but unauthorized requests such as ICMP (ping) get no response.
Select Save.