OS X Mavericks: Firewall pane of Security & Privacy preferences

This article has been archived and is no longer updated by Apple.
Firewall pane of Security & Privacy preferences

You can use the firewall in OS X to prevent unwanted connections from the Internet or other networks.


Turn On Firewall

If Firewall is turned off, click Turn On Firewall to turn on firewall protection.

To modify firewall settings, click Firewall Options.

Firewall Options

The Firewall Options button lets you change firewall settings.

Block all incoming connections

Prevent incoming connections to nonessential services and apps.

Basic Internet services are a set of apps that allow your computer to find services provided by other computers on the network. This setting prevents connections to all other sharing services.

Add (+)

To add an app, click Add (+), select the app in the list, then use the Up Arrow and Down Arrow keys to set the limits for the app.

Delete (-)

To remove an app, select it in the list, then click Remove (-).

Automatically allow signed software to receive incoming connections

Allow apps and services that are signed by a valid certificate authority to be automatically added to the list of allowed apps, without your authorization. For example, iTunes is signed by Apple, and so it is automatically allowed to receive incoming connections through the firewall.

Enable Stealth Mode

Stealth mode prevents your Mac from responding to probing requests that can be used to reveal its existence. The Mac still answers requests from authorized apps, but unauthorized requests such as ICMP (ping), get no response.


Locks or unlocks Security & Privacy preferences. An administrator password is required to modify these preferences.

Certain shared services can connect through the firewall when they are turned on in Sharing preferences. For additional security, you can prevent connections to these incoming services by turning off the service in Sharing preferences. For more information about sharing, see:

Share your Mac with others on your network

Published Date: Oct 20, 2015