Skip to content
Firewall

Firewall

Published by Apple, Inc.

Configure firewall rules and network security policies for Mac devices to control inbound and outbound network traffic. Define application-specific firewall rules, enable stealth mode to prevent network discovery, block all incoming connections, or allow signed applications automatically. Deploy this profile to enforce consistent network security policies across managed devices, protect endpoints from unauthorized access, and ensure compliance with organizational security requirements. Essential for securing devices in enterprise, education, and remote work environments.

OS requirements
macOS 10.7+
Related items:
FileVault
FileVault

Enable full-disk encryption on Mac devices using Apple's FileVault technology to protect data at rest with XTS-AES-128 encryption. Configure FileVault to require user authentication at startup, manage recovery key escrow options, and enforce encryption policies across your devices. Deploy this profile to ensure compliance with data protection regulations, safeguard sensitive information on lost or stolen devices, and maintain centralized control over encryption settings. Supports both institutional recovery keys and personal recovery keys for flexible key management strategies.

VPN
VPN

Configure Virtual Private Network connections for Apple devices to enable secure remote access to organizational resources. Define VPN protocols (IKEv2, IPSec, L2TP, Cisco AnyConnect), authentication methods, server endpoints, and connection parameters. Deploy this profile to establish encrypted tunnels for remote workers, protect data transmission over untrusted networks, and enforce always-on VPN policies. Supports split-tunnel configurations, on-demand connection rules, and per-app VPN assignments for granular access control.

Windows Firewall
Windows Firewall

Configure Windows Firewall rules and policies to control inbound and outbound network traffic on Windows devices. Define port exceptions, application-specific rules, and network profile behaviors for domain, private, and public networks. Deploy this profile to enforce consistent security policies across endpoints, restrict unauthorized network access, allow specific applications or services through the firewall, and ensure compliance with organizational security requirements while maintaining necessary connectivity for business operations.

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.