Skip to main content

Apple Firewall Policy

Updated this week

The Apple Firewall Policy allows administrators to configure and enforce macOS firewall settings across managed devices.
This policy enhances endpoint security by controlling incoming connections, managing app-level permissions, and enforcing firewall logging behaviors.

By using this policy, organizations can ensure consistent firewall configurations on all company-managed macOS devices.


Overview

The macOS Application Firewall monitors and controls incoming network connections to your Mac.
The Apple Firewall Policy gives IT administrators centralized control over these firewall settings through Swif MDM, ensuring devices remain protected from unauthorized access and comply with organizational security requirements.


Requirements

  • Minimum OS version: macOS 10.12+

  • Management type: Device must be supervised or enrolled via Swif.ai MDM

  • Some logging options: Available on macOS 12+; removed in macOS 15+


Configurable Settings

Below is a breakdown of all settings available in the Apple Firewall Policy.


Applications

A list of apps for which firewall connection rules are enforced.
Admins can add multiple applications and define how they behave with the macOS firewall.


Block All Incoming Connections

Description

When enabled, macOS blocks all incoming network connections, regardless of app permissions.

Minimum Requirement

macOS 10.12+

Recommended Use

High-security environments or devices exposed to public networks.


Allow Incoming Connections to macOS Bundled Software

Description

Allows Apple’s built-in software (e.g., Facetime, AirDrop services) to receive incoming network connections.

Minimum Requirement

macOS 12.3+

Notes

Useful when blocking all incoming connections but allowing trusted system apps.


Allow Incoming Connections to Downloaded Signed Apps

Description

Allows third-party signed applications to receive incoming connections.

Minimum Requirement

macOS 12.3+

Notes

Recommended when an organization needs certain apps (e.g., remote access tools, secure messaging apps) to work properly.


Enable Stealth Mode

Description

Prevents the Mac from responding to probing requests (e.g., ping). Protects against network reconnaissance.

Minimum Requirement

macOS 10.12+

Recommended Use

Security-sensitive environments and public networks.


Enable Firewall (Required)

Description

Toggles the macOS firewall on or off. This setting must be enabled for other firewall features to take effect.

Minimum Requirement

macOS 12+

Notes

If set to False, all other firewall settings are ignored.


Enable Logging

Description

Enables macOS firewall logging to capture firewall events (allowed/blocked connections).

Minimum Requirement

macOS 12+

Note

Removed by Apple in macOS 15+.


Logging Option

Description

Specifies the firewall log detail level (e.g., brief or detailed logging).

Minimum Requirement

macOS 12+

Note

Removed by Apple in macOS 15+.


Best Practices

  • Enable Firewall across all managed Macs to ensure a baseline level of protection.

  • Use Block All Incoming Connections for high-security devices such as developer machines, servers, or devices connecting to public Wi-Fi.

  • Enable Stealth Mode to prevent reconnaissance attacks or unsolicited communication attempts.

  • Allow incoming connections only for trusted, signed applications required for business operations.

  • Enable and tune logging (macOS 12–14) to support incident investigations and compliance audits.


How to Configure

  1. Go to Swif Admin Console → Policies → Create New Policy

  2. Select Apple Firewall Policy

  3. Configure the desired firewall settings

  4. Add applications (optional) for custom incoming connection behavior

  5. Click Continue to assign the policy to specific devices or device groups

  6. Review and confirm the policy

The policy will be applied automatically the next time macOS devices sync with Swif MDM.


Compliance & Security Benefits

  • Enforces consistent firewall behavior across the organization

  • Reduces exposure to unauthorized network connections

  • Supports compliance frameworks like SOC 2, HIPAA, PCI DSS, and ISO 27001

  • Enhances network security posture for remote, hybrid, and on-prem environments

  • Provides auditability via firewall logging (macOS 12–14)

Did this answer your question?