Dashboard
Last scanned: 2 min ago
Health Score
Unsigned app running from ~/Downloads
Unknown binary without code signature detected
High CPU usage: node (47%)
Mac Firewall: Should You Turn It On or Off?
The macOS firewall is probably turned off on your Mac right now. Most people never touch it, and honestly, that's not necessarily wrong. But if you're wondering whether you should flip that switch, there's more to consider than you might think.
I spent years assuming the Mac's firewall was this comprehensive security barrier. Turns out it's way more limited than I expected — and understanding those limits is crucial for making the right choice for your setup.
What Exactly Is the Mac Firewall?
When we talk about the "Mac firewall," we're really talking about the Application Firewall that lives in System Settings > Network > Firewall. This isn't the same thing as the packet filter (pf) that's actually built into macOS at a lower level.
The Application Firewall is pretty straightforward. It blocks incoming connections to applications on your Mac. That's it. No outgoing traffic filtering, no deep packet inspection, no fancy rules engine. Just "should this app accept incoming connections or not?"
Here's where it gets interesting though — macOS actually runs a more powerful firewall called pf under the hood. You can see it if you run sudo pfctl -s all in Terminal. Most of the time it's doing nothing, but some apps (like Little Snitch) can configure it for more advanced filtering.
The Application Firewall sits on top of this, providing a simpler interface that regular users can actually understand. Smart design choice, honestly.
How to Find and Configure the Firewall
The firewall lives in System Settings > Network > Firewall. If you're still on an older macOS version, it might be under System Preferences > Security & Privacy > Firewall.
When you first click that settings pane, you'll probably see it's turned off. If you turn it on, you get two main options:
The basic mode blocks incoming connections to all apps except those you specifically allow. When an app tries to accept an incoming connection for the first time, macOS will ask if you want to allow it.
Then there's "Block all incoming connections" mode, which is exactly what it sounds like. This blocks everything except essential system services. Your Mac can still connect out to the internet, but nothing can connect back to it.
There's also a "Stealth Mode" checkbox that makes your Mac ignore ping requests and other network probes. Basically, it makes your Mac invisible to port scanners.
The Big Limitation: Outgoing Traffic Isn't Filtered
This is the part that surprised me when I first dug into macOS security. The Application Firewall only cares about incoming connections. If malware on your Mac wants to phone home or exfiltrate your data, the firewall won't stop it.
Think about it this way: if someone breaks into your house, a door lock keeps them from getting in, but it doesn't stop them from walking out with your stuff once they're inside.
This is actually one reason I built CoreLock — I got tired of security tools that show you threats with zero context. A firewall that only blocks half the traffic isn't giving you the full picture of what's happening on your system.
For outgoing connections, you'd need something like Little Snitch, which can monitor and block outbound traffic. That's a different tool entirely, and honestly, it's probably overkill for most people.
When You Should Turn the Firewall On
I'd recommend turning on the Mac firewall if you're on public WiFi regularly. Coffee shops, airports, hotels — these networks often have hundreds of devices, and you don't want some random person port-scanning their way into your machine.
The firewall also makes sense if you're running server software on your Mac. Maybe you're testing a web app locally or running a development database. The firewall can block unwanted access to these services while still letting you work normally.
Here's another scenario: if you're in a corporate environment where network security is inconsistent. I've seen office networks where someone's compromised Windows machine was scanning for vulnerable services. The Mac firewall would've blocked those probes.
If you work from home and your router has decent built-in security, the firewall is less critical. Your router is already doing network address translation (NAT), which blocks most incoming connections by default.
When You Might Want to Keep It Off
The firewall can break some legitimate software. Screen sharing apps, remote access tools, local development servers — these all need to accept incoming connections, and the firewall will block them until you create exceptions.
I've seen people turn on the firewall and then spend hours troubleshooting why their Plex server stopped working or why they can't connect to their Mac from their iPad. The fix is usually just adding the right exception, but it's annoying.
Gaming is another area where the firewall can cause issues. Some multiplayer games need to accept incoming connections for optimal performance. The firewall popup can be confusing if you're not expecting it.
To be fair, this is probably the biggest weakness of the Application Firewall's design. It's not smart enough to understand context, so it treats a legitimate screen sharing session the same as a malicious port scan.
Stealth Mode: Worth Enabling?
Stealth Mode is honestly one of those features that sounds cooler than it is. It stops your Mac from responding to ping requests and certain network scans, making it harder for attackers to discover your machine.
In practice, this matters most on public networks. If someone's scanning for vulnerable devices on the coffee shop WiFi, Stealth Mode makes your Mac invisible to basic discovery methods.
The downside is that legitimate network diagnostics can become more difficult. If your IT department needs to troubleshoot network connectivity, they might not be able to ping your machine to verify it's online.
I usually enable Stealth Mode if I'm turning on the firewall anyway. The extra privacy is worth the minor inconvenience, especially since most network troubleshooting can work around it.
The Application Exception Dance
Once you turn on the firewall, you'll start seeing prompts asking whether to allow incoming connections for various apps. This is where most people get confused.
Some of these prompts are obvious. Zoom wants to accept connections so people can share their screens with you? That makes sense. But what about when TextEdit or Calculator asks for network access? That's usually a sign something weird is happening.
In my experience building CoreLock's monitoring system, I've learned that legitimate apps sometimes request permissions they don't actually need. A PDF reader asking for camera access? Come on. Same principle applies to network permissions.
If you're not sure whether to allow an application, err on the side of caution and block it. You can always add an exception later in System Settings > Network > Firewall > Options if something breaks.
Third-Party Firewall Alternatives
If the built-in firewall feels too limited, there are alternatives. Little Snitch is the gold standard — it monitors both incoming and outgoing connections and gives you granular control over what each app can access.
Lulu is a free option that focuses on outgoing connections. It's made by Objective-See, the same folks behind KnockKnock and other solid Mac security tools.
The trade-off with third-party firewalls is complexity. They give you way more control, but they also generate way more alerts. Unless you're really paranoid about network security or working in a high-threat environment, they're probably overkill.
What About Advanced Threats?
Here's where I need to be honest: the Application Firewall won't protect you against sophisticated malware. If something gets installed on your Mac with admin privileges, it can probably configure firewall exceptions for itself.
Modern Mac threats are more likely to be things like infostealers that grab your browser passwords or keyloggers that record your typing. These don't need to accept incoming connections — they just need to phone home with your data.
This is why I always recommend layering your security. The firewall is one piece of the puzzle, but you also need to worry about what's already running on your system. Things like checking your LaunchAgents directory and monitoring background processes.
My Recommendation: Context Matters
So should you turn on the Mac firewall? It depends on your situation.
If you're frequently on public WiFi, absolutely turn it on. The minor inconvenience of managing application exceptions is worth the protection against network-based attacks.
If you work from home with a decent router and don't run server software, you can probably skip it. Your router's NAT is already providing similar protection for incoming connections.
If you're a developer or power user who runs local services, turn on the firewall but be prepared to manage exceptions. It's good security hygiene, even if it's occasionally annoying.
The one thing I wouldn't do is turn on "Block all incoming connections" mode unless you're in a genuinely high-threat situation. It breaks too much legitimate functionality for most people's daily workflows.
Remember, the firewall is just one layer of defense. It won't protect you from malicious software that's already installed, and it won't stop data from leaving your Mac if something gets compromised. For a more complete picture of what's happening on your system, you need tools that can monitor processes, network connections, and system changes — which is exactly why we built CoreLock to handle these broader security concerns.
The Mac firewall isn't perfect, but it's a decent tool for what it does. Just understand its limitations and don't expect it to be a silver bullet for Mac security.