Secure Mac network services

Network administrator - Mac, with outstanding advantages built on UNIX, is a more secure system than Windows. A lot of viruses, spyware, malware and "disease" network vulnerabilities for Windows computers are impotent against the Mac, but that doesn't mean the Mac doesn't interfere with these threats. . Here are some ways to protect your Mac from within corporate environments.

Secure file sharing

Secure Mac network services Picture 1 Very few network services are enabled by default on Macs. Automated services are usually required for network connectivity. That means that Mac systems respond to a small number of requests from external computers, which helps it increase security.

When enterprise administrators deploy Macs, files need to be shared from some centralized server. Setting up centralized servers allows you to take advantage of groups, policies and other traditional methods to protect file access in a secure network.

In cases where files need to be shared from individual Macs, whether using AFP, FTP or SMB, you need to configure the systems to require user authentication. Anonymous FTP is disabled on Macs by default; You should not reverse this setting. In addition, guest access should also be disabled from within the Account preferences.

Remember, when file sharing is enabled, administrative users can remotely mount (mount) any partition or drive and both administrative and standard users can access the folder at their home remotely. Public folders are automatically shared when new administrative or standard users are added.

Unless there is a reason for some extra theory, business administrators should disable these default settings within the Sharing preferences or Finder 's Get Info window to increase security. Customize file sharing through the Finder window within its Sharing & Permissions area , allowing additional tweaking of any file sharing enabled on the Mac.

Secure screen sharing

Macs include screen sharing features designed to assist in troubleshooting remote clients. This feature uses an encryption form of the Virtual Network Computing (VNC) protocol. Because the feature will enable viewing and remote control of the Mac, you need to be careful to ensure network security. The service, when enabled within the System Preferences Sharing interface, will listen for UDP and TCP traffic on port 5900.

When screen sharing is enabled, or when enterprise administrators buy Apple Remote Desktop (ARD) remote registration, the service will be activated. By default, all non-guest users are allowed to access the service. Therefore it is best to limit sharing terms, then only allow on systems where this feature is required (it should be disabled on systems where possible to tighten security issue). When the service needs to be activated, the administrator needs to specify which users will be allowed to access the screen sharing feature.

Within the Screen Sharing interface, select the Allow Access For button to restrict screen sharing access to some users on your list. List which user accounts to authenticate can perform support and remote management activities.

Mac firewall

Many enterprise administrators deploy solid firewalls in the network perimeter. However, hardware routers that protect internal networks are not very easy to use. When the first step is required, they only protect the systems on the other side of the wall at a moderate level, nor do they protect the client system gateway firewall when the system works outside by employees. mobile. That is why enterprise administrators should consider promoting the advantages of Mac application firewalls.

Mac OS X's personal application firewall Snow Leopard can take advantage of rules and enable / disable traffic 'dynamics' to better protect network services. It allows network connections based on service and application requirements, not just static ports, so better protection of mobile systems compared to hardware devices is not always present. . Because the firewall is active, it will improve security.

Consider adding an IM program. When the user logs in and iChat is opened, the individual application firewall will allow the necessary ports for the application's operation. However, when they close the application (or other services, when logging out), the Mac firewall will close those ports, so it will tighten security issues.

The Mac firewall is activated from within the System Preferences Security interface. Click the Firewall tab to open the firewall interface. Logging is always enabled. The recorded information will be stored inside the file /private/var/log/appfirewall.log. In addition, the firewall can be customized. Using the Advanced button, you can check the positive services and adjust certain services.

5 ★ | 1 Vote

May be interested

  • Common myths about 4G networksCommon myths about 4G networks
    we are too familiar with the 4g network phrase when network operators officially cover the users. however, not everyone has the right views about 4g services, let's review the confusion about 4g that many people still believe through the article below.
  • How to Set Up and Use SSH in LinuxHow to Set Up and Use SSH in Linux
    secure shell, commonly known as ssh, is a network protocol for establishing secure connections between remote clients and servers. it is designed to allow users to securely log on to a variety of computers remotely over the network.
  • 5 best WiFi analyzer tools to check if the network is secure5 best WiFi analyzer tools to check if the network is secure
    if your home network doesn't protect you from intruders, you're at risk. this is why you need a wifi analyzer, a scanning program to check if the network is secure or not.
  • Super secure SIM card, only connecting data via Tor anonymity network helps protect information for usersSuper secure SIM card, only connecting data via Tor anonymity network helps protect information for users
    this super-secure sim card can block bandwidth without connecting tor out of the phone. this means that, when using this sim card, all mobile data bandwidth on the phone must go through the tor network.
  • Installing and configuring the 2004 ISA Server Firewall - Chapter 2 Installing Certificate ServicesInstalling and configuring the 2004 ISA Server Firewall - Chapter 2 Installing Certificate Services
    microsoft certificate services can be installed on the domain controller of the internal network and provide certificates to hosts on the internal network domain, as well as hosts that are not members of the internal network domain.
  • Broadband networkBroadband network
    today's communication networks often provide only a few types of information services. meanwhile, the need to exchange information of users is increasing and diverse, requiring the ability to connect everywhere at all times and high access speed. broadband network (broadband ne
  • Are 4G and 4G LTE networks the same?Are 4G and 4G LTE networks the same?
    the 4g network is now almost covered to all carriers, with activation programs and registration for 4g services. however, do you wonder why in your device there is a 4g lte network symbol, not 4g?
  • Secure WiFi in enterprise environment from basic stepsSecure WiFi in enterprise environment from basic steps
    wifi is an entry-point (an entry point) that hackers can use to infiltrate your network without stepping into your company's headquarters, because wireless networks are more vulnerable to eavesdropping than wired networks. this makes network administrators more diligent in the security of wifi networks.
  • Broadband service transmission by local area networkBroadband service transmission by local area network
    nortel vietnam's new network solution allows service providers to use ethernet, the pc-connected architecture in the local area network (lan), as a tool to deliver broadband services such as iptv, mobile video and other services. service
  • Multiple choice questions on network security deployment have the answer P6Multiple choice questions on network security deployment have the answer P6
    in the current technology era, it is extremely necessary for anyone to be secure when accessing the network. in this test, network administrator will provide you with useful knowledge to ensure network security. invite your reference.