Book Image

The macOS User Administration Guide

By : Herta Nava
Book Image

The macOS User Administration Guide

By: Herta Nava

Overview of this book

Apple is pushing the capabilities of its technologies to help users achieve high performance, including improvements in its OS running across all Mac systems, macOS, and new technologies such as M1 Silicon chips. This book walks you through macOS from a system administration and support point of view, exploring its latest features. The book starts by explaining macOS architecture, installation, and startup processes to enable you to get started with the OS. You'll learn how to manage users and discover techniques for user security and privacy. Moving on, you'll get to grips with the macOS file system and learn to manage disks, volumes, and partitions for effective file management. Most of the examples covered in this book are from an administrator's perspective; however, when relevant, a standard user's perspective is also presented. You'll find illustrations for Mac systems running macOS 11 (Big Sur), and when necessary, for macOS 10.15 (macOS Catalina). Finally, you'll explore advanced topics such as networking and using command-line tools for administration tasks. By the end of this macOS book, you'll be well-versed with macOS features, administration tasks, and best practices. You'll also be able to apply the concepts to increase your chances of success in obtaining Apple certifications such as Apple Certified Support Professional (ACSP).
Table of Contents (19 chapters)
18
About Packt

Understanding application security

macOS uses process security mechanisms, and built-in technologies such as System Integrity Protection (SIP), described earlier in this chapter, to protect the system resources and allow system-wide access to apps only when it's strictly necessary. Other technologies are employed to make apps more secure, such as app sandboxing, as well as features that protect your Mac from viruses and malware, compromised apps, and unauthorized access, in particular, when you wish to install third-party apps. In this section, you will learn about all these technologies and features, as well as how to configure them. By the end of this section, you will be able to configure them according to your specific security needs.

The topics we will explore will be divided into two main sections:

  • Application security technologies
  • Verifying app security settings

Let's start by exploring the macOS application security technologies.

Application security technologies

macOS...