{"id":1775,"date":"2010-05-26T18:01:32","date_gmt":"2010-05-26T17:01:32","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1775"},"modified":"2010-05-26T18:01:32","modified_gmt":"2010-05-26T17:01:32","slug":"apple-releases-snow-leopard-security-configuration-guide","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/","title":{"rendered":"Apple Releases Snow Leopard Security Configuration Guide"},"content":{"rendered":"<p>Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow Leopard, Mac OS X 10.6. This is not for novices, however. As Apple points out on the <a href=\"http:\/\/www.apple.com\/support\/security\/guides\/\">download page<\/a>:<\/p>\n<blockquote><p>\nTo use these guides, you should be an experienced Mac OS X user, be familiar with the Mac OS X user interface, and have at least some experience using the Terminal application\u2019s command-line interface. You should also be familiar with basic networking concepts.<\/p>\n<p>Certain instructions in the guides are complex, and deviation could result in serious adverse effects on the computer and its security. The guides should only be used by experienced Mac OS X users, and any changes made to your settings should be thoroughly tested.\n<\/p><\/blockquote>\n<p>So let the reader beware!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow Leopard, Mac OS X 10.6. This is not for novices, however. As Apple points out on the download page: To use these guides, you should be an experienced Mac OS X user, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1667,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[3151,80],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Releases Snow Leopard Security Configuration Guide  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-26T17:01:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"133\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg\",\"width\":\"128\",\"height\":\"133\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/\",\"name\":\"Apple Releases Snow Leopard Security Configuration Guide - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage\"},\"datePublished\":\"2010-05-26T17:01:32+00:00\",\"dateModified\":\"2010-05-26T17:01:32+00:00\",\"description\":\"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Releases Snow Leopard Security Configuration Guide\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Apple Releases Snow Leopard Security Configuration Guide\",\"datePublished\":\"2010-05-26T17:01:32+00:00\",\"dateModified\":\"2010-05-26T17:01:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage\"},\"wordCount\":141,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg\",\"keywords\":[\"Apple\",\"Mac OS X\"],\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/","og_locale":"en_US","og_type":"article","og_title":"Apple Releases Snow Leopard Security Configuration Guide  - The Mac Security Blog","og_description":"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-05-26T17:01:32+00:00","og_image":[{"width":"128","height":"133","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg","width":"128","height":"133"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/","name":"Apple Releases Snow Leopard Security Configuration Guide - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage"},"datePublished":"2010-05-26T17:01:32+00:00","dateModified":"2010-05-26T17:01:32+00:00","description":"Apple has released their Snow Leopard Security Configuration Guide, a detailed 272-page PDF that examines all of the built-in security settings in Snow","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Releases Snow Leopard Security Configuration Guide"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Apple Releases Snow Leopard Security Configuration Guide","datePublished":"2010-05-26T17:01:32+00:00","dateModified":"2010-05-26T17:01:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#webpage"},"wordCount":141,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-snow-leopard-security-configuration-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg","keywords":["Apple","Mac OS X"],"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/apple-mac-os-x-snow-leopard-box-top.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-sD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1775"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1775"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1667"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}