{"id":49009,"date":"2016-02-22T09:16:55","date_gmt":"2016-02-22T17:16:55","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49009"},"modified":"2019-05-17T21:49:51","modified_gmt":"2019-05-18T04:49:51","slug":"os-x-security-under-the-hood-features-that-protect-your-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/","title":{"rendered":"OS X Security: Under the Hood Features That Protect Your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50281\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Mac-Security-Under-the-Hood.jpg\" alt=\"Mac OS X Security Under the Hood Features\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Mac-Security-Under-the-Hood.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Mac-Security-Under-the-Hood-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Mac-Security-Under-the-Hood-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>When you use your Mac for work or play, you see windows and menus for the apps you use, for settings, and more. But these user-facing features are just a small part of what powers an operating system. In addition to all of the many calculations your Mac makes so your apps can do their work, displaying text and video, there are many under the hood security features that keep you and your data safe.<\/p>\n<p>Over the years, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-security-features-timeline\/\" target=\"_blank\" rel=\"noopener\">Apple has added a number of robust security features to OS X<\/a>, some of which you\u2019ve heard of, and some that you might not know about. In this article, below, you will discover\u00a0the less visible security features in OS X that protect you from hackers and malicious software, and that keep your data safe.<\/p>\n<h3>File Quarantine<\/h3>\n<p>In 2009, when Apple released OS X 10.6 Snow Leopard, the new operating system included a rudimentary anti-malware feature. While the official name is File Quarantine, people in the security industry tend to call it XProtect, after one of its configuration files, <code>Xprotect.plist<\/code>. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-the-anti-malware-function-in-apples-snow-leopard-works\/\" target=\"_blank\" rel=\"noopener\">We explained how this works<\/a> back when it was released. Unlike a true anti-virus, File Quarantine looks for a limited number of very specific types of malware. And it only detects this malware if it\u2019s downloaded to a Mac via Safari or Chrome, received as an email attachment by Mail, or sent via a Messages file transfer (and a few other apps).<\/p>\n<p>The only thing a user sees is a banal setting in <strong>System Preferences<\/strong> &gt; <strong>App Store<\/strong>. Make sure that Install system data files and security updates is checked to ensure that your Mac updates the File Quarantine exclusion list. If your Mac does detect something nefarious, <a href=\"https:\/\/support.apple.com\/en-us\/HT201940\" target=\"_blank\" rel=\"noopener\">you\u2019ll see an alert<\/a>.<\/p>\n<h3>Gatekeeper<\/h3>\n<p>Added to OS X 10.7.5 and 10.8 (Lion and Mountain Lion), Gatekeeper is a technology that uses <em>code signing<\/em> to verify the authenticity and integrity of applications you launch on your Mac. Every developer can request a certificate from Apple to \u201csign their code.\u201d This cryptographic certificate allows OS X to ensure that an app you run is not only from a registered developer, but also that it hasn\u2019t been modified.<\/p>\n<p>There are some limits though. As <a href=\"https:\/\/support.apple.com\/en-gb\/HT202491\" target=\"_blank\" rel=\"noopener\">Apple explains<\/a>:<\/p>\n<blockquote><p>\u201cDeveloper ID signature applies to apps downloaded from the Internet. Apps from other sources, such as file servers, external drives, or optical discs are exempt, unless the apps were originally downloaded from the Internet.\u201d<\/p><\/blockquote>\n<p>So you\u2019re protected when you download apps, but not if someone manually installs an app on your Mac, or if you copy it from an external or network drive. And this certificate system can go wrong. In November, Mac users <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-app-store-security-glitch-forced-users-to-reinstall-apps\/\" target=\"_blank\" rel=\"noopener\">suddenly found they could not launch apps from the Mac App Store<\/a>, because of an expired certificate.<\/p>\n<p>With Gatekeeper, users have three options. In <strong>System Preferences<\/strong> &gt; <strong>Security<\/strong> &gt; <strong>General<\/strong>, you can choose whether you want your Mac to open apps from the Mac App Store only, from the Mac App Store and registered developers, or from Anywhere, bypassing Gatekeeper entirely. It\u2019s a good idea to choose one of the first two options, though if you test applications, you\u2019ll need to pick the third.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-49015\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates-1024x850.png\" alt=\"malware-updates\" width=\"500\" height=\"415\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates-1024x850.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates-150x124.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates-300x249.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates-657x545.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/malware-updates.png 1338w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3>Sandboxing<\/h3>\n<p>While you may think that sandboxing has something to do with playing or experimenting, it\u2019s actually a robust security feature that was added to OS X 10.5 Leopard, and reinforced with subsequent versions of OS X. Apple <a href=\"https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AboutAppSandbox\/AboutAppSandbox.html\" target=\"_blank\" rel=\"noopener\">says sandboxing<\/a> \u201cprovides a last line of defense against the theft, corruption, or deletion of user data if an attacker successfully exploits security holes in your app.\u201d<\/p>\n<p>Sandboxing is a way of creating a virtual, impenetrable wall around each application or process.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/sandboxing.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-49018\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/sandboxing.png\" alt=\"sandboxing\" width=\"500\" height=\"188\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/sandboxing.png 641w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/sandboxing-150x56.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/sandboxing-300x113.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Sandboxing protects Mac users from web-based malware. Since Safari is sandboxed, malware that loads in a web page won\u2019t be able to install on your Mac, or affect other apps or files. However, be wary of anything that downloads unexpectedly, and don\u2019t ever open such files; they could get past the sandbox, if you authorize their installation.<\/p>\n<p>Apple now requires that all apps sold in the Mac App Store be sandboxed, <a href=\"http:\/\/www.imore.com\/mac-app-store-and-trouble-sandboxing\" target=\"_blank\" rel=\"noopener\">leading to problems with some apps and their features<\/a>. Sandboxing can limit the way many apps interact with the operating system and with other apps.<\/p>\n<p>For this reason, many developers that sell system utilities do so directly, rather than through the Mac App Store. This is the case, for example, with most of <a href=\"https:\/\/www.intego.com\/products\" target=\"_blank\" rel=\"noopener\">Intego\u2019s software<\/a>, which needs to be able to access many files on your Mac. You can\u2019t successfully run an anti-virus that can\u2019t check all the files on a computer.<\/p>\n<p>Sandboxing is entirely under the hood, there are no user options or alerts.\u00a0An app is sandboxed or it isn\u2019t.<\/p>\n<h3>Journaled File System<\/h3>\n<p>Security isn\u2019t just about protecting you from bad guys, it\u2019s also about ensuring the integrity of your data. One of the unsung security features in OS X is the HFS+ file system with journaling.<\/p>\n<p>The original HFS (Hierarchical File System) dates back to the release of Apple\u2019s first hard drive for the Macintosh in 1985. Replacing the previously used Macintosh File System, Apple kept HFS until 1998, when Mac OS 8.1 saw the introduction of the improved HFS+. But the real change came with the Server version of OS X 10.2.2 Jaguar, when HFS+ with journaling became optional, and 10.3 Panther, when it was turned on by default.<\/p>\n<p>The file system is the low-level software, installed on a disk or other type of media, that catalogs and indexes the files on your computer. Without a file system, you can\u2019t copy, move, or delete files. But when disk errors occur, or when a computer crashers, the file system\u2019s catalog can get corrupted, and you may lose files. The data is still on your disk, but the file system can no longer find it.<\/p>\n<p>Journaling uses a sort of log that keeps a record of changes before they are finalized. In the event of a crash, the disk can read the journal to ensure that no files are lost. As <a href=\"https:\/\/support.apple.com\/en-us\/HT204435\" target=\"_blank\" rel=\"noopener\">Apple explains<\/a>:<\/p>\n<blockquote><p>\u201cJournaling is a feature that helps protect the file system against power outages or hardware component failures, reducing the need for directory repairs.\u201d<\/p><\/blockquote>\n<p>Do you remember having\u00a0to regularly run disk repair software back in the day?\u00a0Well, when Apple added journaling to its file system, this was no longer essential. (I can\u2019t remember the last time I\u2019ve lost files or data because of disk corruption or power outages.) Of course, hard disks can still fail, so you make sure you have backups.<\/p>\n<h3>System Integrity Protection<\/h3>\n<p>One of the newest security features is System Integrity Protection, or \u201cRootless.\u201d On every Mac, there are a number of user accounts, including one called <em>root<\/em>, which is the \u201csuperuser,\u201d the One Account to Rule Them All. The root user can do anything: access and modify or delete any file, change permissions for any user, and essentially screw things up if he or she makes a typo when futzing around in the operating system. Even a normal administrator can \u201cplay root\u201d for a while, prefacing commands run in Terminal with the <em>sudo<\/em>, or \u201csuperuser do\u201d command.<\/p>\n<p>System Integrity Protection, introduced with OS X 10.11 El Capitan, prevents even this root user from accessing certain files. As <a href=\"https:\/\/support.apple.com\/en-gb\/HT204899\" target=\"_blank\" rel=\"noopener\">Apple explains<\/a>, \u201cSystem Integrity Protection restricts the root account and limits the actions that the root user can perform on protected parts of OS X.\u201d The goal of this is not to prevent any individual human user from accessing files, but rather to block malware that can \u201cget root,\u201d or obtain root access, and altering or damaging system files.<\/p>\n<p>This doesn\u2019t mean that these files are entirely off limit. As one would expect, certain tools can make changes to protected files. Apple elaborates on this, saying:<\/p>\n<blockquote><p>\u201cSystem Integrity Protection is designed to allow modifications of these protected parts only by processes that are signed by Apple and have special entitlements to write to system files, like Apple software updates and Apple installers.\u201d<\/p><\/blockquote>\n<p>There is, of course, a way to turn off System Integrity Protection and get full root access, and those system administrators who want to work without a net may want to find out how to to this. <a href=\"http:\/\/osxdaily.com\/2015\/10\/05\/disable-rootless-system-integrity-protection-mac-os-x\/\" target=\"_blank\" rel=\"noopener\">It\u2019s not hard to do<\/a>, but be aware of the risk it entails.<\/p>\n<p>Computer security is complex, and there are many other under-the-hood features that keep OS X secure. Many of these features are added to Safari, since the web browser is one of the leading vectors of attack in our Internet age. The most important thing you can do to keep your Mac secure is to ensure\u00a0your operating system and apps are up-to-date, so you benefit from all the latest security features and fixes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.<\/p>\n","protected":false},"author":46,"featured_media":50293,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,151,13],"tags":[174,168,319,303],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OS X Security: Under the Hood Features That Protect Your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-22T17:16:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-18T04:49:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"OS X Security Under the Hood\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/\",\"name\":\"OS X Security: Under the Hood Features That Protect Your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage\"},\"datePublished\":\"2016-02-22T17:16:55+00:00\",\"dateModified\":\"2019-05-18T04:49:51+00:00\",\"description\":\"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OS X Security: Under the Hood Features That Protect Your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"OS X Security: Under the Hood Features That Protect Your Mac\",\"datePublished\":\"2016-02-22T17:16:55+00:00\",\"dateModified\":\"2019-05-18T04:49:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage\"},\"wordCount\":1473,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg\",\"keywords\":[\"Mac\",\"OS X\",\"Security\",\"XProtect\"],\"articleSection\":[\"Apple\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/","og_locale":"en_US","og_type":"article","og_title":"OS X Security: Under the Hood Features That Protect Your Mac - The Mac Security Blog","og_description":"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-02-22T17:16:55+00:00","article_modified_time":"2019-05-18T04:49:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg","width":400,"height":260,"caption":"OS X Security Under the Hood"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/","name":"OS X Security: Under the Hood Features That Protect Your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage"},"datePublished":"2016-02-22T17:16:55+00:00","dateModified":"2019-05-18T04:49:51+00:00","description":"Macs include many under the hood features that keep OS X secure. This article offers a look at the less visible security features in OS X that protect your data.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OS X Security: Under the Hood Features That Protect Your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"OS X Security: Under the Hood Features That Protect Your Mac","datePublished":"2016-02-22T17:16:55+00:00","dateModified":"2019-05-18T04:49:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#webpage"},"wordCount":1473,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg","keywords":["Mac","OS X","Security","XProtect"],"articleSection":["Apple","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/os-x-security-under-the-hood-features-that-protect-your-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OS_X_Security_Under_the_Hood-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cKt","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49009"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49009"}],"version-history":[{"count":42,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49009\/revisions"}],"predecessor-version":[{"id":88027,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49009\/revisions\/88027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/50293"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}