Book description
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not.
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system.
This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.
The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.
Table of contents
- Cover
- Title
- Copyright
- Dedication
- Contents at a Glance
- Contents
- About the Authors
- About the Technical Reviewer
- Acknowledgments
- Introduction
-
Part I: The Big Picture
-
Chapter 1: Security Quick-Start
- Securing the Mac OS X Defaults
- Customizing System Preferences
- Users & Groups
- Login Options
- Security & Privacy Preferences
- General
- FileVault
- Firewall
- Software Update
- Bluetooth Security
- Printer Security
- Sharing Services
- Erasing Disks
- Using Secure Empty Trash
- Using Encrypted Disk Images
- Securing Your Keychains
- Best Practices
- Chapter 2: Services, Daemons, and Processes
-
Chapter 3: Securing User Accounts
- Introducing Identification, Authentication, and Authorization
- Managing User Accounts
- Advanced Settings in System Preferences
- Working with Local Directory Services
- Restricting Access with the Command Line: sudoers
- Securing Mount Points
- SUID Applications: Getting into the Nitty-Gritty
- Creating Files with Permissions
- Summary
- Chapter 4: File System Permissions
-
Chapter 5: Reviewing Logs and Monitoring
- What Exactly Gets Logged?
- Using Console
- Finding Logs
- Reviewing User-Specific Logs
- Reviewing Command-Line Logs
- Reviewing Library Logs
- Breaking Down Maintenance Logs
- What to Worry About
- Activity Monitor
- Virtual Machine and Bootcamp Logs
- Review Regularly, Review Often
- BSM – Auditing with the Basic Security Module
- The Audit Daemon and Audit Commands
- Configuring the Audit System
- Default Audit Settings
- Naming of the Audit Trail Files
- Setting the Hostname in Audit Trails
- Audit Trail Configurations for High Security Environments
- More On Audit Trails
- Viewing Audit Trails
- Output and Interpretation of Audit Trails
- Summary
-
Chapter 1: Security Quick-Start
-
Part II: Securing the Ecosystem
- Chapter 6: Application Signing and Sandbox
- Chapter 7: Securing Web Browsers and E-mail
- Chapter 8: Malware Security: Combating Viruses, Worms, and Root Kits
- Chapter 9: Encrypting Files and Volumes
-
Part III: Securing the Network
- Chapter 10: Securing Network Traffic
- Chapter 11: Managing the Firewall
- Chapter 12: Securing a Wireless Network
-
Part IV: Securely Sharing Resources
- Chapter 13: File Services
- Chapter 14: iCloud Security
- Chapter 15: Remote Connectivity
-
Chapter 16: Server Security
- Limiting Access to Services
- The Root User
- Foundations of a Directory Service
-
Configuring and Managing Open Directory
- Securing Open Directory Accounts by Enabling Password Policies
- Securing LDAP by Preventing Anonymous Binding
- Securely Binding Clients to Open Directory
- Further Securing LDAP: Implementing Custom LDAP ACLs
- Creating Open Directory Users and Groups
- Securing Kerberos from the Command Line
- Managed Preferences and Profiles
- Active Directory Integration
- Web Server Security in OS X Server
- File Sharing Security in OS X Server
- DNS Best Practices
- SSL
- SSH
- The serveradmin Command Line Interface
- Messages Server
- Securing the Mail Server
- Summary
-
Part V: Securing the Workplace
- Chapter 17: Network Scanning, Intrusion Detection, and Intrusion Prevention Tools
- Chapter 18: Backup and Fault Tolerance
- Appendix A: InfoSec Acceptable Use Policy
- Appendix B: CDSA
- Appendix C: Introduction to Cryptography
- Index
Product information
- Title: Enterprise Mac Security: El Capitan, Third Edition
- Author(s):
- Release date: January 2016
- Publisher(s): Apress
- ISBN: 9781484217122
You might also like
book
Switching to the Mac: The Missing Manual, El Capitan Edition
Those who have made the switch from a Windows PC to a Mac have made Switching …
book
Take Control of Securing Your Mac, 3rd Edition
Keep your Mac safe from intruders, malware, and more! Version 3.0, updated October 4, 2023 Secure …
book
Take Control of Securing Your Mac
Keep your Mac safe from intruders, malware, and more! Version 1.3.1, July 22, 2022 Secure your …
book
macOS Support Essentials 10.15 - Apple Pro Training Series: Supporting and Troubleshooting macOS Catalina
macOS Support Essentials 10.15 - Apple Pro Training Series The Apple-Certified Way to Learn This is …