macOS - First Steps after Reinstallation
· Updated onCollect and evaluate information
macOS – User Manual
Set up security features for your MacConfiguration
System Settings
Apple Account
iCloud
- „Sign in“ with Apple ID / Apple Account
- Section Backed up to iCloud -> Show all
- Find my Mac -> On
Network
Block connections on your Mac with a firewall- Firewall -> Active
Miscellaneous
Privacy (in a broader sense…)
The name or local hostname is visible to other computers in the network. If the user Jane Doe entered her first and last name when setting up her computer, then there is something like “Jane Doe’s MacBook Pro” appearing in the network. However, the computer name and the local hostname can be changed independent of each other.
Info
Name: Jane, MM-WS-1, HAL-9000, …
Software Updates
Automatic Updates -> On
Automatically
- Download new updates
- Install macOS updates
- Install system data files and security updates
Share
Local hostname: Jane, MM-WS-1, HAL-9000, …
Time Machine
- Connect external hard drive or connect network storage
- Configure backup frequency
- If necessary, list exceptions (“No Bakups of this”)
Data protection & security
Security - Allow apps that have been loaded by
- App Store
- FileVault -> On
- Accessories -> Ask for new accessories
Desk & Dock (optional)
Effect on laying -> Scaling effect
Lock Screen
- Password required after activation of the screensaver or deactivation of the display -> Immediately
Users & Groups
A standard account should be used for normal use of the computer! The administrators extended access rights shuld only be used if (really) needed.
- Jane Doe (standard)
- Supervisor (admin)
Internet accounts
- Add account… (only necessary if you want to use the pre-installed email program - it is not required if emails are only retrieved/sent via the web browser)
Mouse
Secondary click -> Click right
Safari
Settings
General
The following option (last item in this window) should not be selected:
- Open “safe” files after downloading
Search
Make a conscious decision to choose the search engine. Motivation and ideas can be found on the web site Digital Independence Day .
Advanced
- Smart search field: ☑️ Show full address of the website
Finder
Settings
Advanced:
- Show all filename suffixes
Additional Software
In general, software should of course only be installed from trusted sources. And only the software that is needed. The restriction to the really necessary programs ensures that the attack vector is not to be increased unnecessarily. Software that is no longer used does not need to be installed 🧐
The protection mechanism built into macOS, designed to ensure that only trusted software runs on the Mac, is called Gatekeeper .
Browser
On macOS the web browser Safari is pre-installed. If you prefer a different web browser (Firefox, Brave, …), you should definitely download it from the manufacturer’s website.
Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone and iPad are trademarks of Apple Inc.