Overview
Moonlock modules and capabilities
Find out details on all Moonlock modulesSupported platforms and system requirements
Discover system requirements and supported platforms for Moonlock appSecurity model and threat coverage
Find out more details on the Security Model of MoonlockWhat is Moonlock?
Find out more details about Moonlock.
Getting started
Ultimate Mac cybersecurity has never been so easy to set up. Whether you're installing Moonlock directly from MacPaw’s website or via Setapp, getting started takes just a few minutes. Explore the first steps on your short journey toward a protected Mac.
Create or sign in to your account
Find out how to sign into your Moonlock AccountFirst‑run security checklist
How to verify key settings to ensure maximum protection from day one.Update Moonlock and security databases
How to keep Moonlock and its protection database always up to date.Install and set up Moonlock
Here's how to install and set up Moonlock on your Mac
Settings and permissions
To deliver effective, real-time protection and system monitoring, Moonlock requires certain macOS permissions and access. These permissions ensure its security modules can function properly without compromising your privacy. Here’s what to expect and how to stay in control.
Required macOS permissions
Find details on granting essential macOS permissions for Moonlock to work.Privacy controls and telemetry settings
Learn about Moonlock’s data and privacy options.Managing background services and login items
How to control Moonlock’s background processes and startup items.
Background items and processes
To deliver continuous, real-time security without disrupting your Mac experience, Moonlock runs several background items and system-level processes. These are essential to keeping your device protected, your traffic secure, and your performance smooth.
Real-time protection daemons and what they do
Find information on Moonlock’s active protection daemons and their functions.Network extensions and VPN tunnels explained
How Moonlock manages network filtering and VPN tunnels.How Moonlock uses system resources
How Moonlock impacts CPU, memory, and overall Mac’s performance.
Notifications and alerts
Moonlock uses smart notifications to keep you informed of important security events without overwhelming you with noise. From critical threat alerts to gentle reminders, every message is designed to be timely, clear, and actionable.
Alert types and severity levels
Explore different alert categories and their significance.Snooze and do not disturb
Learn how to pause or mute Moonlock notifications.Managing quarantine prompts and required actions
Understand how to review and respond to Moonlock’s quarantine alerts.
Localization and accessibility
Cybersecurity tools must be accessible and easy to navigate. With people’s personal and professional lives dependent on their digital ecosystems’ reliability, cybersecurity becomes just security. Hence, the Moonlock experience is designed for maximum smoothness and inclusivity.
Available languages
Find which languages Moonlock currently supports and will support eventually.Keyboard navigation and accessibility features
Familiarize yourself with Moonlock’s accessibility.