Multiple destinations
Rules can cover a list of multiple hostnames, domains or arbitrary IP address ranges, helping you to simplify your ruleset.
A firewall protects your computer against unwanted guests from
the Internet.
But who protects your private data from being sent out?
As soon as you’re connected to the Internet, applications can potentially send whatever information they want to wherever they want. Sometimes they do this for good reason, on your explicit request. But often they don’t.
Little Snitch intercepts these unwanted connection attempts,
and lets you decide how to proceed.
Take a look under the hood to see at a glance who talks to whom. The Little Snitch Network Monitor raises the bar of network traffic monitoring to an entirely new level. The realtime diagram provides fine grained traffic information, combined with powerful yet simple options for analyzing bandwidth, traffic totals, connectivity status and much more.
Whenever an application attempts to connect to a server on the Internet, Little Snitch shows a connection alert, allowing you to decide whether to allow or deny the connection. Your decision gets stored as a rule which will automatically be applied to future, similar connection attempts from the same application.
There are times where you don’t want to get interrupted by any network related notifications. With Silent Mode you can quickly choose to silence all connection warnings for a while. You can then later review the Silent Mode Log to define permanent rules for connection attempts that occurred during that time.
Have you ever wondered why a process you’ve never heard of before suddenly wants to connect to some server on the Internet? The Research Assistant helps you to find the answer. It only takes one click on the research button to anonymously request additional information for the current connection from the Research Assistant Database.
Rules can be arranged in different profiles like “Home”, “Office” or “Mobile Internet”. This allows you to use different sets of filter rules depending on the network you are currently connected to.
Profiles can be activated either manually from the status menu, or automatically, whenever you join a network that’s associated with one of your profiles.
Little Snitch not only reveals any outgoing network connection attempt to make sure that sensitive data doesn’t leave your computer without your consent. The inbound firewall in Little Snitch provides you with the same level of control for incoming connections.
Rules can cover a list of multiple hostnames, domains or arbitrary IP address ranges, helping you to simplify your ruleset.
Various rule lifetime options allow you to create rules that are effective only for a limited time.
Rules are created for a specific process owner, making it easier to define rules for system level processes such as web servers.
Rule suggestions are based on your previous network usage profile and can be turned into permanent rules with just a single click.
This rule type enforces connection alerts for particular connections, even if some other, more general rule would already allow or deny these connections.
Little Snitch automatically analyzes your ruleset and shows any redundant, overlapping or invalid rules, helping you to keep your ruleset simple and clean.
Rules that are effective for an entire domain can be created right from within the Connection Alert.
Quickly switch between profiles, turn on Silent Mode, access your rules, and see a summary of current network activity.