With the launch OS X El Capitan, Apple has also introduced a novelty security si protection OS X operating systems in front malware or other types of viruses that aim modifying system files. System Integrity Protection (SIP)Known as the Rootless Mode, reduces vulnerabilities and the possibility for malware to penetrate and modify sensitive files macOS. Basically, this new feature does not allow any user rank, be it Administrator, to modify the system files.
It is recommended that any user of macOS to keep rootless mode (SIP) enabled. But there are some applications that want to modify system files, without bringing instability to it. In order to run them, the user will have to disable SIP, even if we do not recommend doing so. Disabling SIP is especially required by the applications that help us bring Interface changes (IU) and tweaking applications.
Deactivation and Activation System Integrity Protection (SIP) on macOS
disabling System Integrity Protection (SIP) following a few simple steps is made of this tutorial for macOS.
1. Restart (reboot) OS X and hold down the "Command + R". This helps us get into Mac Recovery Mode.
2. Once in Recovery Mode, we go to the bar at "Utilities"And open the application"Terminal".

3. In Terminal, we write and execute the command line: csrutil disable
4. After what in Terminal the message appears: "Successfully disabled System Integrity Protection"We go to the logo Apple and restart macOS / OS X.
To reactivate SIP, we repeat the steps in the tutorial and execute the command line: enable csrutil.
System Integrity Protection is only available on OS X El Capitan and newer operating systems. macOS Sierra will come with this feature included.
SIP restricted folders and files:
- /System
- / usr
- / bin
- / sbin
- Pre-installed applications of OS X.
"To reactivate SIP, repeat the steps in the tutorial and execute the command line: enable csrutil."
This doesn't work - you have to write it the other way round:
csrutil enable