BEST PRACTICES
Legacy Servers Are a Cyber Insurance Pre-existing Condition
Cyber insurance companies deny policies to clients with legacy Windows domain controller installations.
Who doesn't want to be the best? Learn more about the best practices of the identity and access management (IAM) space.
Cyber insurance companies deny policies to clients with legacy Windows domain controller installations.
In part 2 of our series on useful commands for macOS admins, learn how to change the computer name, hostname & Bonjour name via the terminal.
Need to back up your Linux system? Learn how to make a remote backup using the rsync utility in this tutorial.
Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.
In the first of our series on important macOS commands for IT admins, learn how to enable SSH on a Mac to securely access remote devices.
In this tutorial, learn how to install the LAMP stack on Amazon Linux 2 and simplify server access management.
JumpCloud is engineered with mechanisms for seamless user lifecycle management to manage FileVault2 encryption access.
Leveraging a combination of authentication protocols gives most organizations access to more types of IT resources, which can ultimately support their business objectives better.
Don't take server backups for granted. Learn how to back up and restore your Linux system with an external drive using the rsync utility.
Whitelist the JumpCloud Protect app in Focus’s settings within iOS to avoid missing MFA push notifications.
JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet.
IT admins aren't always proficient in Linux in particular, and may miss things for the sake of quickly setting up the system itself.