BEST PRACTICES
How to Rename Computer Name, Hostname, and Bonjour Hostname on macOS
In part 2 of our series on useful commands for macOS admins, learn how to change the computer name, hostname & Bonjour name via the terminal.
Who doesn't want to be the best? Learn more about the best practices of the identity and access management (IAM) space.
In part 2 of our series on useful commands for macOS admins, learn how to change the computer name, hostname & Bonjour name via the terminal.
Slack is a powerful tool, but it can also be risky if you don't take certain precautions. Read these 10 Slack security best practices to protect your team.
Need to back up your Linux system? Learn how to make a remote backup using the rsync utility in this tutorial.
Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.
In the first of our series on important macOS commands for IT admins, learn how to enable SSH on a Mac to securely access remote devices.
In this tutorial, learn how to install the LAMP stack on Amazon Linux 2 and simplify server access management.
JumpCloud is engineered with mechanisms for seamless user lifecycle management to manage FileVault2 encryption access.
Leveraging a combination of authentication protocols gives most organizations access to more types of IT resources, which can ultimately support their business objectives better.
Don't take server backups for granted. Learn how to back up and restore your Linux system with an external drive using the rsync utility.
Whitelist the JumpCloud Protect app in Focus’s settings within iOS to avoid missing MFA push notifications.
JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet.
IT admins aren't always proficient in Linux in particular, and may miss things for the sake of quickly setting up the system itself.