Policy Management

Running a heterogeneous environment consisting of a mix of Windows, Mac and Linux systems is a very complex task for system administrators. Beyond the intricate knowledge which may be required to set a specific configuration on disparate OS’s, administrators often have to acquire, install, and configure an array of complex tools to keep these systems compliant with their traditional, on-premise directories. Add remote systems or ‘off the domain’ infrastructure, and you begin to appreciate the complexity. JumpCloud mitigates these complexities by delivering a completely integrated directory and system policy management platform that is 100% cloud-based, requiring no VPN to ensure compliance or check-ins.

Policy Templates

Jumpcloud provides a library of policy templates for Windows, Mac and Linux which provide administrators the capability to set security features or apply uniform configurations across fleets of systems. Templates include cross-OS enablement of screen-savers, USB port blocking and many other standard settings for the systems under JumpCloud’s control. Administrators can derive as many variants they require of a given template as needed to apply different service and security levels to specific groups of machines.

Policy Status

All policies will relay their current or last known status (if the system is offline) to advise administrators if the policy is active or inactive on the system. This will assist in ensuring fleets of machines are all in compliance and to take immediate action on those that have fallen out.

Policy Enforcement

As part of the JumpCloud system agent check-in process, policies on an individual system will check their configuration on a 60 second cadence. If a Policy is modified locally by a user on their system, JumpCloud will automatically correct those modifications to comply with the Policy set by JumpCloud.

Policies are easily set through JumpCloud’s admin web console. They allow system administrators to remotely configure and deploy specific settings to Windows, Mac, and Linux hosts. Settings control the behavior of systems and are often associated with enforcing security standards to harden computing endpoints. Once configured, they can deploy policies to groups of systems to blanket fleets of machines instantly with the appropriate security and configuration enforcements.


  • Point-and-click policy creation requiring no coding
  • Support for Windows, Mac, and Linux
  • Policy template library for rapid creation
  • Group-based policy deployment to many systems
  • Policy error alerting and reporting


  • Improve efficiency by deploying security updates to groups of systems
  • No VPN required for applying or updating policies
  • Stronger endpoint security to govern password management, screen locking, USB port blocking and more
  • Zero-coding, point-and-click policy creation and management

10 users free forever.

Start typing and press Enter to search