Running a heterogeneous environment consisting of a mix of Windows, Mac and Linux systems is a very complex task for system administrators. Beyond the intricate knowledge which may be required to set a specific configuration on disparate OS’s, administrators often have to acquire, install, and configure an array of complex tools to keep these systems compliant with their traditional, on-premise directories. Add remote systems or ‘off the domain’ infrastructure, and you begin to appreciate the complexity. JumpCloud mitigates these complexities by delivering a completely integrated directory and system policy management platform that is 100% cloud-based, requiring no VPN to ensure compliance or check-ins.
JumpCloud provides a library of policy templates for Windows, Mac, and Linux which provide administrators the capability to set security features or apply uniform configurations across fleets of systems. Templates include cross-OS enablement of screen-savers, USB port blocking, and many other standard settings for the systems under JumpCloud’s control. Administrators can derive as many variants they require of a given template as needed to apply different service and security levels to specific groups of machines.
All policies will relay their current or last known status (if the system is offline) to advise administrators if the policy is active or inactive on the system. This will assist in ensuring fleets of machines are all in compliance and to take immediate action on those that have fallen out.
As part of the JumpCloud system agent check-in process, policies on an individual system will check their configuration on a 60 second cadence. If a Policy is modified locally by a user on their system, JumpCloud will automatically correct those modifications to comply with the Policy set by JumpCloud.
Policies are easily set through JumpCloud’s admin web console. They allow system administrators to remotely configure and deploy specific settings to Windows, Mac, and Linux hosts. Settings control the behavior of systems and are often associated with enforcing security standards to harden computing endpoints. Once configured, they can deploy policies to groups of systems to blanket fleets of machines instantly with the appropriate security and configuration enforcements.
- Cross-OS policy support for Windows, Mac, and Linux
- Policy templates for rapid creation and application to systems
- Group-based policy deployment for mass deployment
- Policy error alerting and reporting for compliance requirements
- Endpoint monitoring and self-healing to prevent overwriting and tampering
- Apply consistent security and configuration policy baselines across Windows, Mac, and Linux
- Improve admin efficiency by deploying security and system configuration policies to groups of systems
- Increase endpoint security with the ability to govern password management, screen locking, USB port blocking, guest account disablement, and more
- Apply policies to remote systems without VPNs and the need to be bound to a ‘domain’
- Simplify workflows with point-and-click policy creation and management – zero coding required