{"id":43299,"date":"2019-12-06T09:00:00","date_gmt":"2019-12-06T09:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=43299"},"modified":"2023-06-14T15:30:36","modified_gmt":"2023-06-14T19:30:36","slug":"policies-lock-screen","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/policies-lock-screen","title":{"rendered":"Understanding Policies: Lock Screen"},"content":{"rendered":"\n
By implementing Policies<\/a>, JumpCloud\u00ae admins can automate much of their system security management. One such Policy is Lock Screen, available for Mac\u00ae and Windows\u00ae systems.<\/p>\n\n\n\n The Lock Screen Policy for Mac and Windows allows admins to configure the amount of time (in seconds) that a system can remain idle before the screensaver engages, locking the system down. Once the screen locks, the system\u2019s user needs to log in again to regain access.<\/p>\n\n\n\n The Lock Screen Policy relies upon the JumpCloud system agent<\/a> to make changes to native system screensaver settings. Admins can then use this Policy to adjust screensaver settings at scale across all their Mac and Windows systems.<\/p>\n\n\n\n There\u2019s been a surge in remote work across the workforce. Many organizations find their employees opting to work from home or a local coffee shop instead of in the office, putting the employees and their devices outside IT\u2019s direct control. Beyond remote workers, a bad actor could make their way inside the office as well.<\/p>\n\n\n\n If an employee leaves their computer unattended for any reason (i.e. bathroom, ordering coffee, taking a call, etc.), it can open the system to attack. A hacker can infect an unlocked laptop with malware in just a few clicks. With unrestricted access to a system, an attacker can exploit other vectors through accessible network features and\/or applications. (Of course, in this time, the computer can also be stolen, so full-disk encryption, or FDE, might be needed… more on that in a similar blog).<\/p>\n\n\n\n Although it isn\u2019t the most convenient exercise for end users, locking the screen after a small period of time can help ward off attacks like these.<\/p>\n\n\n\n Regulatory compliance is one of the largest burdens that IT organizations shoulder. Many regulations, such as NIST<\/a>, PCI DSS<\/a>, and ISO 27001<\/a>, require that organizations implement some sort of screen lock timer to promote security. By codifying compliance needs through the JumpCloud Lock Screen Policy, IT admins can save time preparing for audits by enforcing the Policy at scale, across both Mac and Windows machines.<\/p>\n\n\n\nWhat is the Lock Screen Policy?<\/h2>\n\n\n\n
Why Use the Lock Screen Policy?<\/h2>\n\n\n\n
Compliance Requirements and the Lock Screen Policy <\/h3>\n\n\n\n
How to Use the Lock Screen Policy<\/h2>\n\n\n\n