{"id":45551,"date":"2020-04-06T12:00:00","date_gmt":"2020-04-06T18:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=45551"},"modified":"2024-02-02T13:37:23","modified_gmt":"2024-02-02T18:37:23","slug":"policies-secure-remote-systems","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/policies-secure-remote-systems","title":{"rendered":"Using JumpCloud Policies to Secure Remote Systems"},"content":{"rendered":"\n

Need to maintain control over your system fleet while your workforce is remote? Using JumpCloud\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup>, organizations can apply Policies to secure remote Windows\u00ae<\/sup>, Mac\u00ae<\/sup>, and Linux\u00ae<\/sup> systems by preventing attack vectors before they become issues.<\/p>\n\n\n\n

How Policies Support and Secure Remote Work<\/h2>\n\n\n\n

We live in a new era, where enabling employees to work from their homes as if they were in the office is swiftly becoming a core competency for IT departments. Unlike when they\u2019re on-premises, remote workers are out of IT\u2019s direct sphere of influence, meaning that sysadmins need to leverage tools that will set their remote end users up for success from the get go.<\/p>\n\n\n\n

Naturally, a solid place to start is their device, the one resource they need to access all of their IT resources (applications, files, servers, VPN\/WiFi networks, etc.). Using JumpCloud Policies, IT admins can establish device security \u2014 regardless of where the admin or user finds themselves.<\/p>\n\n\n\n

What are JumpCloud Policies?<\/h2>\n\n\n\n

JumpCloud Policies<\/a> are a cloud directory service analogue to Group Policy Objects (GPOs), most famously used via Microsoft\u00ae<\/sup> Active Directory\u00ae<\/sup> (AD) to manage on-prem Windows\u00ae<\/sup> systems en masse. 
<\/p>\n\n\n\n

JumpCloud Policies work in a similar fashion to AD GPOs, except for two crucial factors. Unlike GPOs, Polices aren\u2019t limited by the operating system they work on; Policies can be used on Windows, Mac, and Linux systems, including CentOS 7 servers as well. In addition, JumpCloud Policies can be applied to entire system fleets based on their group<\/a>, or to individual systems as necessary \u2014 regardless of their location.<\/p>\n\n\n\n

The process starts with either the web-based JumpCloud Admin Portal or the JumpCloud PowerShell Module<\/a>, which can be run directly from the admin\u2019s machine (Windows, Mac, or Linux). Admins can use either tool to choose a Policy, configure its level of control, and then push the Policy to a system, group of systems, or an entire fleet. The Policy is almost instantly applied to the user\u2019s device through the JumpCloud system agent<\/a>, completing the process.<\/p>\n\n\n\n

Examples of JumpCloud Policies<\/h3>\n\n\n\n

Policies apply key security settings on the operating system level. Some examples of Policies include:<\/p>\n\n\n\n