{"id":58341,"date":"2022-01-17T11:00:00","date_gmt":"2022-01-17T16:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=58341"},"modified":"2023-06-15T16:37:31","modified_gmt":"2023-06-15T20:37:31","slug":"overcoming-linux-management","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/overcoming-linux-management","title":{"rendered":"Overcoming A Common Admin Black Hole: Linux Management"},"content":{"rendered":"\n
Most IT infrastructure within a small to medium-sized enterprise (SME) runs heterogeneous environments with a combination of Windows and Mac desktops, embedded Linux, Linux servers, and mobile devices. Oftentimes Linux devices aren\u2019t always managed, or are run in ad hoc lab environments by IT team members, and should not be left unchecked. <\/p>\n\n\n\n
Lack of visibility creates attack vectors (like unpatched systems and uncontrolled permissions) within the confines of the corporate network. This issue is compounded by the fact that many IT admins aren’t always proficient in Linux in particular, and may miss things for the sake of quickly setting up the system itself. For instance, one of my IT managers had a part-time intern creating custom programs on a Raspberry Pi that were unmanaged by Active Directory. Locking all of your doors and windows, but leaving a key underneath the welcome mat, doesn\u2019t leave a home secure.<\/p>\n\n\n\n
To solve this, JumpCloud provides visibility and governance across all major OSs, including Linux, with centralized governance and device management<\/a>.<\/p>\n\n\n\n We\u2019re all sinners, and I\u2019m no different. In my former role as an IT director in manufacturing, my Windows devices were all protected with layered security controls, but the few Linux devices that we had in our fleet were a governance afterthought. For example, the IT manager\u2019s desktop, the intern\u2019s device on the factory floor was used for scanning labels, and a DVR system were all unmanaged when my tenure at the company began. <\/p>\n\n\n\n I\u2019ll admit that we never \u201cgot there\u201d from a governance standpoint with those Linux devices; a silo was predestined because we were built around Active Directory domain controllers that shunned Linux devices. That approach created an IT management black hole and placed an inordinate amount of trust into those systems and the people who used them. My Linux devices lacked a secure configuration and anything resembling adequate visibility. Linux devices aren\u2019t special unicorns: every OS should have a secure configuration and basic management.<\/p>\n\n\n\n This is where JumpCloud\u2019s cloud directory<\/a> stands out. It works cross-OS, without the veritable hydra of device management constraints that stem from legacy platforms that were initially engineered to focus on a single operating system. I recently wrote an article about JumpCloud\u2019s new lock screen policy for Linux<\/a> that delivers the same governance across devices, whether it be Linux or Windows. It’s a big deal, especially if you care about security. Managing Linux policies, patching Linux<\/a>, and having access to security commands is vital for IT hygiene.<\/p>\n\n\n\n JumpCloud’s Linux lock screen policy feature is significant in the work-from-anywhere world that exists today. A laptop that\u2019s left accessible in a public place without that simple policy is a terrible idea, and the same holds true within a real<\/em> office, with concerns about physical security on the rise. Lock screens are a technical control that prevents unauthorized access to IT assets, some of which might be an organization\u2019s protected\/classified information.<\/p>\n\n\n\n The lock screen policy is just one example of JumpCloud\u2019s many standard, go-to policies<\/a> that help admins better control and support remote Linux systems, which also include patch management<\/a>. We recently released drive encryption and lock-screen policies to extend governance to Linux desktops. The JumpCloud console also allows for Sudo access via the system agent to run other custom commands. Just as importantly, System Insights<\/a> provides an at-a-glance way to take stock of your suite of Linux devices, query endpoints, and compliance information and interrogate machines in a DevOps context to search for security vulnerabilities.<\/p>\n\n\n\n IT admins can also control their machines with Linux security commands<\/a> to lock, restart, shut down, and wipe devices remotely. That\u2019s much more visibility and control than I ever had in my environment. Control is far better than an IT black hole where your only allies are hubris and some good old-fashioned luck.<\/p>\n\n\n\n JumpCloud has Linux covered. Policy Management and System Insights are core platform components, and are available to every SME that adopts JumpCloud as its directory or extends Active Directory<\/a> with a JumpCloud integration to manage Linux devices.<\/p>\n","protected":false},"excerpt":{"rendered":" IT admins aren’t always proficient in Linux in particular, and may miss things for the sake of quickly setting up the system itself.<\/p>\n","protected":false},"author":150,"featured_media":47357,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,42],"tags":[2618,2484,2377],"collection":[2778,2775],"platform":[],"funnel_stage":[3015],"coauthors":[2535],"acf":[],"yoast_head":"\nAn Active Directory Admin\u2019s Linux Black Hole<\/h2>\n\n\n\n
JumpCloud’s Linux Management Capabilities<\/h2>\n\n\n\n
Try Out Policy Management and System Insights<\/h2>\n\n\n\n