{"id":75559,"date":"2023-05-25T17:07:19","date_gmt":"2023-05-25T21:07:19","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75559"},"modified":"2023-06-05T13:09:10","modified_gmt":"2023-06-05T17:09:10","slug":"manage-software-restrictions-using-policies","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/manage-software-restrictions-using-policies","title":{"rendered":"Manage Software Restrictions Using Policies"},"content":{"rendered":"\n
To protect a device from potential threats, you can control access to it by identifying which applications should be allowed access or which should be blocked. In the JumpCloud Admin Portal, you use a policy to create this list.<\/p>\n\n\n\n
JumpCloud’s policy framework lets you remotely apply configuration settings to one managed device or the entire fleet in your organization. These policy settings let you customize your managed devices and make them more secure.<\/p>\n\n\n\n
You can create the following policies to specify locations where applications can run or can\u2019t run:<\/p>\n\n\n\n
JumpCloud provides two primary approaches for managing which applications get access to a device \u2014 allowing access or denying it. Both methods have their pros and cons. The right choice depends on your organization\u2019s needs and goals.<\/p>\n\n\n\n
Creating a list to restrict access is the traditional approach to access control and has long been used by anti-virus tools, spam filters, and other security software programs. This approach is threat-centric. Any application or directory not on the deny list is granted access, but anything that\u2019s known or expected to be a threat is blocked.<\/p>\n\n\n\n
Instead of creating a list of threats, you create a list of permitted applications and directories and block everything else. This approach is based on trust, and the default is to deny anything new unless it\u2019s proven to be acceptable, resulting in a much stricter, more secure approach to access control.<\/p>\n\n\n\n
Creating a deny list is normally used when administrators want to make it easy for users to access devices, and to minimize administrative effort. For example, an IT admin in charge of the devices for a school may want to block specific applications such as games or streaming, but generally allow various apps for students to do their work.<\/p>\n\n\n\n
Considerations:<\/strong><\/p>\n\n\n\n To protect a device from potential threats, you can control access to it by identifying which applications should be allowed […]<\/p>\n","protected":false},"author":201,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2852,2862,3079],"support_tag":[],"coauthors":[2835],"acf":[],"yoast_head":"\n\n
\n
\n