{"id":45551,"date":"2020-04-06T12:00:00","date_gmt":"2020-04-06T18:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=45551"},"modified":"2024-02-02T13:37:23","modified_gmt":"2024-02-02T18:37:23","slug":"policies-secure-remote-systems","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/policies-secure-remote-systems","title":{"rendered":"Using 探花大神 Policies to Secure Remote Systems"},"content":{"rendered":"\n
Need to maintain control over your system fleet while your workforce is remote? Using 探花大神\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup>, organizations can apply Policies to secure remote Windows\u00ae<\/sup>, Mac\u00ae<\/sup>, and Linux\u00ae<\/sup> systems by preventing attack vectors before they become issues.<\/p>\n\n\n\n We live in a new era, where enabling employees to work from their homes as if they were in the office is swiftly becoming a core competency for IT departments. Unlike when they\u2019re on-premises, remote workers are out of IT\u2019s direct sphere of influence, meaning that sysadmins need to leverage tools that will set their remote end users up for success from the get go.<\/p>\n\n\n\n Naturally, a solid place to start is their device, the one resource they need to access all of their IT resources (applications, files, servers, VPN\/WiFi networks, etc.). Using 探花大神 Policies, IT admins can establish device security \u2014 regardless of where the admin or user finds themselves.<\/p>\n\n\n\n 探花大神 Policies<\/a> are a cloud directory service analogue to Group Policy Objects (GPOs), most famously used via Microsoft\u00ae<\/sup> Active Directory\u00ae<\/sup> (AD) to manage on-prem Windows\u00ae<\/sup> systems en masse. 探花大神 Policies work in a similar fashion to AD GPOs, except for two crucial factors. Unlike GPOs, Polices aren\u2019t limited by the operating system they work on; Policies can be used on Windows, Mac, and Linux systems, including CentOS 7 servers as well. In addition, 探花大神 Policies can be applied to entire system fleets based on their group<\/a>, or to individual systems as necessary \u2014 regardless of their location.<\/p>\n\n\n\n The process starts with either the web-based 探花大神 Admin Portal or the 探花大神 PowerShell Module<\/a>, which can be run directly from the admin\u2019s machine (Windows, Mac, or Linux). Admins can use either tool to choose a Policy, configure its level of control, and then push the Policy to a system, group of systems, or an entire fleet. The Policy is almost instantly applied to the user\u2019s device through the 探花大神 system agent<\/a>, completing the process.<\/p>\n\n\n\n Policies apply key security settings on the operating system level. Some examples of Policies include:<\/p>\n\n\n\n You can see all of the Policies 探花大神 has to offer here<\/a>.<\/p>\n\n\n\n 探花大神 Directory-as-a-Service is the first cloud directory service, reimagining the likes of Active Directory\u00ae<\/sup> and LDAP for modernized IT environments. Using 探花大神, IT admins can remotely manage devices and control end user access to resources from the cloud, centralizing user identities for security and convenience. Using 探花大神 Directory-as-a-Service, organizations can apply Policies to secure remote Windows, Mac, and Linux systems.<\/p>\n","protected":false},"author":70,"featured_media":43060,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2337],"tags":[],"collection":[2779],"platform":[],"funnel_stage":[3015],"coauthors":[2515],"acf":[],"yoast_head":"\nHow Policies Support and Secure Remote Work<\/h2>\n\n\n\n
What are 探花大神 Policies?<\/h2>\n\n\n\n
<\/p>\n\n\n\nExamples of 探花大神 Policies<\/h3>\n\n\n\n
What is 探花大神 Directory-as-a-Service?<\/h2>\n\n\n\n
You can learn more about what else Directory-as-a-Service can do through our Product page<\/a>. Or, if you\u2019re more of a hands-on person, you can try 探花大神 for free<\/a> for up to ten users and see what it can do yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"