![]() ![]() How does it work? IT admins simply select the policy that they want from the JumpCloud policy library – in this case, screen saver lock. In fact, IT admins can think of JumpCloud Policies as next-generation group policy objects (GPOs) designed for modern IT networks. They enable IT admins to manage a wide variety of system behaviors across Mac, Linux, and Windows. JumpCloud Policies are effectively commands, scripts, and task execution templates that enable IT admins to remotely manage cross-platform fleets of systems. This is possible with the JumpCloud ® Directory-as-a-Service ® platform. The better news is that IT admins can enforce screen saver lock across their entire fleet of Mac systems (Windows ® too) from one central location in the cloud. The good news is that setting screen saver lock is quick and easy. *Screenshot from the JumpCloud administrative console ![]() This is why JumpCloud not only advocates setting screen saver lock across your Mac fleet, but we are also proponents of setting that window as short as possible – even down to one minute. Of course, IT admins know this is not the world we live in. In an ideal world, each user would lock their machine as soon as they get up. How Does Screen Saver Lock Improve Security?Īn unattended system is probably the easiest target there is for attackers with malicious intent, even more so if the system is unlocked. As you may have guessed, that method is setting screen saver lock across your Mac fleet. One particular method is quite easy to enforce and delivers strong results. Many of which we describe in our webinar at the end of this blog. Regardless, the increase of Macs on corporate networks has created a growing security concern that must be addressed.įortunately, there are a variety of trusted techniques IT admins can leverage to protect themselves from the bad guys. Of course, this is primarily because the most popular system management tool (i.e., Microsoft ® Active Directory ® ) doesn’t natively support Mac endpoints. ![]() Macs have historically been managed independently, or worse, not at all. The situation is only exacerbated by a highly mobile modern workforce and the popularity of Macs for users of all types. This is especially worrisome for IT admins because they essentially require a perfect defense on all fronts, yet attackers only need one way in. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |