Good IT means managing and securing your systems – especially the Mac®, Windows®, and Linux® machines that employees use to complete their day-to-day work. At JumpCloud®, system management is a core capability of our identity and access management product, Directory-as-a-Service®. We’ve created this page both as an overview of system management in general and as an explanation of how organizations are achieving better system management using JumpCloud.
Defining System ManagementSimply put, system management is the configuration and control of devices. It can range from creating user and admin accounts to adjusting settings within the system OS, like how many seconds before the lock screen appears. System management can be done manually on an individual machine, but when we talk about defining system management as a term, we’re really talking about managing systems at scale, also known as system administration. In order to secure and manage hundreds or thousands of systems from one centralized admin console, system administrators (or sysadmins) will implement a more automated system management tool, such as a cloud-based directory service made to remotely deploy scripts and Policies while managing user accounts. More on that below.
Features to Look for in System Management:
- User Account Provisioning
- Policy Enforcement (e.g. FDE, USB Lock)
- Password Management
- Centralized Execution of Scripts / Commands
- SSH Key Management
- Multi-Factor Authentication (MFA)
- System Authentication Event Logging
- REST-API for Automated Configuration
See our post What is System Management for a more in-depth definition.
Core Feature: Group-Based Policy Enforcement
What makes enterprise-grade system administration so superior and indispensable isthecentralized, group-based management of systems. With a few clicks or lines of codes, sysadmins using system management tools such as directory services can establish rules and require all systems they’re managing to comply.
Managing groups of systems is central to system management for two core reasons:
- Reliable, automated security (e.g. password management, screen locking, USB port blocking, guest account disablement, full disk encryption)
- Improved admin efficiency (e.g. remote system management, remote printer/drive mapping, automated onboarding, zero coding required)
Here are some resources to help you (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: https://jumpcloud.com/blog/better-system-management/