macOS Catalina and GPO-like Functions

With the release of a new version of macOS®, many IT admins are wondering how they can execute GPO-like functions on macOS Catalina™. 

Group Policy Objects (GPOs) enable administrators to control and configure Windows® systems en masse using Microsoft® Active Directory®. But GPOs don’t apply to non-Microsoft systems, and Catalina is no different. With more users choosing to work on Mac® and Linux® machines, admins have to be more nimble and forward-thinking than ever before. 

The challenge is this: How do you take something as effective as GPO-like functionality and apply it to macOS Catalina? And how do you do so while still managing your Windows® and Linux machines as well?

GPOs In a Mixed-OS Environment

Group Policy Objects changed the game for Microsoft admins. With GPOs, they could quickly and easily manage tasks like setting configurations, enforcing security policies, and managing software. Better yet, they could do it from one place: Active Directory.

Of course, this only applied to Windows machines and resources. And with the increasing implementation of disparate systems, admins have been searching for a cross-platform, GPO-like solution that can work across all three operating platforms. 

And while there are available solutions (sometimes called MDMs) designed to work with macOS, they’re often add-ons and don’t often support Windows or Linux. This only increases the complexity of your IT setup, the need for further maintenance, and the overall cost of administration in general. 

Essential GPO-Like Functions for macOS

There are a lot of solutions out there, and every IT organization is going to need different features. But it helps to know exactly what you’re looking for before you dive into a pool of options. With that in mind, here’s a brief list of core features and compatibilities you may want to consider:

While these are some of the most commonly used GPOs, every organization will have unique policy enforcement needs. Regardless, the idea of GPO-like functionality is top of (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Stephanie DeCamp. Read the original post at: