Populating JumpCloud’s open directory will help you understand how it will work for you. Creating devices can work by distributing an agent to a target device (or group of devices), or through MDM protocols (based on the types of the devices you intend to manage).
Completing this demo walkthrough will grant you access to features such as:
Now, let’s get started. It’s a few simple steps, and you’re on your way to getting things done.
Adding a device is a great way to understand the JumpCloud features that will be at your disposal once endpoints are being managed. You’re covered for cross-OS device management, with options to manage a wide variety of operating systems and device types (not to mention use cases and ownership models). JumpCloud can even connect with an existing identity provider (IdP) like Okta or Google Workspace to integrate device and identity management.
The JumpCloud platform integrates universal endpoint management with directory services (including Active Directory) for holistic access control. You don’t need point solutions for single sign-on (SSO), multi-factor authentication, and more. It can all start with device management.
Not every step here is necessary to complete this tutorial. However, if you want to experience your evaluation of this (and other) feature as if you’re implementing the product, we recommend the following:
In addition, it’s necessary to have a test group accessible ahead of this walkthrough if you want to practice that step.
JumpCloud agents gather device telemetry and deploy policies for desktop operating systems. Agents can be combined with MFA for Windows for tamper-proof endpoint management. This demo focuses on using agents to add either Linux, macOS, or Windows boxes to your organization. We’ll show you how to deploy agents, view device details, and then will explore policies (and more) to demonstrate JumpCloud’s cross-OS device management.
JumpCloud combines user and device management into a single console, which provides asset-based security. Android EMM and Apple MDM are also included in the platform for no additional cost. Device management is just the start of what’s possible.
Adding a device takes just a few minutes. This walkthrough unlocks your ability to explore what’s possible with commands, policies, reporting, and how integrating device and identity management can enable Zero Trust security. You can even manage devices for identities that reside within other Identity Providers (IdPs) to help protect your resources and privileged users.
If you have time, we strongly suggest deploying JumpCloud Go for passwordless logins. It’s a phishing-resistant credential that eliminates the problem of MFA fatigue for users while fortifying your security. Simulations and other resources will show you how to set up MFA, Conditional Access, and Go. Patch Management for OSs and browsers is another option once agents are deployed; integrated remote access and troubleshooting is also there for you to try.
Do more, with less effort. JumpCloud can automatically group devices as they’re added to the cloud directory using conditions such as their type operating system. You’ll see the device(s) that you add in this walkthrough automatically populate into your dynamic device group.
Policies can be applied against that group to make it easier for you to have a healthy device posture for Day 1. We’ll explore policies in more detail below, after you’ve added a device.
Simulation: Enable and Configure Dynamic Device Groups
Create a dynamic group or just skip ahead and get started to add a device.
To get started, simplly:
Once you've added your device, you can:
Tip: Search for a device or click “filter by” and narrow your search by serial number, OS version, enrollment status, system name, or JumpCloud system ID.
A built-in tool called System Insights delivers telemetry across your fleet for compliance reporting, troubleshooting, and actionable security information. You can easily gather information from JumpCloud-managed devices with our RESTful API and PowerShell Module.
Prerequisites:
To automatically enable System Insights for new devices:
You can do as many or as few of these activities as you choose, but it’s best to think of this as an action list for your evaluation. Here’s some of the essential features to secure your endpoints.
Check out this tutorial on configuring policies!
To create a policy:
Tip: Policies may be assigned to individual devices or device groups.
JumpCloud Protect Mobile Push MFA and biometric options are available (if your device supports it). This walkthrough will help you help up MFA for your organization.
First add users and user groups. We also have a quick walkthrough on how to manually create users to expedite this step. You must have already created a device group to bind it to the device.
Configure TOTP MFA for user accounts first; learn how to do this in Add MFA to a JumpCloud User walkthrough.
To enable TOTP MFA on your devices:
JumpCloud Windows MDM can not be tampered with by end users attempting to remove JumpCloud agent or MDM management. This is a free feature with no additional fees required that has the added benefit of. Don’t worry: devices that are already being agent managed can be added to Windows MDM using a toggle. Here’s how you'd set it up as an admin and user.
As an admin:
To automatically enroll all users with Windows 10 & 11 devices into Windows MDM, select Automatically enroll all Windows 10 & 11 devices into Windows MDM.
Use Windows MDM (End User)
Note: Admin permissions are required to enroll a device into JumpCloud MDM via the user portal. This is a Windows MDM requirement.
To export all of your device information from the GUI for audits, compliance, or troubleshooting reports, click export to export to either CSV or JSON.
There are also pre-built reports accessible, such as Users to Devices.
Resources: JumpCloud’s IT Compliance Quickstart Guide
Prepare Your Systems
Enabling JumpCloud Go in Features will automatically enable it as an MFA factor for your users. JumpCloud Go SSO requests have security with user and device verification occurring during every new application session established using Go. Users that authenticated to the User Portal with JumpCloud Go will now use the Go loader while accessing their SSO applications.
JumpCloud Go is the default MFA method for SSO Conditional Access policies. When a user accesses an application that’s protected by a policy, they'll be prompted to "step up" and verify their identity using JumpCloud Go.
Note: JumpCloud Go provides instant revocation when a user status changes from “active” to “suspended”. That’s possible because the platform has integrated identity and device management.
Users must first register JumpCloud Go with their credentials before passwordless verification becomes available. Try it out. It’s simply easier than TOTP, and even more secure.
Establish secure, direct connections and troubleshoot devices whether on-prem or remote to solve active technical issues. JumpCloud Remote Access provides a combination of Remote Assist and Background Tools to take remote sessions and troubleshoot Windows, Mac, and Linux devices from a single console. This is accessible after your agent is installed, but can be disabled if your organization has compliance or security policies that won’t allow it.
Using JumpCloud’s Remote Access means one less invoice.
Check out this tutorial to see how Remote Assist works.
Enable and Configure Dynamic Device Groups
Conditional Access | Device Trust
Android Enterprise Mobility Management (EMM)
Thanks for taking the time to get started with your evaluation. Device management is essential for asset-based security. You cannot protect identities without also managing your devices (and keeping those endpoints in a healthy posture). Likewise, devices are better protected when UEM is integrated with identity and access management.
Create a dynamic device group and add managed users to devices.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
New to the site? Take a look at these additional resources:
Ready to join us? You can register here.