{"id":77040,"date":"2023-06-05T13:09:53","date_gmt":"2023-06-05T17:09:53","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&#038;p=77040"},"modified":"2023-08-17T14:45:26","modified_gmt":"2023-08-17T18:45:26","slug":"configure-settings-for-linux-policies","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies","title":{"rendered":"Configure Settings for Linux Policies"},"content":{"rendered":"\n<p>Some policies you create provide a list of options for you to specify, enable, or disable. For example, when you create a policy for Linux devices to control when the screen saver locks down an inactive device, you need to configure the timeout in seconds.<\/p>\n\n\n\n<p>Specific policies have nuances that are important to note as you apply them to your fleet. While some policies take effect immediately, others may take 5-10 minutes for the policy update process to run, or require a device logout. We recommend you reference the article for a specific policy if you have concerns.<\/p>\n\n\n\n<p>Below is a list of all Linux policies in JumpCloud. Specific instructions for more nuanced policies are linked in the Learn More column. If a Learn More article isn&#8217;t listed, you can use the basic steps in&nbsp;<a target=\"_blank\" href=\"https:\/\/support.jumpcloud.com\/support\/s\/article\/getting-started-policies-2019-08-21-10-36-47\" rel=\"noreferrer noopener\">Getting Started: Policies<\/a>&nbsp;for help.<\/p>\n\n\n\n<div class=\"wp-block-wpdatatables-wpdatatables-gutenberg-block\">\n    <h3 class=\"wpdt-c\"\n        id=\"wdt-table-title-139\">Linux Policies<\/h3>\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-139\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"4\"\n           data-rows=\"20\"\n           data-wpID=\"139\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:19.646365422397%;                    padding:10px;\n                    \"\n                    >\n                                        Policy Name                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:46.954813359528%;                    padding:10px;\n                    \"\n                    >\n                                        Description                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:15.127701375246%;                    padding:10px;\n                    \"\n                    >\n                                        Category                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D1\"\n                    data-col-index=\"3\"\n                    data-row-index=\"0\"\n                    style=\" width:18.271119842829%;                    padding:10px;\n                    \"\n                    >\n                                        Learn More                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CentOS 7: Additional Process Hardening                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Restrict access to core dumps by enabling address space layout randomization (ASLR) and uninstalling prelink packages.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D2\"\n                    data-col-index=\"3\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Check Disk Encryption                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Check a Linux device for Full-Disk or Home-Directory encryption and report the status.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D3\"\n                    data-col-index=\"3\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" href=\"https:\/\/jumpcloud.com\/support\/configure-data-encryption-for-linux-devices\" rel=\"\" target=\"_blank\" data-cell-id=\"43\" data-link-url=\"https:\/\/jumpcloud.com\/support\/configure-data-encryption-for-linux-devices\" data-link-text=\"Linux Check Disk Encryption Policy\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">Linux Check Disk Encryption Policy<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Configure IPv4 iptables                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        This policy ensures that IPv4 iptables rules are in place.                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"D4\"\n                    data-col-index=\"3\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Configure IPv6 iptables                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        This policy ensures that IPv6 iptables rules are in place.                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"D5\"\n                    data-col-index=\"3\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Configure rsyslog                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Configure rsyslog so that it is enabled and properly configured on the device.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D6\"\n                    data-col-index=\"3\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Disable Unused Filesystems                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Prevent an unauthorized user from introducing data into or extracting data from a device. IT admins should determine if a filesystem type isn\u2019t necessary, and disable it if it isn\u2019t. Native Linux filesystems are designed to ensure that built-in security controls function as expected. Although non-native filesystems can be used to solve different kinds of problems, they can also lead to unexpected consequences to both the security and functionality of the device.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D7\"\n                    data-col-index=\"3\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Disable USB Storage                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Prevent use of USB mass storage devices, such as flash drives and USB hard drives.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D8\"\n                    data-col-index=\"3\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" href=\"https:\/\/jumpcloud.com\/support\/create-a-disable-usb-storage-policy-for-linux\" rel=\"\" target=\"_blank\" data-cell-id=\"73\" data-link-url=\"https:\/\/jumpcloud.com\/support\/create-a-disable-usb-storage-policy-for-linux\" data-link-text=\"Create a Disable USB Storage Policy for Linux\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">Create a Disable USB Storage Policy for Linux<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Enable Time Synchronization                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Ensure that time synchronization between all devices in the environment is enabled and properly configured. Time synchronization is an essential part of security and compliance. For example, time synchronization ensures that system logs have consistent timestamps and also helps to verify the public key's expiration date.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C9\"\n                    data-col-index=\"2\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D9\"\n                    data-col-index=\"3\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        File Ownership and Permissions                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Secure system files for Linux devices.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C10\"\n                    data-col-index=\"2\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D10\"\n                    data-col-index=\"3\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Forbidden Services                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Protect devices against unknown vulnerabilities by disabling services that are not required for normal operation.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C11\"\n                    data-col-index=\"2\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D11\"\n                    data-col-index=\"3\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" href=\"https:\/\/jumpcloud.com\/support\/create-a-linux-forbidden-services-policy\" rel=\"\" target=\"_blank\" data-cell-id=\"103\" data-link-url=\"https:\/\/jumpcloud.com\/support\/create-a-linux-forbidden-services-policy\" data-link-text=\"Create a Linux Forbidden Services Policy\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">Create a Linux Forbidden Services Policy<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A12\"\n                    data-col-index=\"0\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        inetd Services                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B12\"\n                    data-col-index=\"1\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Securely disable inetd, a super-server daemon that provides internet services and passes connections to configured services.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C12\"\n                    data-col-index=\"2\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left wpdt-empty-cell \"\n                                            data-cell-id=\"D12\"\n                    data-col-index=\"3\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A13\"\n                    data-col-index=\"0\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Lock Screen                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B13\"\n                    data-col-index=\"1\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Unattended devices that are still active with a user logged in create opportunities for unauthorized access to information and misuse of accounts. You can remotely apply policy settings to lock one inactive system or the entire fleet in your organization using JumpCloud's policy framework.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C13\"\n                    data-col-index=\"2\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D13\"\n                    data-col-index=\"3\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" href=\"https:\/\/jumpcloud.com\/support\/create-linux-lock-screen-policy\" rel=\"\" target=\"_blank\" data-cell-id=\"123\" data-link-url=\"https:\/\/jumpcloud.com\/support\/create-linux-lock-screen-policy\" data-link-text=\"Create a Linux Lock Screen Policy\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">Create a Linux Lock Screen Policy<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A14\"\n                    data-col-index=\"0\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Network Parameters                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B14\"\n                    data-col-index=\"1\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Enhance a device\u2019s network security by setting kernel parameters for IP forwarding, packet routing, Internet Control Message Protocol (ICMP) requests, path filtering, and Transmission Control Protocol Sync (TCP SYN) cookies.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C14\"\n                    data-col-index=\"2\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Network                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D14\"\n                    data-col-index=\"3\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A15\"\n                    data-col-index=\"0\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Partition and Mount Options                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B15\"\n                    data-col-index=\"1\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Checks partition and mount options. Directories that are used for system-wide functions can be further protected by placing them on separate partitions. This provides protection for resource exhaustion and enables the use of mounting options that are applicable to the directory's intended use.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C15\"\n                    data-col-index=\"2\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D15\"\n                    data-col-index=\"3\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A16\"\n                    data-col-index=\"0\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Secure Boot Settings                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B16\"\n                    data-col-index=\"1\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Prevent non-root users from reading the boot parameters and identifying weaknesses in security upon boot.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C16\"\n                    data-col-index=\"2\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D16\"\n                    data-col-index=\"3\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A17\"\n                    data-col-index=\"0\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Service Clients                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B17\"\n                    data-col-index=\"1\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Remove unnecessary clients to minimize the risk involved when the compromise of a service leads to the compromise of the clients who use those services.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C17\"\n                    data-col-index=\"2\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Security, Compliance                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D17\"\n                    data-col-index=\"3\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A18\"\n                    data-col-index=\"0\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SSH Connection Timeout                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B18\"\n                    data-col-index=\"1\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Set\u00a0the duration that an inactive SSH connection will remain open.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C18\"\n                    data-col-index=\"2\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D18\"\n                    data-col-index=\"3\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A19\"\n                    data-col-index=\"0\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SSH Root Access                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B19\"\n                    data-col-index=\"1\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Enforce or deny root login via SSH.                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C19\"\n                    data-col-index=\"2\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D19\"\n                    data-col-index=\"3\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <div data-type-content=\"wpdt-html-content\"><p><a href=\"..\/support\/create-an-ssh-root-access-policy-for-linux\">Create an SSH Root Access Policy<\/a><\/p><\/div>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A20\"\n                    data-col-index=\"0\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SSH Server Security Enforcement                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B20\"\n                    data-col-index=\"1\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Ensure the SSH server is properly configured to enable secure remote access. The settings in this policy only apply if the SSH daemon is installed on the system.\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top\"\n                                            data-cell-id=\"C20\"\n                    data-col-index=\"2\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-wrap-text wpdt-valign-top wpdt-align-left\"\n                                            data-cell-id=\"D20\"\n                    data-col-index=\"3\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Some policies you create provide a list of options for you to specify, enable, or disable. For example, when you [&hellip;]<\/p>\n","protected":false},"author":202,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2852,2926,2862],"support_tag":[],"coauthors":[2836,3011],"class_list":["post-77040","support","type-support","status-publish","hentry","support_category-devices","support_category-linux","support_category-policies"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Configure Settings for Linux Policies - JumpCloud<\/title>\n<meta name=\"description\" content=\"Explore the list of Linux policies available in JumpCloud, their descriptions, categories, and links to more detail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configure Settings for Linux Policies\" \/>\n<meta property=\"og:description\" content=\"Browse the JumpCloud Help Center by category, search for a specific topic, or check out our featured articles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-17T18:45:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2025\/10\/Site-Display-Images-Support.png\" \/>\n\t<meta property=\"og:image:width\" content=\"890\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"denasteward, Nick Conrad\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies\",\"url\":\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies\",\"name\":\"Configure Settings for Linux Policies - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"datePublished\":\"2023-06-05T17:09:53+00:00\",\"dateModified\":\"2023-08-17T18:45:26+00:00\",\"description\":\"Explore the list of Linux policies available in JumpCloud, their descriptions, categories, and links to more detail.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\/\/jumpcloud.com\/support\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Configure Settings for Linux Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configure Settings for Linux Policies - JumpCloud","description":"Explore the list of Linux policies available in JumpCloud, their descriptions, categories, and links to more detail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies","og_locale":"en_US","og_type":"article","og_title":"Configure Settings for Linux Policies","og_description":"Browse the JumpCloud Help Center by category, search for a specific topic, or check out our featured articles.","og_url":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies","og_site_name":"JumpCloud","article_modified_time":"2023-08-17T18:45:26+00:00","og_image":[{"width":890,"height":525,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2025\/10\/Site-Display-Images-Support.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"denasteward, Nick Conrad"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies","url":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies","name":"Configure Settings for Linux Policies - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"datePublished":"2023-06-05T17:09:53+00:00","dateModified":"2023-08-17T18:45:26+00:00","description":"Explore the list of Linux policies available in JumpCloud, their descriptions, categories, and links to more detail.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/support\/configure-settings-for-linux-policies#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/jumpcloud.com\/support"},{"@type":"ListItem","position":3,"name":"Configure Settings for Linux Policies"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/77040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/support"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/202"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/77040\/revisions"}],"predecessor-version":[{"id":95884,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/77040\/revisions\/95884"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=77040"}],"wp:term":[{"taxonomy":"support_category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support_category?post=77040"},{"taxonomy":"support_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support_tag?post=77040"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=77040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}