Most companies I’ve worked at where employees had a Microsoft work computers. They were under heavy control, even with admin privileges. I was wondering, for a corporate environment, how employees’Linux desktops could be kept under control in a similar way. What would be an open source or Linux based alternative to the following:

  • policy control
  • Software Center with software allow lists
  • controlled OS updates
  • zscaler
  • software detection tool to detect what’s been installed and determine if any unallowed software is present
  • antivirus
  • VPN

I can think of a few things, like a company having it’s own software repos, or using an atomic distribution. There’s already open source VPN solutions if course. But for everything else I don’t really know what could be used or what setup we could have.

  • Eugenia@lemmy.ml
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    2 years ago

    That list makes me wanna get a job on a small company of up to 10-20 people, where none of these things are usually needed…

    • Cyborganism@lemmy.caOP
      link
      fedilink
      arrow-up
      12
      ·
      2 years ago

      I hear you. But if we want Linux to seriously become the next desktop OS, I think it’s important to find something that gives large organisation some kind of way to manage their large IT inventory and users securely.

  • Avid Amoeba@lemmy.ca
    link
    fedilink
    arrow-up
    12
    ·
    2 years ago

    There’s Zscaler for Linux. We’re using it in our corpo.

    You have to run your software mirror no matter what. Even if it’s a proxy mirror where you don’t actually store most of the packages.

    SELinux/AppArmor for more granular access policies.

    SSSD connects local auth with AD.

    You should look into what your vendor has on offer, e.g. Landscape if you’re on Ubuntu.

    As others have said config-as-code would probably be part of the equation too.

    • ouch@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      2 years ago

      Zscaler is corporate spyware. As far as I know, it can log all connections, even ones that don’t go through the Zscaler nodes. It can also act as MITM proxy.

      I’m doubtful about whether it’s (or at least many configurations of it) are legal in EU.

      • Avid Amoeba@lemmy.ca
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        2 years ago

        Sure. It’s certainly legal in NA and widely used. Any VPN can do that too. A corpo can install anything on their hardware and the hardware should be considered to be spying by default.

        Oh and MITM proxying has been a fact of every corpo I’ve worked in. It’s the only way to reliably prevent people from accessing the list of sites the corpo doesn’t want accessed.

  • bizdelnick@lemmy.ml
    link
    fedilink
    arrow-up
    13
    arrow-down
    2
    ·
    2 years ago

    If you want to control users, don’t give them admin privileges.

    Most of things you enumerated solve windows specific problems and therefore have no analogs in other OSes.

  • olsonexi@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    2 years ago

    policy control

    It’s not exactly the same, but you could use puppet to enforce configuration

    Software Center with software allow lists

    You can setup a custom repository with only approved software and then set that as the only one that the system is configured to retrieve packages from. This can also be controlled via puppet.

    controlled OS updates

    Same as the previous point. Upgrades are installed from the repos.

    zscaler

    I don’t know what that is/does, and their website isn’t helping.

    software detection tool to detect what’s been installed and determine if any unallowed software is present

    I’m pretty sure carbon black app control has a linux version.

    antivirus

    There are a number of different antivirus solutions for linux. A quick search will give you a bunch of lists. I’m not personally familiar with any of the options, but I don’t imagine it will be difficult to find one that will work for your use case.

  • philpo@feddit.de
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    2 years ago

    A lot of points you mention can be achieved with Univention (a debian based central management environment) and a few extra steps. Should be possible, imho.

  • nayminlwin@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    I was looking for what you said a few years ago out of curiosity before and remember looking into something called Shibboleth. I didn’t looked into it in details but it seems to cover identity and policy management. Not sure about the rest of the features you need though.

  • Corngood@lemmy.ml
    link
    fedilink
    arrow-up
    1
    arrow-down
    6
    ·
    edit-2
    2 years ago

    What is ‘unallowed software’? A shell script the user wrote? Something they downloaded and compiled?

    Limiting that seems fundamentally at odds with FOSS.

      • Corngood@lemmy.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        2 years ago

        Of course not, but you have to either trust your users to some extent or give them a system that’s locked down to the point of hindering them.

    • Cyborganism@lemmy.caOP
      link
      fedilink
      arrow-up
      3
      ·
      2 years ago

      Granted most open source free software don’t have licenses that limit usage like many commercial software. You might want to keep track of the commercial software. Or look for versions that have important vulnerabilities.

    • LeFantome@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      2 years ago

      First, you can run proprietary software on free software. So, running free software does not preclude license monitoring. It is also possible that certain licenses are not allowed even if they are approved by the FSF or OSI.

      The goal more broadly is enforcing corporate policies around risk or whatever else needs to be enforced.

      It may be that you HAVE to use certain kinds of software ( VPN was mentioned ). Perhaps you are NOT allowed to use certain software on work computers ( torrents and Steam clients come to mind ) or visit some kinds of websites.

      The other risk that a company may want to monitor is ensuring software is up to date ( open source or not ). Stale software can have vulnerabilities that become attack vectors for the bad guys.

      Finally there is access control, privileged access, and auditing. There may be systems or data that employees are not allowed to access or are only allowed to access under certain conditions.

      I am not advocating anything here but it is totally normal for corporate IT to be tasked with limiting corporate risk and creating an auditable history of compliance. These are the kinds of tools and policies they use.