Book Image

Google Workspace User Guide

By : Balaji Iyer
Book Image

Google Workspace User Guide

By: Balaji Iyer

Overview of this book

Google Workspace has evolved from individual Google services to a suite of apps that improve productivity and promote efficient collaboration in an enterprise organization. This book takes you through the evolution of Google Workspace, features included in each Workspace edition, and various core services, such as Cloud Identity, Gmail, and Calendar. You’ll explore the functionality of each configuration, which will help you make informed decisions for your organization. Later chapters will show you how to implement security configurations that are available at different layers of Workspace and also how Workspace meets essential enterprise compliance needs. You’ll gain a high-level overview of the core services available in Google Workspace, including Google Apps Script, AppSheet, and Google Cloud Platform. Finally, you’ll explore the different tools Google offers when you’re adopting Google Cloud and migrating your data from legacy mail servers or on-premises applications over to cloud servers. By the end of this Google Workspace book, you’ll be able to successfully deploy Google Workspace, configure users, and migrate data, thereby helping with cloud adoption.
Table of Contents (14 chapters)
Part 1: Getting Started – Google Workspace
Part 2: Data Security
Part 3: Data Integrations
Chapter 6: Designing Custom Applications
Part 4: Migrating Data

End-user security

Google Cloud Identity users have the option to self-serve their account security settings on the Workspace Admin console. All users should be able to set up 2-step verification (2SV), view their login history, look at their registered devices, and look at their active sessions.

Besides these end-user settings, administrators can also mandate certain security settings for users or manage sessions, cookies, and password settings. Administrators have the power to do the following:

  • Reset a user's password.
  • Reset a user's session/cookies, forcing the user to log in again.
  • Check on the user's 2SV enrollment.
  • Revoke access to any third-party applications. Irrepsective of whether access is granted directly with the user's Cloud Identity or through an application-specific password, both can be managed by the Administrator.

Next, let's look at how Google strives to keep users secure via password monitoring.