Book Image

Google Workspace User Guide

By : Balaji Iyer
Book Image

Google Workspace User Guide

By: Balaji Iyer

Overview of this book

Google Workspace has evolved from individual Google services to a suite of apps that improve productivity and promote efficient collaboration in an enterprise organization. This book takes you through the evolution of Google Workspace, features included in each Workspace edition, and various core services, such as Cloud Identity, Gmail, and Calendar. You’ll explore the functionality of each configuration, which will help you make informed decisions for your organization. Later chapters will show you how to implement security configurations that are available at different layers of Workspace and also how Workspace meets essential enterprise compliance needs. You’ll gain a high-level overview of the core services available in Google Workspace, including Google Apps Script, AppSheet, and Google Cloud Platform. Finally, you’ll explore the different tools Google offers when you’re adopting Google Cloud and migrating your data from legacy mail servers or on-premises applications over to cloud servers. By the end of this Google Workspace book, you’ll be able to successfully deploy Google Workspace, configure users, and migrate data, thereby helping with cloud adoption.
Table of Contents (14 chapters)
1
Part 1: Getting Started – Google Workspace
4
Part 2: Data Security
7
Part 3: Data Integrations
9
Chapter 6: Designing Custom Applications
10
Part 4: Migrating Data

Automated device management

In the previous section, we learned about security alerts, which are triggered based on certain actions. We also noted that they are configured through rules. Google Workspace allows admins to automate device management through similar rules. An event on the device triggers these rules based on the conditions defined, and actions are executed sequentially.

For example, when unlocking a device, if a user enters an incorrect password more than five times, this could mean that the device is with an unauthorized person. A rule could be configured to automatically wipe the account from the device without anyone's intervention.

To create such rules, follow these steps:

  1. Log in to the Admin console.
  2. Select Security from the left-hand side panel.
  3. Click on Rules.
  4. Select Device Management Rules.
  5. Select Add a rule from template or Create a new rule.
Figure 4.23 – Rule to block an account on multiple failed screen unlocks on a mobile device

Figure 4.23 – Rule to block an account on...