Book Image

Google Workspace User Guide

By : Balaji Iyer
Book Image

Google Workspace User Guide

By: Balaji Iyer

Overview of this book

Google Workspace has evolved from individual Google services to a suite of apps that improve productivity and promote efficient collaboration in an enterprise organization. This book takes you through the evolution of Google Workspace, features included in each Workspace edition, and various core services, such as Cloud Identity, Gmail, and Calendar. You’ll explore the functionality of each configuration, which will help you make informed decisions for your organization. Later chapters will show you how to implement security configurations that are available at different layers of Workspace and also how Workspace meets essential enterprise compliance needs. You’ll gain a high-level overview of the core services available in Google Workspace, including Google Apps Script, AppSheet, and Google Cloud Platform. Finally, you’ll explore the different tools Google offers when you’re adopting Google Cloud and migrating your data from legacy mail servers or on-premises applications over to cloud servers. By the end of this Google Workspace book, you’ll be able to successfully deploy Google Workspace, configure users, and migrate data, thereby helping with cloud adoption.
Table of Contents (14 chapters)
1
Part 1: Getting Started – Google Workspace
4
Part 2: Data Security
7
Part 3: Data Integrations
9
Chapter 6: Designing Custom Applications
10
Part 4: Migrating Data

Summary

In this chapter, we learned how to configure several core Workspace services. Configuring them the right way is critical not only for an optimal user experience but also for enhanced security. The security for users in a domain starts with proper configuration in the Cloud Identity system, and Context-Aware Access sets the stage for it perfectly. Single sign-on capabilities enable users to sign into multiple services with a single credential set, which aids in a simplified user experience. Password monitoring allows users to protect themselves from not reusing their passwords, thus improving the security posture for their domains.

Next, we talked about important Workspace services and the different options the administrators and users of these services have to make them their own. Gmail has in-depth security configurations that keep users' inboxes free of spam, spoofing, phishing, and other fraudulent attack vectors that users could easily fall prey to.

By integrating...