Book Image

Hands-On G Suite for Administrators

By : Cesar Anton Dorantes
Book Image

Hands-On G Suite for Administrators

By: Cesar Anton Dorantes

Overview of this book

Hands-On G Suite for Administrators is a comprehensive hands-on guide to G Suite Administration that will prepare you with all you need to know to become a certified G Suite Administrator, ready to handle all the business scales, from a small office to a large enterprise. You will start by learning the main features, tools, and services from G Suite for Business and then, you will explore all it has to offer and the best practices, so you can make the most out of it. We will explore G Suite tools in depth so you and your team get everything you need -combination of tools, settings and practices- to succeed in an intuitive, safe and collaborative way. While learning G Suite tools you will also learn how to use Google Sites and App Maker, to create from your corporate site to internal tools, live reports that seamlessly integrate with live documents, and advanced Google Services. Finally, you will learn how to set up, analyze and enforce Security, Privacy for your business and how to efficiently troubleshoot a wide variety of issues.
Table of Contents (15 chapters)
Free Chapter
1
Section 1: G Suite for Business
6
Section 2: G Suite with Google Domains
10
Section 3: Security, Privacy, and Troubleshooting
12
Section 4: Apps and Sites

Defining login challenges

G Suite can detect unusual login attempts to user accounts; you can enable additional Login challenges that the system will use on these cases to reduce the risk of unauthorized access using compromised login credentials. The Login challenges settings are as follows:

There are three types of login challenges in G Suite:

  • Mobile device challenges: These use a physical mobile device that the user has registered as their own as a source of truth for confirming the login attempt. If the user has a registered device verification, it can be done in one of three possible ways:
    • A prompt that will show up on the mobile device for the user to confirm the login attempt. I find this to be the most practical option.
    • A text message with a verification code that the user must type as proof.
    • A phone call with a verification code on a voice message that the user must...