
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Create an organizational unit (OU) structure
/ 20
Blocking an extension
/ 20
URL and attachment blocking settings (Safe Browsing/Download restriction policies)
/ 20
Device idle settings
/ 20
Setting up 2-Step Verification
/ 20
As an administrator of an organization, one of the main goals is to protect user data and prevent devices from being compromised, all while enabling users to operate their devices as needed.
The Google Admin console allows you to view and manage the security settings for a user. You can enable and adjust some basic security settings in the Google Admin console to improve the overall security of your organization, data, and users.
For example, you can block an extension using Safe Browsing, which safeguards against non-persistent threats, making it harder for malicious web pages to compromise the operating system. You can also set up a device idle setting to protect your device and data from unauthorized access, especially in public or shared environments. Additionally, you can set up 2-step verification (2SV), which adds an extra layer of protection to your account or device by requiring a second form of verification, beyond just a password.
In this lab, you create an OU and learn how to configure security settings.
In this lab, you’ll learn how to use the Google Admin Console to perform the following tasks:
To get the most from this lab, familiarity with Google Admin Console terminology is recommended.
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This hands-on lab lets you do the lab activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access the Google Admin console for the duration of the lab.
To complete this lab, you need:
When you are ready, click Start Lab in the upper left.
To access the Google Workspace Admin Console, you must find your credentials and then sign in.
To access the resources and console for this lab, locate the User Email and Password in the Lab Details panel. This panel is on the left or at the top, depending on the width of the browser window. Use these credentials to log in to the Google Workspace Admin Console.
If your lab requires other resource identifiers or connection-related information, they appear on this panel as well.
Tip: Open the tabs in separate windows, side-by-side.
On the Sign in page, log in using the User Email and Password details provided.
When prompted, click I understand and ACCEPT TERMS OF SERVICE to accept all terms and conditions.
After a few seconds, the Admin Console opens.
Right-click VERIFY DOMAIN in either the yellow box at the top or the red box in the Domains card, and select Open link in new tab.
Click the new tab, called Domain setup, to complete the Google Workspace domain verification steps.
On the Let's set up your domain page, click Get Started.
Select the My domain uses a different host checkbox and then click Continue.
At the bottom of the Add verification code page, select the Come back here and confirm once you have updated the code on your domain host checkbox, and then click Confirm.
Wait until it says Your domain is verified! and then close the Domain setup tab.
Return to the Admin Console tab and refresh the page.
An organizational unit refers to a group that an administrator can create in the Google Admin console, used to apply settings to a specific set of users. By default, all users are placed in the top-level (parent) organizational unit. All settings you make in the Admin console apply to this top-level organizational unit and, therefore, to all users and devices in your account.
Child organizational units inherit the settings from the parent, but can be changed to fit the needs of the child organizational unit.
In this task, you create a ChromeOS Security Agent organizational unit.
In the Admin console, from the Navigation menu (), select Directory > Organizational units.
Click Create organizational unit to create a new OU.
For Name of organizational unit, enter ChromeOS Security Agent.
(Optional) For Description, enter ChromeOS Security Team.
Click CREATE.
Click Check my progress to verify the objective.
Blocking an extension in the Google Admin console prevents users from installing or using specific Chrome extensions, enabling administrators to maintain a secure and managed browsing environment. By adding an extension to the blocklist, administrators can control the extensions used by their users, ensuring a more productive and secure browsing experience.
In this task, you block the Zoom Chrome extension.
In the Admin console, from the Navigation menu (), select Devices > Chrome > Apps and extensions > Users and Browsers.
Select the ChromeOS Security Agent organizational unit.
Hover over the Add app icon (+) and select Add from Chrome Web Store.
Click Extensions.
Search for the Zoom Chrome Extension.
Click Select.
In the Installation Policy drop-down menu, select Block.
Click SAVE.
Click Check my progress to verify the objective.
As an administrator, you can block access to harmful, inappropriate, or unauthorized content, such as phishing sites, malware hubs, or non-work-related websites. Organizations can reduce risks, improve security, and maintain a more focused work environment by blocking unwanted URLs.
In this task, you block a specific URL from the Google Admin console.
In the Admin console, from the Navigation menu (), select Devices > Chrome > Settings > Users and browser settings.
Select the ChromeOS Security Agent organizational unit.
Type URL Blocking in the Search or Add Filter text box and press Enter.
Click on URL blocking under Content.
In the Blocked URLs field, add the URL https://www.facebook.com/
.
Save the changes.
Safe Browsing and Download restriction policies enable administrators to control and restrict user access to harmful or unwanted downloads.
To prevent users from downloading files, the best option is to set up the Download Restriction policy.
In the Admin console, from the Navigation menu (), select Devices > Chrome > Settings > Users and browser settings.
Select the ChromeOS Security Agent organizational unit.
Type Chrome Safe Browsing in the Search or Add Filter text field and press Enter.
Under Chrome Safe Browsing, select Download Restrictions.
For the download restrictions Configuration, choose Block malicious downloads and dangerous file types.
Click Save.
Click Check my progress to verify the objective.
Device idle settings allow administrators to configure automatic lock or logout features for devices after a specified period of inactivity, requiring users to re-authenticate to regain access. This security feature helps protect user accounts and devices from unauthorized access, reducing the risk of data breaches and security threats.
In the Admin console, from the Navigation menu (), select Devices > Chrome > Settings > Users and browser settings.
Select the ChromeOS Security Agent organizational unit.
Type Power and shutdown in the Search or Add Filter text field and press Enter.
Click Idle settings.
Select Logout from the Action on lid close drop-down menu.
Select Shutdown for AC idle action.
Enter 600 for AC idle delay in seconds.
Select Logout from the drop-down menu for Battery idle action.
Enter 600 for Battery idle delay in seconds.
Click Save.
Click Check my progress to verify the objective.
The 2-Step Verification feature provides an additional layer of security against cybercriminals attempting to steal login credentials and access sensitive business information. Enabling 2-step verification is the most crucial step you can take to safeguard your organization. This security measure mandates users to confirm their identity with something they know (like a password) and something they have (such as a physical key or access code sent to a device). This method is also known as multi-factor authentication (MFA) or 2-factor authentication (2FA).
Click Check my progress to verify the objective.
In this lab, you configured security settings to block apps and extensions to protect users from potential threats. You also set up URL and attachment settings to block access to harmful, inappropriate, or unauthorized content and websites. Additionally, download restriction policies were implemented to prevent user access to harmful or unwanted websites and downloads. Finally, you concluded by setting up device idle and 2SV settings.
...helps you make the most of ChromeOS technologies. Our classes include sale and technical skills to help you get up to speed quickly and continue your learning journey. The Professional ChromeOS Administrator Certification helps you demonstrate your expertise and validate your ability to transform businesses and schools with ChromeOS.
Manual Last Updated February 27, 2025
Lab Last Tested February 27, 2025
Copyright 2025 Google LLC. All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one