FOTC
  • Products
    • Google Workspace
    • Google Cloud
  • Services
    • Cloud engineering as a service
    • Cloud Infrastructure Strategy Roadmap
    • Google AI
    • Landing Zone
    • Security audit
    • Technical support
  • About us
  • Startups
  • Resources
    • Case studies
    • Blog
    • Partner programme
  • Careers
Contact
ro pl hu en
  • Privacy policy

Mobile device management – 8 Google Workspace configurations to help protect employees’ phones

EN » Blog » Mobile device management – 8 Google Workspace configurations to help protect employees’ phones

Agata Koptewicz

24 April 2022
Mobile device management – 8 Google Workspace configurations to help protect employees’ phones

A mobile device management solution is included in every Google Workspace plan, so by using this suite of office productivity tools, you don’t have to invest in third-party MDM solutions. As an administrator, you can secure corporate data on personal devices and those belonging to your organization using the endpoint management settings in the Google Admin console. Security features for an MDM software provide better account privacy, detailed access control, and data protection.

Risks associated with unmanaged mobile devices

Remote employees process just as much critical customer and company data as stationary workers, but their business devices are far less secure than those left locked in an empty office overnight. Laptops and mobile phones that are taken off-site are vulnerable to, among other things: 

  • Loss, 
  • Theft,
  • Connection to a public Wi-Fi network,
  • Third-party access (e.g., employee’s friends and children),

Threats that are not related to the location of the device include:

  • Installation of untrusted programs and applications, 
  • Phishing attempts, 
  • Malicious websites, 
  • Connecting untrusted storage devices (e.g. flash drives),
  • Easy-to-guess passwords or even lack of any screen blockade.

Each of these threats can, in certain circumstances, become a direct cause of data leakage. Such breaches entail not only reputational problems and loss of customer trust but often also high financial penalties for violations of GDPR or other security regulations.

What is mobile device management? 

Mobile Device Management (MDM for short) is about connecting all laptops, computers, tablets and mobile phones that access corporate data to a system that allows administrators to monitor their activity and settings. MDM is an essential part of the EMM strategy (enterprise mobility management) next to mobile applications management, mobile content management, BYOD, and mobile information management.

There are many brands of mobile device management software. However, Google Workspace customers don’t have to implement external solutions, as this all-in-one service includes numerous security configurations. 

Two mobile device management levels in Google Workspace 

You can tailor the degree of interference with security settings on employee devices within MDM service to meet your organization’s needs by selecting basic or advanced control options. The availability of advanced options depends on the plan your company is using. 

Basic features of managing mobile devices

The standard MDM feature set will come in handy for any business, as it allows you to set up fundamental barriers to unauthorized access, as well as quickly respond to theft or loss of a device. This level of security in Google Workspace is customizable and includes: 

  • An inventory of all devices on which employees have logged into the business Google account,
  • The ability to enforce using a password or screen lock on devices,
  • Protection against hacking attacks and malware for device data,
  • Remote user logout and deletion of company data from the device,
  • Lists of safe apps on Android,
  • Mobile device reports to help detect suspicious activity,
  • Forcing a re-login on the device.

The basic MDM system gives administrators partial remote control over access to the company data processed on employees’ mobile phones and laptops. These essential features are customizable, turned on by default, and available in every Google Workspace plan. 

Advanced mobile device management

If you want to ensure a high standard of data protection on mobile devices, configure advanced MDM features to manage mobile devices. These can be applied to user accounts with Google Workspace licences in Business Plus, Enterprise, Education Standard, Education Plus, and accounts subscribed to Cloud Identity Premium. 

This level of MDM equips administrators with an arsenal of features such as:

  • Enforcement of strong access credentials,
  • Option to approve new devices in the administration console, 
  • Full remote device memory wipe,
  • Application management for iOS,
  • Extended reporting that includes app and security information for mobile security,
  • Security policies for encryption, file transfers, camera use and data synchronization.

To implement some of these functionalities, you may need to install an additional application, such as Google Device Policy or Android Device Policy. MDM settings vary by OS version. 

Need support with MDM configuration?

Google Cloud certified engineers at FOTC are always at your service.

Learn more

How to connect mobile devices to the Google Admin console? 

Automatic registration

When does a mobile device become visible in the administration panel? As soon as the user logs in on it to the Google Workspace service. It means that the administrator does not have to take any steps to have an overview of the number of laptops and phones on which the company’s data is processed. Most mobile device management rules can be deployed remotely also on employees’ personal devices if they use them to access business mail and files or if your company works in BYOD (Bring Your Own Device) model. 

Administrative registration of company-owned devices with MDM

Company devices should be registered in the console even before they are distributed among end-users. Administrators can do this in two ways: 

  • Manual registration – the administrator prepares an inventory of devices by importing a list of serial numbers. This way, new employee logins do not need to be verified, and the administrator can receive notifications about devices that don’t show activity.   
  • Zero-touch enrolment – whenever the device is turned on (even if factory settings have been restored), it automatically logs into the MDM system and remains under the company’s control. This feature is available on Android devices only. 

It is worth noting that MDM settings do not have to be implemented globally across the company. You can gradate the strictness of security by setting different conditions for each organizational unit in Google Workspace. 

8 MDM configurations in the Google Workspace console that will secure employees’ phones

Let’s discuss the most important settings that an administrator can adjust in the Google Workspace console to provide greater security for company data handled on employees’ mobile devices.

1. Require strong passwords

With basic MDM options, you can enforce setting a screen lock or password on managed mobile devices to help protect your organization’s data from prying eyes. While using the advanced mobile device management features, you have even more control – you can specify detailed password requirements such as: 

  • Minimum number of characters, 
  • Password validity period, 
  • Preventing re-use of an expired password, 
  • You can even set an automatic device memory wipe after a specified number of failed login attempts.
Settings of password strength requirements in Google Workspace
Settings of password strength requirements in Google Workspace

2. Manage mobile apps in your organization

You can decide which Android or iOS apps users can find and download on their devices by creating a list of allowed web and mobile apps in the Google Admin console. It can include public apps, as well as private apps. On the list, you can specify settings for managed apps, such as automatic installation on devices and whether users can or cannot uninstall it themselves.

User access to managed apps settings
App access settings

3. Force device encryption

You can make encryption of data obligatory on devices when locked. It ensures that content stored on the phone can only be read when the device is unlocked. Forcing encryption will help reduce the risk of data leakage if a user’s mobile device is lost, stolen or sold.

4. Block mobile devices with compromised security

Hackers can breach a phone’s security in many ways, and things like an unlocked bootloader, custom ROM or a superuser binary file make it much easier. You can prevent users from accessing company account data on mobile devices that show signs of being hacked. Google Workspace or Cloud Identity data will be inaccessible on such devices.

Blocking compromised mobile devices in the Google Admin console

5. Get reports on mobile device inactivity

When it comes to company-owned devices, one of the most suspicious activities is inactivity. Google Workspace can generate a monthly report for you about company-owned Android devices that have not synced any business data for the last 30 days. All super administrators and other recipients added to the console will receive an automatic email with the report. The file contains a list of idle devices and information about who has logged on to them recently.

Inactive company-owned devices reports settings

6. Set automatic data wipe for inactive devices

Inactivity is easy to miss if you don’t monitor the device inventory regularly. In mobile device management in Google Workspace, the first administrative steps can be taken automatically if a device hasn’t been syncing data for too long. Auto wipe remotely removes business account data and managed applications from  Android devices that show no activity for a certain number of days.

Auto wipe for inactive devices settings

7. Configure automatic blockade of Android devices that don’t comply with your organization’s policies

If a device is no longer compliant with any of your organization’s policies, you can automatically lock or completely wipe it, preventing it from accessing corporate data. You can set scope, conditions, and actions. Users get a notification when their devices are affected by this rule. 

Blockades can be triggered by states and activities such as: 

  • Account registration change
  • Device action event
  • Device application change
  • Device compliance status (Android only)
  • Device compromise (Android only)
  • Device OS update
  • Device ownership (Android only)
  • Device settings change (Android only)
  • Device sync
  • Failed screen unlock attempts (Android only)
  • Suspicious activity
  • Work profile support (Android only)
Setting custom rules for mobile devices in Google Workspace

8. Use context-dependent access settings

Context-aware access is an advanced configuration available in Google Workspace Enterprise (for enterprise mobile devices), Education Standard and Plus. It allows you to set different levels of access to data depending on the identity of the user and the context of the request. It checks attributes such as:

  • IP subnetwork,
  • Geographical location, 
  • Device policies, 
  • Device operating system.

How to use this feature in practice? As an administrator, you can, for example:

  • Block a mobile device’s access to Google apps (web and mobile) if the device is outside a specific country or region, or if it does not meet encryption and password requirements;
  • Create an access level for Gmail that requires users to connect from a specific range of IP addresses and their devices to be encrypted;
  • Allow access to applications only from corporate devices and on the corporate network;
  • And many other combinations.
Context-aware access in Google Admin console

Get unified endpoint management in Google Workspace

FOTC is a team of Google Certified Cloud Engineers who are always ready to support you in overcoming challenges during the configuration of your company’s data protection systems. With our help, you can build a better online hybrid collaboration environment for your employees. Working with a Google Cloud partner will also allow you to optimize your Google Workspace expenses with discounts that aren’t available anywhere else. 

Let’s talk about the needs of your company. We will prepare a personalized offer for the implementation and data migration from the current solution to Google Workspace. You can also transfer licences to FOTC to pay less than directly at Google.

Risks associated with unmanaged mobile devices
What is mobile device management?
Two mobile device management levels in Google Workspace
How to connect mobile devices to the Google Admin console?
8 MDM configurations in the Google Workspace console that will secure employees’ phones
Get unified endpoint management in Google Workspace

Agata Koptewicz

Content manager at FOTC since 2019. For the past 7 years, she has been involved in copywriting, creative writing, and content development for gaming, technology, and eCommerce companies. She is passionate about designing strategies for effective communication.

Services
  • Cloud Infrastructure Strategy Roadmap
  • Landing Zone
  • Training
Products
  • Google Workspace
  • Google Cloud
  • Google Workspace for Education
Industry
  • Education
  • Gaming
  • Government
  • Healthcare
  • Retail
  • Small and medium businesses
Knowledge
  • Blog
  • Case Studies
  • NIS2 directive
Company
  • About us
  • Career
  • Contact
  • Partner programme
  • Google Workspace Support
  • Privacy Policy
  • Regulations
Copyright © 2014 – 2024 Fly On The Cloud sp. z o.o. KRS: 0000500884, NIP: 8971797086, REGON: 022370270