skip to Main Content
Welcome to Gimasys!
Hotline: +84 974 417 099 (HCM) | +84 987 682 505 (HN) gcp@gimasys.com

Featured Application: Basic Device Manager brings basic tracking to all computers

What's changed:

With this launch, all desktop devices signed into G Suite will have basic device management by default. This means that when a user signs in to G Suite through any browser on a Windows, Mac, Chrome, or Linux device, the device will be registered with the Google endpoint management. This happens automatically at login -doesn't require any other user actions or software to be installed on the device.

 

Once a device is registered with basic device management, the admin can see the device type, operating system, first sync time and last sync time in the Admin console pellets. They can also log out the user from that device. 

 

This provides the basic benefits of device management without the added cost or requirement of installing agents or profiles. We are also improving the filters available in the device list that can help with endpoint verification and Context-Aware Access implementation. See more information below.

 

Who is affected:

Admins

 

Re-use:

Basic device management provides a basic level of security for any device that accesses corporate data. Collected device data can help administrators make more informed security and policy decisions about how to manage devices in their organization. More specifically, this feature will help administrators:

 

  • Get a clearer picture of all the devices accessing corporate data.
  • Use more comprehensive data to analyze device access in your organization through reports and security centers. For example, you can use it to identify devices that require operating system updates.
  • Use more comprehensive data to analyze device access in your organization through reports and security centers. For example, you can use it to identify devices that require operating system updates. 
  • Take remedial action to remotely log out users when devices are lost, stolen, or compromised. 

 

In addition, the Exclude Endpoint Verification filter that excludes in the device list can help increase endpoint verification implementation and ease with Context-Aware Access implementation

 

How to get started:

 

More information:

 

Basic desktop management that provides device information without apps or installers

When basic device management is enabled, administrators receive information about a limited set of device attributes: device type, device model, OS version, first sync, and last sync .

 

This will show up in two places in the Admin Console:

 

  • List of devices found at Admin console > Device management > Devices > Endpoints
  • The test section is found at Admin console > Reporting > Audit > Devices.

 

Information about devices with basic device management will be listed along with devices that use other agents to provide administrators with detailed information about devices accessing corporate data . Administrators can filter the endpoint list by “Management Type” to see devices with a specific device management type, such as Basic, Endpoint Verification, or  Drive File Stream

 

You can filter for “Basic” devices at Admin console > Device management > Devices 

 

A device with information provided through basic device management

 

Limitations of basic device management and other endpoint verification options

Basic Device Manager is designed to be a lightweight, agentless crawler. Its goal is to provide a basic data set, which can help administrators make some decisions and add some control to the devices accessing their data.

 

Google provides other services, providing more granular data and allowing more comprehensive control for administrators, including Endpoint Authentication, Chrome Device management, Drive File Stream, and Mobile Management  

 

New Endpoint Verification Filter helps implement Endpoint Verification and Context-Aware Access

We can also add filtering for devices without Endpoint Verification in the Admin console > Device management > Devices. This can help admins identify devices that are accessing corporate data without endpoint verification, and see if they want to install endpoint verification on any devices. This can also improve Context-Aware Access implementations. By viewing users and devices that do not have Endpoint Verification installed, administrators can identify and avoid potential user disruptions in advance. when Context-Aware Access is enabled. 

 

 

Updated: Gimasys.

 

 

Back To Top
0974 417 099