{"id":5790,"date":"2019-03-18T10:12:12","date_gmt":"2019-03-18T03:12:12","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/"},"modified":"2023-11-01T16:05:40","modified_gmt":"2023-11-01T09:05:40","slug":"g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/","title":{"rendered":"G Suite: Control access to enterprise data on Chrome, Mac, Windows"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Co_gi_moi\" >What\u2019s new:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Nhung_ai_chiu_anh_huong\" >Who\u2019s impacted<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Tai_sao_ban_nen_su_dung_tinh_nang_nay\" >Why you should use this feature<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Cach_bat_dau_su_dung_tinh_nang_nay\" >How to get started<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Cac_thong_tin_bo_sung\" >Additional details<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Danh_dau_cac_thiet_bi_diem_cuoi_duoc_xac_thuc_thanh_%E2%80%9CApproval%E2%80%9D_hoac_%E2%80%9CBlock%E2%80%9D_truoc_khi_cai_dat_quyen_truy_cap\" >Mark authenticated endpoint devices as \u201cApproval\u201d or \u201cBlock\u201d before setting access permissions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/g-suite-kiem-soat-quyen-truy-cap-du-lieu-doanh-nghiep-tren-chrome-mac-window\/#Bat_hoac_tat_quyen_truy_cap_cua_cac_thiet_bi_rieng_le\" >Enable or disable access for individual devices<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Co_gi_moi\"><\/span><b>What\u2019s new:<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"> Google is giving admins more control over how devices perform endpoint verification and how it affects access to business data across <a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud<\/a>. Specifically, G Suite (Workspace) admins will be able to:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Mark whether endpoint devices using Chrome are allowed or blocked \u2013 Admin can use tags to set access levels with <\/span><a href=\"https:\/\/cloud.google.com\/access-context-manager\/docs\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Access Context Manager.<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Decide whether the admin needs to check again for new devices that require authentication, before they are actually marked as \u201callowed access\u201d.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This will be a similar feature to what is already available in the mobile device manager on the desktop, using Chrome OS or Chrome browser.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Nhung_ai_chiu_anh_huong\"><\/span><b>Who\u2019s impacted<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Only admins are affected<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Tai_sao_ban_nen_su_dung_tinh_nang_nay\"><\/span><b>Why you should use this feature<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">With the ability to restrict access to devices using endpoint authentication, admins can now have a tighter level of control, through managing access rights of devices. , not just mobile devices<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Now, admins can view the list of devices accessing this data, and allow or block access to specific devices, based on any internal rules. For example: Lost devices will now be \u201cblocked\u201d and unable to access applications, or allow new users (or users with new positions) that need access to the application .<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Cach_bat_dau_su_dung_tinh_nang_nay\"><\/span><b>How to get started<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To set up policies and decide whether a newly registered device for authentication requires admin approval or not, go to Admin Console &gt; Device management &gt; Setup &gt; Device Approvals &gt; Device Approvals.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Select (or deselect) Requires Admin approval. (The system initially defaults to not selecting this feature, meaning the admin will not need to view and evaluate each newly registered device.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Besides, you can also choose to add an email address that specializes in receiving requests from users.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Note: devices&#039; access to corporate data can be adjusted at any time using Access Context Manager. For devices that are computers, the admin will have the option to Approve or Block - this option will highlight the corresponding devices in the Access Context Manager section.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Agreeing or blocking actions on the device will generate an event that needs to be audited in the Admin console. For more detailed information about audit logs for devices, <\/span><a href=\"https:\/\/support.google.com\/a\/answer\/6350074\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">see here.<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Cac_thong_tin_bo_sung\"><\/span><b>Additional details<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This update allows you to control device access by authenticating endpoint devices. Including <a href=\"https:\/\/gcloudvn.com\/en\/google-chromebook\/\">Chromebooks<\/a> and other computing devices using Google Chrome Browser.<\/span><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Danh_dau_cac_thiet_bi_diem_cuoi_duoc_xac_thuc_thanh_%E2%80%9CApproval%E2%80%9D_hoac_%E2%80%9CBlock%E2%80%9D_truoc_khi_cai_dat_quyen_truy_cap\"><\/span><b>Mark authenticated endpoint devices as \u201cApproval\u201d or \u201cBlock\u201d before setting access permissions<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">When a new device is registered through Endpoint Authentication, admins can enable access restriction in the Access Context manager. Here, they can manage device access rights by selecting \u201cApprove\u201d or \u201cBlock\u201d.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Please see the image below to visualize this feature in the Admin console once it is available<\/span><b> turn on<\/b><span style=\"font-weight: 400;\"> go up.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">If this feature is being <\/span><b>turn off<\/b><span style=\"font-weight: 400;\">, devices will only be consented by default and may be blocked later. For example, if a device is lost or information has been taken.<\/span><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Bat_hoac_tat_quyen_truy_cap_cua_cac_thiet_bi_rieng_le\"><\/span><b>Enable or disable access for individual devices<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Admin can approve or remove device access rights in the Admin console. A brand new perspective <\/span><i><span style=\"font-weight: 400;\">Admin console &gt; Device Management &gt; Device Approvals<\/span><\/i><span style=\"font-weight: 400;\"> will list all devices that are waiting to be approved. From this list, they can be marked as Deviced\/Approved \u2013 once the devices have been marked, further access permissions can be adjusted in Access Context Manager.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Admin can also receive notification emails when a device is registered but requires admin permission. Visit the Help Center to learn more <\/span><a href=\"https:\/\/support.google.com\/a\/answer\/6328712#step1\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">How to configure email notifications.<\/span><\/a><\/p>\n<p style=\"text-align: justify;\"><b>Helpful links<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/a\/users\/answer\/9018161\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Help Center (end users): Allows an admin to manage your computer (Endpoint Verification)<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/a\/answer\/9007320\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Help Center (Admins): Enable or disable endpoint verification<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/a\/answer\/6328712\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Help Center (Admins): Control which devices have access to your data<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/a\/answer\/6350074\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Help Center (Admins): Devices audit log.<\/span><\/a><\/li>\n<\/ul>\n<p style=\"text-align: right;\"><strong>Update: <a href=\"https:\/\/gcloudvn.com\/en\/\">Gimasys<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Google is giving admins more control over how devices perform endpoint verification and how it affects access to business data on Google Cloud.<\/p>","protected":false},"author":1,"featured_media":5791,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/5790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=5790"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/5790\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/5791"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=5790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=5790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=5790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}