SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Best practices to shape
& secure your 1:1 program for chromebooks
TECH BRIEF / MARCH 2016 / V2.6
Overview
Chrome Device Settings
Chrome User Settings
Google Drive Apps
Auditor for Google Mail and Chats by Securly
Conclusion
About Securly
Device Enrollment
Pages to Load on Startup
Safe Browsing & Malicious Sites
Proxy Settings
Force-installed Apps and Extensions
Allowed Apps and Extensions
Plugin Authorization
Incognito Mode and Browser History
Safe Search on Google
Developer Tools
Blocking Chrome:// URLs
Enforcing YouTube Restricted Mode
Securly SSL Certificate Enrollment
Guest Mode
Sign-in Restriction
Contents
2
2
2
3
4
4
5
5
5
6
6
7
7
8
8
9
9
9
11
12
12
12
A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device
safely and productively. This document addresses several aspects of the Google Apps for Education
Admin Console that are important to configure correctly for a successful 1:1 experience.
The Google Apps cloud-based policy essentially consists of:
The Device Settings can include important pieces such as Guest Mode access or Sign-in Restrictions
(both described in this paper). In order to have the Chromebooks be enrolled into the school policy,
ensure the device is enrolled into the enterprise policy.
To achieve this, go to Device Management > Chrome Management > Device Settings. Keep the
“Force devices to re-enroll into this domain after wiping” setting turned on for Organizational Units
whose devices need to be managed by the admin console.
While the User Settings are pushed down to the Chrome browser regardless of the device as soon as
the user logs in, the Device Settings are only pushed down to the Chromebook device if the device is
enrolled into the school’s enterprise policy as configured via the admin console.
Overview
Chrome Device Settings
Device Enrollment
andDevice Settings User Settings
2
Now, when your Chromebooks first arrive, your students can login with their admin console-created
credentials. This will automatically enroll the Chromebooks into the enterprise policy for the school –
without the admins needing to individually login to each of these devices.
Since Securly does MItM (Man In the Middle) SSL interception to decrypt SSL websites, Chromebooks
must have our SSL certificate installed. This is accomplished via Device Management > Network >
Certificates.
Our certificate can be downloaded here:
Securly SSL Certificate Enrollment
3
PART OF SECURLY'S 5-MINUTE SETUP!
Just like Guest Mode and Incognito Mode, this setting – if not configured correctly – can allow
students to use their personal Gmail IDs to evade auditing while browsing online.
As shown below, by using *@domain command separate list, we can prevent students from logging in
with @gmail.com.
We recommend disabling Guest Mode to allow better auditing of student activity. The Guest Mode
otherwise allows the Chromebook to be used as a guest without the district user policy in place. This
mode is similar to the Incognito Mode supported by the Chrome browser – which we also recommend
turning off in a subsequent section.
Guest Mode
Sign-in Restriction
4
We recommend using this setting to display an Acceptable Use Policy (AUP). The school's AUP will
be the first thing students see upon opening their browsers. This serves to remind students of proper
online conduct and any other school policies they are bound by.
This setting allows you to protect your students against malicious sites. While Chromebooks are
generally hardened and immune to most forms of malware, it is important to note that the User
Settings from the admin console apply to the Chrome browser even on other devices such as Win-
dows machines. Further, malicious sites can also include Phishing or other sites that involve platform
independent vulnerabilities that target the user directly – e.g. identity theft, financial theft, password
theft etc.
You can safely leave the following settings on for this section:
Chrome User Settings
Safe Browsing & Malicious Sites
Pages to Load on Startup
5
Using the “Force-installed apps and extensions” wizard, search for the filtering extension of your
choice on the Chrome Web Store, and deploy it to the organizational units that will take the devices
home.
Then you would select “Specify a custom App” with an
ID of: iheobagjkfklnlikgihanlhcddjoihkg
and the URL of: https://clients2.google.com/service/update2/crx
To make the best use of Securly, we recommend that the use of a proxy be completely disabled.
Proxy Settings
Force-installed Apps and Extensions
6
PART OF SECURLY'S 5-MINUTE SETUP!
Along with force-installing security and other instructional apps, in order to prevent students from later
installing games and other time-sinks or VPN/proxy apps, it is generally a good idea to configure this
section as follows:
A frequent user-experience issue is that certain plugins request authorization from the students before
they install or initialize. If we follow the white-listed approach of only letting plugins that are installed by
the admins run, we can go ahead and auto acknowledge these authorization requests so they are
never presented to the students.
Allowed Apps and Extensions
Plugin Authorization
7
To prepare evidence reports, we recommend keeping browser history turned on. Further, we find that
the Incognito Mode bypasses pre-installed security apps and can be used to evade district filtering
policy. The following settings are recommended.
If your district's web filter does not support Safe Search for Google, the following setting allows you to
enforce safe search directly via the Chrome policy. This applies only to the Google search engine. In
order to achieve safe search on other search engines, you need a web filter that is capable of enforcing
this on those engines.
Incognito Mode and Browser History
Safe Search on Google
8
It is recommended to use GAfE to enforce YouTube Restricted so that Chromebooks will always get
restricted mode. Using this method also allows your teachers to override blocked videos or entire
channels. To achieve this: Google Admin > Apps > Additional Google Services > YouTube.
The second two URLs stop the students from getting to the Chrome history and/or wiping the history,
should you want to keep it for purposes of archiving.
You should disable chrome://extensions and consider disabling chrome://settings. Chrome://exten-
sions allows students to start/stop extensions, while chrome://settings and other chrome:// addresses
provide settings or information unnecessary to students. In addition, we recommend disabling the two
other URLs shown in the image below. To block the URLs: Device Management > Chrome Man-
agement > User Settings > Select your OU > URL Blacklist
Developer tools allow users to debug network, script, apps and other issues. In a 1:1 program howev-
er, these could be used to circumvent district policy or gain unfair advantage over other students by
reverse engineering edtech applications that transmit insecure data or have confidential information
hidden away in the code.
We recommend disabling developer tools.
Blocking Chrome:// URLs
Enforcing YouTube Restricted Mode
Developer Tools
9
Then you may start configuring the settings for your OUs by selecting the permissions area:
First select “Content Settings” and check the box for “Signed in users in your organization can only
watch restricted and approved videos…” so that videos are restricted.
Enabled by default only when you choose the option “restrict
content for logged-in users in your organization”.
Users can only watch restricted and approved videos. This
offering is similar to the Restricted Mode setting in the YouTube
app and offers a larger corpus of videos than the Strict offering.
Moderate Restricted
YouTube access
Strict Restricted
YouTube access
10
It is possible for students to install time wasting apps via Google Drive. To stop this from occurring:
Google Admin > Apps > Google Apps > Drive > Data Access > uncheck the box for “Allow
Users to install Google Drive Apps.”
For additional information on how your teachers can approve YouTube channels and videos, please
refer to this article from Google.
Google Drive Apps
11
Users can browse all of YouTube when signed-in even
if you’ve also set network-level restrictions.
You can designate individuals or organizational units to
approve videos and channels so that signed-in users
in their organization can watch them.
Unrestricted
YouTube access
Can approve videos
and channels
Conclusion
Securly is a cloud-based web filter that provides in-school and take-home filtering across all
devices. For more information, please visit www.securly.com or email sales@securly.com
About Securly
Monitoring Google Mail and Chats for student safety is part of CIPA compliance requirements:
"The policy proposed must address… Security and safety of minors using chat rooms, email, instant
messaging, or any other types of online communications."
Traditional web filters do not address this vector. To help IT Admins deal with this issue, Securly has
introduced a FREE tool that uses Machine Learning techniques to monitor Google Mail and Chat for
instances of bullying and self-harm. At no cost to schools, Securly can also alert Principals, Guidance
Counselors and Parents of such activity.
To sign up for a free Auditor account, click here.
By following these recommendations, school IT admins and educators will be fully equipped to
shape and secure their students' online screen time on the 1:1 Chromebook deployments.
Auditor for Google Mail and Chats
by Securly
FREE
12
securly.com

Contenu connexe

Tendances

iPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation StepsiPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation Stepsjrothenberger
 
MyUWO - Student Portal
MyUWO - Student PortalMyUWO - Student Portal
MyUWO - Student Portaljoshdean
 
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2KnowledgeWorking
 
IRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET Journal
 
Final schoology oral presentation use
Final schoology oral presentation useFinal schoology oral presentation use
Final schoology oral presentation usejm0439
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 

Tendances (12)

iPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation StepsiPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation Steps
 
MyUWO - Student Portal
MyUWO - Student PortalMyUWO - Student Portal
MyUWO - Student Portal
 
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
 
CW Reading 1.1 - Introduction
CW Reading 1.1 - IntroductionCW Reading 1.1 - Introduction
CW Reading 1.1 - Introduction
 
IRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET - Web Application for Sports Module
IRJET - Web Application for Sports Module
 
Reading 2.1 software navigation
Reading 2.1   software navigationReading 2.1   software navigation
Reading 2.1 software navigation
 
Final schoology oral presentation use
Final schoology oral presentation useFinal schoology oral presentation use
Final schoology oral presentation use
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Driver ed
Driver edDriver ed
Driver ed
 
School children security system
School children security systemSchool children security system
School children security system
 
Learning Management System – A Modern Approach
Learning Management System – A Modern ApproachLearning Management System – A Modern Approach
Learning Management System – A Modern Approach
 

En vedette

Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNSSecurly
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product BriefSecurly
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programSecurly
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case StudySecurly
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 

En vedette (7)

Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNS
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case Study
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 

Similaire à Best practices to shape and secure your 1:1 program for Chromebooks

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programSecurly
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfGeovaniGonalves6
 
ImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfspikecloudcloud
 
Google Apps Certified Administrator
Google Apps Certified AdministratorGoogle Apps Certified Administrator
Google Apps Certified AdministratorMohammed Sidahmed
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerSysCloud
 
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Taste
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and OPietro F. Maggi
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersHendrix Bodden
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security PrimerEnkitec
 
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUEScomptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Chromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChristopher Casal
 
Example cookie compliance audit
Example cookie compliance auditExample cookie compliance audit
Example cookie compliance auditPhil Pearce
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeSecurly
 

Similaire à Best practices to shape and secure your 1:1 program for Chromebooks (20)

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook program
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdf
 
gControl_Overview
gControl_OverviewgControl_Overview
gControl_Overview
 
ImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdf
 
Google Apps Certified Administrator
Google Apps Certified AdministratorGoogle Apps Certified Administrator
Google Apps Certified Administrator
 
Windows10Security
Windows10SecurityWindows10Security
Windows10Security
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
 
License
LicenseLicense
License
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and O
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education Customers
 
Pace IT - Control Panel (Part 1)
Pace IT - Control Panel (Part 1)Pace IT - Control Panel (Part 1)
Pace IT - Control Panel (Part 1)
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security Primer
 
UiPath Extensions_v3.pdf
UiPath Extensions_v3.pdfUiPath Extensions_v3.pdf
UiPath Extensions_v3.pdf
 
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUEScomptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
 
Chromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & Procedures
 
Example cookie compliance audit
Example cookie compliance auditExample cookie compliance audit
Example cookie compliance audit
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted Mode
 

Plus de Securly

Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly waySecurly
 
David's Law
David's Law David's Law
David's Law Securly
 
Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by SecurlySecurly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesSecurly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?Securly
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community SchoolsSecurly
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - UswestSecurly
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - UseastSecurly
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 SchoolsSecurly
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictSecurly
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolSecurly
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public SchoolsSecurly
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictSecurly
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs HardwareSecurly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?Securly
 

Plus de Securly (17)

Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly way
 
David's Law
David's Law David's Law
David's Law
 
Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by Securly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United States
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community Schools
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - Uswest
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - Useast
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School District
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community School
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public Schools
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School District
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs Hardware
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 

Dernier

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Dernier (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Best practices to shape and secure your 1:1 program for Chromebooks

  • 1. Best practices to shape & secure your 1:1 program for chromebooks TECH BRIEF / MARCH 2016 / V2.6
  • 2. Overview Chrome Device Settings Chrome User Settings Google Drive Apps Auditor for Google Mail and Chats by Securly Conclusion About Securly Device Enrollment Pages to Load on Startup Safe Browsing & Malicious Sites Proxy Settings Force-installed Apps and Extensions Allowed Apps and Extensions Plugin Authorization Incognito Mode and Browser History Safe Search on Google Developer Tools Blocking Chrome:// URLs Enforcing YouTube Restricted Mode Securly SSL Certificate Enrollment Guest Mode Sign-in Restriction Contents 2 2 2 3 4 4 5 5 5 6 6 7 7 8 8 9 9 9 11 12 12 12
  • 3. A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device safely and productively. This document addresses several aspects of the Google Apps for Education Admin Console that are important to configure correctly for a successful 1:1 experience. The Google Apps cloud-based policy essentially consists of: The Device Settings can include important pieces such as Guest Mode access or Sign-in Restrictions (both described in this paper). In order to have the Chromebooks be enrolled into the school policy, ensure the device is enrolled into the enterprise policy. To achieve this, go to Device Management > Chrome Management > Device Settings. Keep the “Force devices to re-enroll into this domain after wiping” setting turned on for Organizational Units whose devices need to be managed by the admin console. While the User Settings are pushed down to the Chrome browser regardless of the device as soon as the user logs in, the Device Settings are only pushed down to the Chromebook device if the device is enrolled into the school’s enterprise policy as configured via the admin console. Overview Chrome Device Settings Device Enrollment andDevice Settings User Settings 2
  • 4. Now, when your Chromebooks first arrive, your students can login with their admin console-created credentials. This will automatically enroll the Chromebooks into the enterprise policy for the school – without the admins needing to individually login to each of these devices. Since Securly does MItM (Man In the Middle) SSL interception to decrypt SSL websites, Chromebooks must have our SSL certificate installed. This is accomplished via Device Management > Network > Certificates. Our certificate can be downloaded here: Securly SSL Certificate Enrollment 3 PART OF SECURLY'S 5-MINUTE SETUP!
  • 5. Just like Guest Mode and Incognito Mode, this setting – if not configured correctly – can allow students to use their personal Gmail IDs to evade auditing while browsing online. As shown below, by using *@domain command separate list, we can prevent students from logging in with @gmail.com. We recommend disabling Guest Mode to allow better auditing of student activity. The Guest Mode otherwise allows the Chromebook to be used as a guest without the district user policy in place. This mode is similar to the Incognito Mode supported by the Chrome browser – which we also recommend turning off in a subsequent section. Guest Mode Sign-in Restriction 4
  • 6. We recommend using this setting to display an Acceptable Use Policy (AUP). The school's AUP will be the first thing students see upon opening their browsers. This serves to remind students of proper online conduct and any other school policies they are bound by. This setting allows you to protect your students against malicious sites. While Chromebooks are generally hardened and immune to most forms of malware, it is important to note that the User Settings from the admin console apply to the Chrome browser even on other devices such as Win- dows machines. Further, malicious sites can also include Phishing or other sites that involve platform independent vulnerabilities that target the user directly – e.g. identity theft, financial theft, password theft etc. You can safely leave the following settings on for this section: Chrome User Settings Safe Browsing & Malicious Sites Pages to Load on Startup 5
  • 7. Using the “Force-installed apps and extensions” wizard, search for the filtering extension of your choice on the Chrome Web Store, and deploy it to the organizational units that will take the devices home. Then you would select “Specify a custom App” with an ID of: iheobagjkfklnlikgihanlhcddjoihkg and the URL of: https://clients2.google.com/service/update2/crx To make the best use of Securly, we recommend that the use of a proxy be completely disabled. Proxy Settings Force-installed Apps and Extensions 6 PART OF SECURLY'S 5-MINUTE SETUP!
  • 8. Along with force-installing security and other instructional apps, in order to prevent students from later installing games and other time-sinks or VPN/proxy apps, it is generally a good idea to configure this section as follows: A frequent user-experience issue is that certain plugins request authorization from the students before they install or initialize. If we follow the white-listed approach of only letting plugins that are installed by the admins run, we can go ahead and auto acknowledge these authorization requests so they are never presented to the students. Allowed Apps and Extensions Plugin Authorization 7
  • 9. To prepare evidence reports, we recommend keeping browser history turned on. Further, we find that the Incognito Mode bypasses pre-installed security apps and can be used to evade district filtering policy. The following settings are recommended. If your district's web filter does not support Safe Search for Google, the following setting allows you to enforce safe search directly via the Chrome policy. This applies only to the Google search engine. In order to achieve safe search on other search engines, you need a web filter that is capable of enforcing this on those engines. Incognito Mode and Browser History Safe Search on Google 8
  • 10. It is recommended to use GAfE to enforce YouTube Restricted so that Chromebooks will always get restricted mode. Using this method also allows your teachers to override blocked videos or entire channels. To achieve this: Google Admin > Apps > Additional Google Services > YouTube. The second two URLs stop the students from getting to the Chrome history and/or wiping the history, should you want to keep it for purposes of archiving. You should disable chrome://extensions and consider disabling chrome://settings. Chrome://exten- sions allows students to start/stop extensions, while chrome://settings and other chrome:// addresses provide settings or information unnecessary to students. In addition, we recommend disabling the two other URLs shown in the image below. To block the URLs: Device Management > Chrome Man- agement > User Settings > Select your OU > URL Blacklist Developer tools allow users to debug network, script, apps and other issues. In a 1:1 program howev- er, these could be used to circumvent district policy or gain unfair advantage over other students by reverse engineering edtech applications that transmit insecure data or have confidential information hidden away in the code. We recommend disabling developer tools. Blocking Chrome:// URLs Enforcing YouTube Restricted Mode Developer Tools 9
  • 11. Then you may start configuring the settings for your OUs by selecting the permissions area: First select “Content Settings” and check the box for “Signed in users in your organization can only watch restricted and approved videos…” so that videos are restricted. Enabled by default only when you choose the option “restrict content for logged-in users in your organization”. Users can only watch restricted and approved videos. This offering is similar to the Restricted Mode setting in the YouTube app and offers a larger corpus of videos than the Strict offering. Moderate Restricted YouTube access Strict Restricted YouTube access 10
  • 12. It is possible for students to install time wasting apps via Google Drive. To stop this from occurring: Google Admin > Apps > Google Apps > Drive > Data Access > uncheck the box for “Allow Users to install Google Drive Apps.” For additional information on how your teachers can approve YouTube channels and videos, please refer to this article from Google. Google Drive Apps 11 Users can browse all of YouTube when signed-in even if you’ve also set network-level restrictions. You can designate individuals or organizational units to approve videos and channels so that signed-in users in their organization can watch them. Unrestricted YouTube access Can approve videos and channels
  • 13. Conclusion Securly is a cloud-based web filter that provides in-school and take-home filtering across all devices. For more information, please visit www.securly.com or email sales@securly.com About Securly Monitoring Google Mail and Chats for student safety is part of CIPA compliance requirements: "The policy proposed must address… Security and safety of minors using chat rooms, email, instant messaging, or any other types of online communications." Traditional web filters do not address this vector. To help IT Admins deal with this issue, Securly has introduced a FREE tool that uses Machine Learning techniques to monitor Google Mail and Chat for instances of bullying and self-harm. At no cost to schools, Securly can also alert Principals, Guidance Counselors and Parents of such activity. To sign up for a free Auditor account, click here. By following these recommendations, school IT admins and educators will be fully equipped to shape and secure their students' online screen time on the 1:1 Chromebook deployments. Auditor for Google Mail and Chats by Securly FREE 12