Many organizations, from enterprises to small businesses and schools, are focusing efforts on distance working and learning. One significant hurdle for those who are suddenly tasked with supporting remote users is the question of how to manage a fleet of new endpoints. One appealing solution for managing all these new remote users is to use Google Chromebooks. Chrome OS devices are versatile enough to perform most business and educational tasks while being an inexpensive way to add new devices where previously none might have existed.
The Google Chrome Enterprise Upgrade unlocks the management capabilities that are innate in the cloud-native Chrome OS operating system. Chrome Enterprise mobile device management allows for the definition and enforcement of security controls plus user and device orchestration—all from a centralized cloud administration panel.
Some administrators may feel overwhelmed by the myriad of configuration options available, however. This blog, delivered as a two-part series, will seek to help administrators by giving an overview of the Google Chrome OS policy settings which can be configured in the Google admin panel. It contains four sections of settings that control application settings, user settings, device settings and privacy settings. This first blog will go over the application and user settings that you may want to investigate.
This blog only includes those Google Chrome Enterprise Upgrade settings that are both relevant to security or privacy and also have default values which might warrant consideration. You will be guided through many interesting settings, but it is highly recommended to read through each available configuration option and determine how it pertains to your organization. This should not be considered an exhaustive list, as available settings and options are ever-evolving.
Not all settings will apply to every environment. For instance, allowing the ability to change background wallpapers may be relevant (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Ben Layer. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/security-controls/meeting-challenges-remote-work-chrome-os-policy-settings-part-i/