第3章 GWS安全
练习1
配置通用安全设定
练习2
练习3
练习4
我们可以控制用户访问谷歌服务的会话时长,从1小时到默认的14天。

只对外包人员设置更短的会话时长。
测试1
The IT manager at your organization wants to know the advantages of using 2-step verification for your organization. What should you say? (Choose 2)
It'll greatly reduce the risk of unauthorized access if a user's password is compromised
We wouldn't have to manage individual user IDs and passwords for each user
It would be a great opportunity to make sure everyone is the organization has a security key
It'll reinforce our domain’s password security by requiring our users to enter an additional code or use a security key to sign in
What are some best practices for reinforcing and monitoring the security of your domain?
All the options
Disable access to less secure apps
Set up 2-step verification
View and manage your users' security settings
Where do you go to manage your users' password strength?
Security > Password management
Reports > Security
Users > Account
Security > Password monitoring
The IT manager at your organization hasn't had a chance to explore the admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? (Choose 3)
Review a user's administrative access
Require a password change
Temporarily disable the user's login challenge for 10 minutes
Determine if the user is enrolled in 2-step verification
Your organization has decided to enforce 2-step verification in 2 weeks. What actions should you keep in mind when enforcing 2-step verification? (Choose 3)
You'll want to provide a lead time for users to enroll before enforcement
Enforcing 2-step verification will not affect your users as they can still opt-out.
When you create new user accounts after enforcement, you will want to allow them a grace period before they need to enroll otherwise they will be locked out of their accounts
You'll want to confirm that all of your users are enrolled before enforcement
SSO介绍
练习1
练习2

这里要上传证书,需要OpenSSL,而且只能在Chrome浏览器,不能用其他的。
没有证书,所以练习略过。
Secure LDAP
测试2
What of the following are true of the Secure LDAP service? (Choose 3)
User's authenticate against a local directory to gain access to Google Workspace services
It reduces maintenance as directory information is consolidated into one directory
It allows you to connect your LDAP-based applications and services to Google Workspace
Users authenticate against the Google Workspace directory to gain access to LDAP compliant applications and services
When adding a pre-integrated SAML application to your Google Workspace account, which of the following must you add/upload the Service Provider's configuration? (Choose 3)
-
Google Certificate
-
-
When using a third party IdP which of the following is disabled/hidden in Google Workspace?
Password reuse policy
Password recovery
Require password change
Password monitoring
Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?
Apps > Web and mobile apps > Add App > Search for apps. Then search for Asana from the list of predefined applications
Security > Set up single sign-on (SSO) for SAML applications and provide the necessary information
Apps > Web and mobile apps > plus sign (+) > SETUP MY OWN CUSTOM APP from the Enable SSO for SAML Application window
Apps > Settings > Third-party integrations. Then search for Asana.
App安全
Control access from the Admin SDK
API
Block access to a specific service
Create a trusted application list
Explore the GWS Marketplace
## 练习1

练习2
练习3
测试3
What happens to already installed applications if you block API access from the Security > API Permissions section?
Already installed applications that use the blocked
API will continue to work until the application needs a new OAuth token
Already installed applications will stop working and OAuth tokens will be revoked
Already installed applications that use the blocked
API will continue to work indefinitely
Already installed applications that use the blocked
API will continue to work until the user next signs in to Google Workspace
What is the expected behavior when a user tries to install a Marketplace app that has not been allowed?
Users can not attempt to install an application that is not on the allowlist because they only see allowed apps in the Marketplace
When the user attempts to install the app they will see a message advising that the app cannot be installed because it has not been allowed
Users can install an app that is not in the allowlist but they cannot grant it access to their data so it will not work
The app will appear to install, but it will not function correctly.
You have been asked to create a allowlist of Marketplace apps to restrict which apps a user can install onto their devices. What must you do first?
Change the Marketplace settings to allow users to install only allowed applications from Google Workspace Marketplace
Complete a Domain install for each application that you want to allow
Get your users to Install the Marketplace allowlist app onto each device
Add the names of all the trusted applications to each user's device policy
Your organization wants to prevent any external application from accessing Gmail and Drive data. How would you ensure such access is prevented?
Disable
API access from the Gmail and Drive service settings
From Security > Access and Data Control > API Controls, ensure Trust domain owned apps is enabled. From Security > Access and Data Control > API Controls > MANAGE GOOGLE SERVICES, restrict access to the Gmail and Drive services.
From Security >
API Permissions, ensure Trust domain owned apps is disabled. From Security >
API Permissions > MANAGE GOOGLE SERVICES, restrict access to the Gmail and Drive services.
Disable Gmail and Drive
API access from the top level organization settings
练习1
练习2
Reporting>User reports>Accounts,使用密码强度来筛选,查看结果
Security Center
Security best practice
Analytics
Actionable insights
还可以查看各类设置的状态,比如
Automatic email forwarding
Device encryption
Drive sharing settings
查看各类报警,比如
External file share activity
Authenticated messages
Suspicious device activities
Failed password attempts
Dashboard里则有各种图表,另外,还可以查看Log
Access device-log data
Access data about Gmail messages
Access Gmail log data
Access Drive log data
举例来说,我们可以通过Query来确认,是否有如下行为
Delete specific messages
Mark messages as spam or phishing
Send message to quarantine
Send message to users' inboxes
这些与MS家的EDR中的Query有些类似,要学会写Query语句
测试4
Which of the following statements is NOT TRUE about the alert center?
The alert center consolidates all admin created email alerts into one place
The alert center enables you to view alerts and alert details directly in the admin console
The alert center includes additional in-depth details that enable you to take action to resolve numerous issues that might affect your organization
When examining messages in the security investigation tool what actions can you apply to a message? (Choose 3)
Delete message
Mark message as spam
Forward tot self
View header
You have been asked by your CEO to provide a list of users who have not yet enrolled into 2-step Verification. Where can you find that information?
Access Transparency Audit log
Users Security log
The Admin Audit log
Users Account Activity Report