SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Best practices to shape
& secure your 1:1 program for chromebooks
TECH BRIEF / MARCH 2016 / V2.6
Overview
Chrome Device Settings
Chrome User Settings
Google Drive Apps
Auditor for Google Mail and Chats by Securly
Conclusion
About Securly
Device Enrollment
Pages to Load on Startup
Safe Browsing & Malicious Sites
Proxy Settings
Force-installed Apps and Extensions
Allowed Apps and Extensions
Plugin Authorization
Incognito Mode and Browser History
Safe Search on Google
Developer Tools
Blocking Chrome:// URLs
Enforcing YouTube Restricted Mode
Securly SSL Certificate Enrollment
Guest Mode
Sign-in Restriction
Contents
2
2
2
3
4
4
5
5
5
6
6
7
7
8
8
9
9
9
11
12
12
12
A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device
safely and productively. This document addresses several aspects of the Google Apps for Education
Admin Console that are important to configure correctly for a successful 1:1 experience.
The Google Apps cloud-based policy essentially consists of:
The Device Settings can include important pieces such as Guest Mode access or Sign-in Restrictions
(both described in this paper). In order to have the Chromebooks be enrolled into the school policy,
ensure the device is enrolled into the enterprise policy.
To achieve this, go to Device Management > Chrome Management > Device Settings. Keep the
“Force devices to re-enroll into this domain after wiping” setting turned on for Organizational Units
whose devices need to be managed by the admin console.
While the User Settings are pushed down to the Chrome browser regardless of the device as soon as
the user logs in, the Device Settings are only pushed down to the Chromebook device if the device is
enrolled into the school’s enterprise policy as configured via the admin console.
Overview
Chrome Device Settings
Device Enrollment
andDevice Settings User Settings
2
Now, when your Chromebooks first arrive, your students can login with their admin console-created
credentials. This will automatically enroll the Chromebooks into the enterprise policy for the school –
without the admins needing to individually login to each of these devices.
Since Securly does MItM (Man In the Middle) SSL interception to decrypt SSL websites, Chromebooks
must have our SSL certificate installed. This is accomplished via Device Management > Network >
Certificates.
Our certificate can be downloaded here:
Securly SSL Certificate Enrollment
3
PART OF SECURLY'S 5-MINUTE SETUP!
Just like Guest Mode and Incognito Mode, this setting – if not configured correctly – can allow
students to use their personal Gmail IDs to evade auditing while browsing online.
As shown below, by using *@domain command separate list, we can prevent students from logging in
with @gmail.com.
We recommend disabling Guest Mode to allow better auditing of student activity. The Guest Mode
otherwise allows the Chromebook to be used as a guest without the district user policy in place. This
mode is similar to the Incognito Mode supported by the Chrome browser – which we also recommend
turning off in a subsequent section.
Guest Mode
Sign-in Restriction
4
We recommend using this setting to display an Acceptable Use Policy (AUP). The school's AUP will
be the first thing students see upon opening their browsers. This serves to remind students of proper
online conduct and any other school policies they are bound by.
This setting allows you to protect your students against malicious sites. While Chromebooks are
generally hardened and immune to most forms of malware, it is important to note that the User
Settings from the admin console apply to the Chrome browser even on other devices such as Win-
dows machines. Further, malicious sites can also include Phishing or other sites that involve platform
independent vulnerabilities that target the user directly – e.g. identity theft, financial theft, password
theft etc.
You can safely leave the following settings on for this section:
Chrome User Settings
Safe Browsing & Malicious Sites
Pages to Load on Startup
5
Using the “Force-installed apps and extensions” wizard, search for the filtering extension of your
choice on the Chrome Web Store, and deploy it to the organizational units that will take the devices
home.
Then you would select “Specify a custom App” with an
ID of: iheobagjkfklnlikgihanlhcddjoihkg
and the URL of: https://clients2.google.com/service/update2/crx
To make the best use of Securly, we recommend that the use of a proxy be completely disabled.
Proxy Settings
Force-installed Apps and Extensions
6
PART OF SECURLY'S 5-MINUTE SETUP!
Along with force-installing security and other instructional apps, in order to prevent students from later
installing games and other time-sinks or VPN/proxy apps, it is generally a good idea to configure this
section as follows:
A frequent user-experience issue is that certain plugins request authorization from the students before
they install or initialize. If we follow the white-listed approach of only letting plugins that are installed by
the admins run, we can go ahead and auto acknowledge these authorization requests so they are
never presented to the students.
Allowed Apps and Extensions
Plugin Authorization
7
To prepare evidence reports, we recommend keeping browser history turned on. Further, we find that
the Incognito Mode bypasses pre-installed security apps and can be used to evade district filtering
policy. The following settings are recommended.
If your district's web filter does not support Safe Search for Google, the following setting allows you to
enforce safe search directly via the Chrome policy. This applies only to the Google search engine. In
order to achieve safe search on other search engines, you need a web filter that is capable of enforcing
this on those engines.
Incognito Mode and Browser History
Safe Search on Google
8
It is recommended to use GAfE to enforce YouTube Restricted so that Chromebooks will always get
restricted mode. Using this method also allows your teachers to override blocked videos or entire
channels. To achieve this: Google Admin > Apps > Additional Google Services > YouTube.
The second two URLs stop the students from getting to the Chrome history and/or wiping the history,
should you want to keep it for purposes of archiving.
You should disable chrome://extensions and consider disabling chrome://settings. Chrome://exten-
sions allows students to start/stop extensions, while chrome://settings and other chrome:// addresses
provide settings or information unnecessary to students. In addition, we recommend disabling the two
other URLs shown in the image below. To block the URLs: Device Management > Chrome Man-
agement > User Settings > Select your OU > URL Blacklist
Developer tools allow users to debug network, script, apps and other issues. In a 1:1 program howev-
er, these could be used to circumvent district policy or gain unfair advantage over other students by
reverse engineering edtech applications that transmit insecure data or have confidential information
hidden away in the code.
We recommend disabling developer tools.
Blocking Chrome:// URLs
Enforcing YouTube Restricted Mode
Developer Tools
9
Then you may start configuring the settings for your OUs by selecting the permissions area:
First select “Content Settings” and check the box for “Signed in users in your organization can only
watch restricted and approved videos…” so that videos are restricted.
Enabled by default only when you choose the option “restrict
content for logged-in users in your organization”.
Users can only watch restricted and approved videos. This
offering is similar to the Restricted Mode setting in the YouTube
app and offers a larger corpus of videos than the Strict offering.
Moderate Restricted
YouTube access
Strict Restricted
YouTube access
10
It is possible for students to install time wasting apps via Google Drive. To stop this from occurring:
Google Admin > Apps > Google Apps > Drive > Data Access > uncheck the box for “Allow
Users to install Google Drive Apps.”
For additional information on how your teachers can approve YouTube channels and videos, please
refer to this article from Google.
Google Drive Apps
11
Users can browse all of YouTube when signed-in even
if you’ve also set network-level restrictions.
You can designate individuals or organizational units to
approve videos and channels so that signed-in users
in their organization can watch them.
Unrestricted
YouTube access
Can approve videos
and channels
Conclusion
Securly is a cloud-based web filter that provides in-school and take-home filtering across all
devices. For more information, please visit www.securly.com or email sales@securly.com
About Securly
Monitoring Google Mail and Chats for student safety is part of CIPA compliance requirements:
"The policy proposed must address… Security and safety of minors using chat rooms, email, instant
messaging, or any other types of online communications."
Traditional web filters do not address this vector. To help IT Admins deal with this issue, Securly has
introduced a FREE tool that uses Machine Learning techniques to monitor Google Mail and Chat for
instances of bullying and self-harm. At no cost to schools, Securly can also alert Principals, Guidance
Counselors and Parents of such activity.
To sign up for a free Auditor account, click here.
By following these recommendations, school IT admins and educators will be fully equipped to
shape and secure their students' online screen time on the 1:1 Chromebook deployments.
Auditor for Google Mail and Chats
by Securly
FREE
12
securly.com

Mais conteúdo relacionado

Mais procurados

iPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation StepsiPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation Stepsjrothenberger
 
MyUWO - Student Portal
MyUWO - Student PortalMyUWO - Student Portal
MyUWO - Student Portaljoshdean
 
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2KnowledgeWorking
 
IRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET Journal
 
Final schoology oral presentation use
Final schoology oral presentation useFinal schoology oral presentation use
Final schoology oral presentation usejm0439
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 

Mais procurados (12)

iPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation StepsiPads in the Classroom: Implementation Steps
iPads in the Classroom: Implementation Steps
 
MyUWO - Student Portal
MyUWO - Student PortalMyUWO - Student Portal
MyUWO - Student Portal
 
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
 
CW Reading 1.1 - Introduction
CW Reading 1.1 - IntroductionCW Reading 1.1 - Introduction
CW Reading 1.1 - Introduction
 
IRJET - Web Application for Sports Module
IRJET - Web Application for Sports ModuleIRJET - Web Application for Sports Module
IRJET - Web Application for Sports Module
 
Reading 2.1 software navigation
Reading 2.1   software navigationReading 2.1   software navigation
Reading 2.1 software navigation
 
Final schoology oral presentation use
Final schoology oral presentation useFinal schoology oral presentation use
Final schoology oral presentation use
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Driver ed
Driver edDriver ed
Driver ed
 
School children security system
School children security systemSchool children security system
School children security system
 
Learning Management System – A Modern Approach
Learning Management System – A Modern ApproachLearning Management System – A Modern Approach
Learning Management System – A Modern Approach
 

Destaque

Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNSSecurly
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product BriefSecurly
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programSecurly
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case StudySecurly
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 

Destaque (7)

Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNS
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case Study
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 

Semelhante a Best practices to shape and secure your 1:1 program for Chromebooks

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programSecurly
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfGeovaniGonalves6
 
ImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfspikecloudcloud
 
Google Apps Certified Administrator
Google Apps Certified AdministratorGoogle Apps Certified Administrator
Google Apps Certified AdministratorMohammed Sidahmed
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerSysCloud
 
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Taste
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and OPietro F. Maggi
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersHendrix Bodden
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security PrimerEnkitec
 
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUEScomptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Chromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChristopher Casal
 
Example cookie compliance audit
Example cookie compliance auditExample cookie compliance audit
Example cookie compliance auditPhil Pearce
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeSecurly
 

Semelhante a Best practices to shape and secure your 1:1 program for Chromebooks (20)

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook program
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdf
 
gControl_Overview
gControl_OverviewgControl_Overview
gControl_Overview
 
ImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdf
 
Google Apps Certified Administrator
Google Apps Certified AdministratorGoogle Apps Certified Administrator
Google Apps Certified Administrator
 
Windows10Security
Windows10SecurityWindows10Security
Windows10Security
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...
 
License
LicenseLicense
License
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and O
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education Customers
 
Pace IT - Control Panel (Part 1)
Pace IT - Control Panel (Part 1)Pace IT - Control Panel (Part 1)
Pace IT - Control Panel (Part 1)
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security Primer
 
UiPath Extensions_v3.pdf
UiPath Extensions_v3.pdfUiPath Extensions_v3.pdf
UiPath Extensions_v3.pdf
 
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUEScomptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
comptia-security-certification-bundle-exam-sy0-401 EMERSON EDUARDO RODRIGUES
 
Chromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & ProceduresChromebook Implementation: Tips & Procedures
Chromebook Implementation: Tips & Procedures
 
Example cookie compliance audit
Example cookie compliance auditExample cookie compliance audit
Example cookie compliance audit
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted Mode
 

Mais de Securly

Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly waySecurly
 
David's Law
David's Law David's Law
David's Law Securly
 
Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by SecurlySecurly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesSecurly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?Securly
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community SchoolsSecurly
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - UswestSecurly
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - UseastSecurly
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 SchoolsSecurly
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictSecurly
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolSecurly
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public SchoolsSecurly
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictSecurly
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs HardwareSecurly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?Securly
 

Mais de Securly (17)

Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly way
 
David's Law
David's Law David's Law
David's Law
 
Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by Securly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United States
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community Schools
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - Uswest
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - Useast
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School District
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community School
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public Schools
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School District
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs Hardware
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Best practices to shape and secure your 1:1 program for Chromebooks

  • 1. Best practices to shape & secure your 1:1 program for chromebooks TECH BRIEF / MARCH 2016 / V2.6
  • 2. Overview Chrome Device Settings Chrome User Settings Google Drive Apps Auditor for Google Mail and Chats by Securly Conclusion About Securly Device Enrollment Pages to Load on Startup Safe Browsing & Malicious Sites Proxy Settings Force-installed Apps and Extensions Allowed Apps and Extensions Plugin Authorization Incognito Mode and Browser History Safe Search on Google Developer Tools Blocking Chrome:// URLs Enforcing YouTube Restricted Mode Securly SSL Certificate Enrollment Guest Mode Sign-in Restriction Contents 2 2 2 3 4 4 5 5 5 6 6 7 7 8 8 9 9 9 11 12 12 12
  • 3. A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device safely and productively. This document addresses several aspects of the Google Apps for Education Admin Console that are important to configure correctly for a successful 1:1 experience. The Google Apps cloud-based policy essentially consists of: The Device Settings can include important pieces such as Guest Mode access or Sign-in Restrictions (both described in this paper). In order to have the Chromebooks be enrolled into the school policy, ensure the device is enrolled into the enterprise policy. To achieve this, go to Device Management > Chrome Management > Device Settings. Keep the “Force devices to re-enroll into this domain after wiping” setting turned on for Organizational Units whose devices need to be managed by the admin console. While the User Settings are pushed down to the Chrome browser regardless of the device as soon as the user logs in, the Device Settings are only pushed down to the Chromebook device if the device is enrolled into the school’s enterprise policy as configured via the admin console. Overview Chrome Device Settings Device Enrollment andDevice Settings User Settings 2
  • 4. Now, when your Chromebooks first arrive, your students can login with their admin console-created credentials. This will automatically enroll the Chromebooks into the enterprise policy for the school – without the admins needing to individually login to each of these devices. Since Securly does MItM (Man In the Middle) SSL interception to decrypt SSL websites, Chromebooks must have our SSL certificate installed. This is accomplished via Device Management > Network > Certificates. Our certificate can be downloaded here: Securly SSL Certificate Enrollment 3 PART OF SECURLY'S 5-MINUTE SETUP!
  • 5. Just like Guest Mode and Incognito Mode, this setting – if not configured correctly – can allow students to use their personal Gmail IDs to evade auditing while browsing online. As shown below, by using *@domain command separate list, we can prevent students from logging in with @gmail.com. We recommend disabling Guest Mode to allow better auditing of student activity. The Guest Mode otherwise allows the Chromebook to be used as a guest without the district user policy in place. This mode is similar to the Incognito Mode supported by the Chrome browser – which we also recommend turning off in a subsequent section. Guest Mode Sign-in Restriction 4
  • 6. We recommend using this setting to display an Acceptable Use Policy (AUP). The school's AUP will be the first thing students see upon opening their browsers. This serves to remind students of proper online conduct and any other school policies they are bound by. This setting allows you to protect your students against malicious sites. While Chromebooks are generally hardened and immune to most forms of malware, it is important to note that the User Settings from the admin console apply to the Chrome browser even on other devices such as Win- dows machines. Further, malicious sites can also include Phishing or other sites that involve platform independent vulnerabilities that target the user directly – e.g. identity theft, financial theft, password theft etc. You can safely leave the following settings on for this section: Chrome User Settings Safe Browsing & Malicious Sites Pages to Load on Startup 5
  • 7. Using the “Force-installed apps and extensions” wizard, search for the filtering extension of your choice on the Chrome Web Store, and deploy it to the organizational units that will take the devices home. Then you would select “Specify a custom App” with an ID of: iheobagjkfklnlikgihanlhcddjoihkg and the URL of: https://clients2.google.com/service/update2/crx To make the best use of Securly, we recommend that the use of a proxy be completely disabled. Proxy Settings Force-installed Apps and Extensions 6 PART OF SECURLY'S 5-MINUTE SETUP!
  • 8. Along with force-installing security and other instructional apps, in order to prevent students from later installing games and other time-sinks or VPN/proxy apps, it is generally a good idea to configure this section as follows: A frequent user-experience issue is that certain plugins request authorization from the students before they install or initialize. If we follow the white-listed approach of only letting plugins that are installed by the admins run, we can go ahead and auto acknowledge these authorization requests so they are never presented to the students. Allowed Apps and Extensions Plugin Authorization 7
  • 9. To prepare evidence reports, we recommend keeping browser history turned on. Further, we find that the Incognito Mode bypasses pre-installed security apps and can be used to evade district filtering policy. The following settings are recommended. If your district's web filter does not support Safe Search for Google, the following setting allows you to enforce safe search directly via the Chrome policy. This applies only to the Google search engine. In order to achieve safe search on other search engines, you need a web filter that is capable of enforcing this on those engines. Incognito Mode and Browser History Safe Search on Google 8
  • 10. It is recommended to use GAfE to enforce YouTube Restricted so that Chromebooks will always get restricted mode. Using this method also allows your teachers to override blocked videos or entire channels. To achieve this: Google Admin > Apps > Additional Google Services > YouTube. The second two URLs stop the students from getting to the Chrome history and/or wiping the history, should you want to keep it for purposes of archiving. You should disable chrome://extensions and consider disabling chrome://settings. Chrome://exten- sions allows students to start/stop extensions, while chrome://settings and other chrome:// addresses provide settings or information unnecessary to students. In addition, we recommend disabling the two other URLs shown in the image below. To block the URLs: Device Management > Chrome Man- agement > User Settings > Select your OU > URL Blacklist Developer tools allow users to debug network, script, apps and other issues. In a 1:1 program howev- er, these could be used to circumvent district policy or gain unfair advantage over other students by reverse engineering edtech applications that transmit insecure data or have confidential information hidden away in the code. We recommend disabling developer tools. Blocking Chrome:// URLs Enforcing YouTube Restricted Mode Developer Tools 9
  • 11. Then you may start configuring the settings for your OUs by selecting the permissions area: First select “Content Settings” and check the box for “Signed in users in your organization can only watch restricted and approved videos…” so that videos are restricted. Enabled by default only when you choose the option “restrict content for logged-in users in your organization”. Users can only watch restricted and approved videos. This offering is similar to the Restricted Mode setting in the YouTube app and offers a larger corpus of videos than the Strict offering. Moderate Restricted YouTube access Strict Restricted YouTube access 10
  • 12. It is possible for students to install time wasting apps via Google Drive. To stop this from occurring: Google Admin > Apps > Google Apps > Drive > Data Access > uncheck the box for “Allow Users to install Google Drive Apps.” For additional information on how your teachers can approve YouTube channels and videos, please refer to this article from Google. Google Drive Apps 11 Users can browse all of YouTube when signed-in even if you’ve also set network-level restrictions. You can designate individuals or organizational units to approve videos and channels so that signed-in users in their organization can watch them. Unrestricted YouTube access Can approve videos and channels
  • 13. Conclusion Securly is a cloud-based web filter that provides in-school and take-home filtering across all devices. For more information, please visit www.securly.com or email sales@securly.com About Securly Monitoring Google Mail and Chats for student safety is part of CIPA compliance requirements: "The policy proposed must address… Security and safety of minors using chat rooms, email, instant messaging, or any other types of online communications." Traditional web filters do not address this vector. To help IT Admins deal with this issue, Securly has introduced a FREE tool that uses Machine Learning techniques to monitor Google Mail and Chat for instances of bullying and self-harm. At no cost to schools, Securly can also alert Principals, Guidance Counselors and Parents of such activity. To sign up for a free Auditor account, click here. By following these recommendations, school IT admins and educators will be fully equipped to shape and secure their students' online screen time on the 1:1 Chromebook deployments. Auditor for Google Mail and Chats by Securly FREE 12