Google Workspace does more than give us access to emails, chats and documents. It gives us a place to give 3rd party apps access to our accounts for plugins to save us an extra page to log into. It also gives us a place to see what devices we have signed into and can lock, locate and even erase lost devices. This article will go through the steps necessary to see these items.
The first step is to click on your profile picture at the top right corner of your window and go to Manage Your Google Account.
2. When you get to the Google Account Home window select security
3. From this point, navigate to the security tab on the left. Here, you will see any security activities (logins) and any devices or third-party apps you have used your Google account to log into.
3a. First, let's review the devices you are logged in on. Click on Manage all devices, which will take you to a list of all your logged-in devices in two different groups: computers and Mobile devices, which include phones and tablets. When you click on one of your computers, it will show you the date you first logged in and the app you logged in through. (Most likely will be Chrome). From here, you can log out of the device if you don't recognize it. Once signed out, it will be removed from your list
3b. Next, we will review the mobile devices you are logged in to. When you click on one of your mobile devices, it will show you the location and the last time it was online. When you click on an active device, it will pull up a map with its current location and give you options to make it ring, secure it, or wipe it completely.
Play sound: will make the phone ring for 5 minutes so you can locate it.
Secure device: (*Notice* The Secure device setting is used for lost devices. As per the IT policy, please let IT know via email or the ticket system if your device is lost. We can remotely secure your device.)
Factory reset: (*Warning* Do not use the Factory reset device setting. As per the IT policy, please inform IT via email or the ticket system if your device is lost. We can remotely secure it).