School Security Checklist
Admin implementation checkout

Configure the stack in the order it actually has to work.

Start with Google Admin and Chrome policy, then Mosyle Mac enforcement, then GoGuardian filtering, then district-level hardening evidence. Checkboxes save in this browser.

Role matrix

Set the default posture by audience.

Use this as the top-level policy intent before configuring individual Admin console settings. Student restrictions should be explicit; staff and admin settings should be separate so adults are not accidentally treated as under-18 users.

All Users

  • Use managed accounts only for school services.
  • Keep Chrome managed and visible in chrome://policy.
  • Require Safe Browsing.
  • Review third-party app access instead of leaving OAuth open-ended.
  • Use least-privilege groups and clean OUs.

Students

  • Designate under 18 unless clearly 18+.
  • Disable guest, incognito, unmanaged extensions, and personal Chrome profiles.
  • Block unconfigured third-party apps by default.
  • Limit Drive external sharing and public link exposure.
  • Apply GoGuardian filtering and non-overridable safety policy.

Staff

  • Designate staff OUs as 18+ when appropriate.
  • Require MFA and managed Chrome sign-in.
  • Allow only approved extensions and apps.
  • Permit external sharing only where school work requires it.
  • Allow proxy app requests for teachers only if the approval process is staffed.

Admins

  • Use separate admin accounts, not daily-use mail accounts.
  • Require phishing-resistant MFA/security keys for super admins.
  • Keep two monitored break-glass accounts.
  • Use delegated roles and avoid broad super admin assignment.
  • Review Security Center, audit logs, and alert rules on a schedule.

Step 1

Google Admin and Chrome settings

Set identity, Chrome browser behavior, extensions, and account protections before relying on GoGuardian visibility.

0/0

Google Admin - All Users

  • Clean OUs and configuration groups before policy.
  • Managed Chrome browser policy visible in chrome://policy.
  • Safe Browsing, Gmail safety, OAuth app control, Drive sharing rules.
  • Core services only unless Additional Services are approved.

Google Admin - Students

  • Designate under 18 unless confirmed otherwise.
  • Disable guest, incognito, personal profiles, and unmanaged extensions.
  • Block unconfigured third-party apps; review requests and consent.
  • Restrict Drive external/public sharing and Groups access.

Google Admin - Staff

  • Mark staff/faculty OUs as 18+ when appropriate.
  • Require MFA and managed Chrome sign-in.
  • Use approved extension allowlist, not open extension install.
  • Allow external sharing and proxy app requests only with workflow ownership.

Google Admin - Admins

  • Separate admin accounts from daily mail accounts.
  • Security keys/phishing-resistant MFA for super admins.
  • Delegate roles instead of broad super admin access.
  • Review Security Center, audit logs, app access, and alerts weekly.

Step 2

Mosyle settings for Mac

Use Mosyle for device ownership, macOS controls, FileVault, app deployment, and local account enforcement.

0/0

Mosyle - All Users

  • All school Macs assigned through Apple School Manager and ADE.
  • MDM profile required and non-removable on school-owned devices.
  • FileVault enabled with personal recovery key escrow.
  • Chrome, productivity apps, PPPC profiles, printers, and certificates deployed by Mosyle.

Mosyle - Students

  • Standard user only; no permanent local admin.
  • Block unapproved browsers and app installation paths.
  • Disable guest login and unnecessary sharing services.
  • Apply stricter screen lock, AirDrop, iCloud, and external media rules by grade.

Mosyle - Staff

  • Standard user by default with temporary elevation workflow.
  • Mosyle Auth/SSO where licensed; sync local account with identity provider.
  • Patch apps and macOS automatically with clear deferral windows.
  • Broader app catalog scoped by staff group, not unmanaged installs.

Mosyle - Admins

  • Separate IT admin accounts and audit local admin inventory.
  • Weekly reports for FileVault, OS version, MDM check-in, and app compliance.
  • Use Mosyle hardening/compliance or NIST mSCP as benchmark reference.
  • Clear Activation Lock and rotate recovery keys during reassignment.

Step 3

GoGuardian settings

Use GoGuardian for student web safety, classroom focus, reporting, and filtering policy. Keep it aligned with Google OUs and Mosyle browser controls.

0/0

GoGuardian - All Users

  • Deploy required GoGuardian components through Google Admin and Mosyle.
  • Sync users, OUs, classes, and roles from the authoritative source.
  • Document when monitoring/filtering applies on campus and off campus.
  • Keep reports and audit access role-restricted.

GoGuardian - Students

  • Root non-overridable safety policy for CIPA categories.
  • Grade-band policies for elementary, middle, and high school.
  • Block proxies, VPNs, anonymizers, malware, phishing, explicit content, and bypass tools.
  • Use current YouTube controls and category updates to reduce workarounds.

GoGuardian - Staff

  • Teacher access limited to assigned classes and OUs.
  • Teacher Override only for approved class-level policies.
  • Use Scenes Policy Checker and URL checking before lessons where available.
  • Train teachers on privacy, override boundaries, and support workflow.

GoGuardian - Admins

  • Review policy templates before applying elementary/middle/high baselines.
  • Review Smart Alerts, reports, unblock requests, and bypass attempts weekly.
  • Keep GoGuardian App current where used; track 2026 release notes.
  • Audit Super User and "log in as" privileges.

Step 4

School hardening and evidence

Use CISA and CoSN for K-12 program priorities, and NIST mSCP for Mac-specific security baseline generation and validation.

0/0

Source library

Official guidance links.

These are the references used by the checklist. Keep vendor-specific implementation details current from these pages.