Configure the stack in the order it actually has to work.
Start with Google Admin and Chrome policy, then Mosyle Mac enforcement, then GoGuardian filtering, then district-level hardening evidence. Checkboxes save in this browser.
Implementation apps
Jump to the platform you are configuring.
Google Admin
Workspace for Education, Chrome browser, extensions, Drive, Gmail, age-based access, OAuth, and admin security.
Mosyle Mac
Apple School Manager enrollment, FileVault, macOS updates, standard users, restrictions, app patching, and compliance.
GoGuardian
Extension deployment, filtering policy, teacher override, grade-band policy, YouTube controls, off-campus filtering, and reporting.
Role matrix
Set the default posture by audience.
Use this as the top-level policy intent before configuring individual Admin console settings. Student restrictions should be explicit; staff and admin settings should be separate so adults are not accidentally treated as under-18 users.
All Users
- Use managed accounts only for school services.
- Keep Chrome managed and visible in
chrome://policy. - Require Safe Browsing.
- Review third-party app access instead of leaving OAuth open-ended.
- Use least-privilege groups and clean OUs.
Students
- Designate under 18 unless clearly 18+.
- Disable guest, incognito, unmanaged extensions, and personal Chrome profiles.
- Block unconfigured third-party apps by default.
- Limit Drive external sharing and public link exposure.
- Apply GoGuardian filtering and non-overridable safety policy.
Staff
- Designate staff OUs as 18+ when appropriate.
- Require MFA and managed Chrome sign-in.
- Allow only approved extensions and apps.
- Permit external sharing only where school work requires it.
- Allow proxy app requests for teachers only if the approval process is staffed.
Admins
- Use separate admin accounts, not daily-use mail accounts.
- Require phishing-resistant MFA/security keys for super admins.
- Keep two monitored break-glass accounts.
- Use delegated roles and avoid broad super admin assignment.
- Review Security Center, audit logs, and alert rules on a schedule.
Step 1
Google Admin and Chrome settings
Set identity, Chrome browser behavior, extensions, and account protections before relying on GoGuardian visibility.
Google Admin - All Users
- Clean OUs and configuration groups before policy.
- Managed Chrome browser policy visible in
chrome://policy. - Safe Browsing, Gmail safety, OAuth app control, Drive sharing rules.
- Core services only unless Additional Services are approved.
Google Admin - Students
- Designate under 18 unless confirmed otherwise.
- Disable guest, incognito, personal profiles, and unmanaged extensions.
- Block unconfigured third-party apps; review requests and consent.
- Restrict Drive external/public sharing and Groups access.
Google Admin - Staff
- Mark staff/faculty OUs as 18+ when appropriate.
- Require MFA and managed Chrome sign-in.
- Use approved extension allowlist, not open extension install.
- Allow external sharing and proxy app requests only with workflow ownership.
Google Admin - Admins
- Separate admin accounts from daily mail accounts.
- Security keys/phishing-resistant MFA for super admins.
- Delegate roles instead of broad super admin access.
- Review Security Center, audit logs, app access, and alerts weekly.
Step 2
Mosyle settings for Mac
Use Mosyle for device ownership, macOS controls, FileVault, app deployment, and local account enforcement.
Mosyle - All Users
- All school Macs assigned through Apple School Manager and ADE.
- MDM profile required and non-removable on school-owned devices.
- FileVault enabled with personal recovery key escrow.
- Chrome, productivity apps, PPPC profiles, printers, and certificates deployed by Mosyle.
Mosyle - Students
- Standard user only; no permanent local admin.
- Block unapproved browsers and app installation paths.
- Disable guest login and unnecessary sharing services.
- Apply stricter screen lock, AirDrop, iCloud, and external media rules by grade.
Mosyle - Staff
- Standard user by default with temporary elevation workflow.
- Mosyle Auth/SSO where licensed; sync local account with identity provider.
- Patch apps and macOS automatically with clear deferral windows.
- Broader app catalog scoped by staff group, not unmanaged installs.
Mosyle - Admins
- Separate IT admin accounts and audit local admin inventory.
- Weekly reports for FileVault, OS version, MDM check-in, and app compliance.
- Use Mosyle hardening/compliance or NIST mSCP as benchmark reference.
- Clear Activation Lock and rotate recovery keys during reassignment.
Step 3
GoGuardian settings
Use GoGuardian for student web safety, classroom focus, reporting, and filtering policy. Keep it aligned with Google OUs and Mosyle browser controls.
GoGuardian - All Users
- Deploy required GoGuardian components through Google Admin and Mosyle.
- Sync users, OUs, classes, and roles from the authoritative source.
- Document when monitoring/filtering applies on campus and off campus.
- Keep reports and audit access role-restricted.
GoGuardian - Students
- Root non-overridable safety policy for CIPA categories.
- Grade-band policies for elementary, middle, and high school.
- Block proxies, VPNs, anonymizers, malware, phishing, explicit content, and bypass tools.
- Use current YouTube controls and category updates to reduce workarounds.
GoGuardian - Staff
- Teacher access limited to assigned classes and OUs.
- Teacher Override only for approved class-level policies.
- Use Scenes Policy Checker and URL checking before lessons where available.
- Train teachers on privacy, override boundaries, and support workflow.
GoGuardian - Admins
- Review policy templates before applying elementary/middle/high baselines.
- Review Smart Alerts, reports, unblock requests, and bypass attempts weekly.
- Keep GoGuardian App current where used; track 2026 release notes.
- Audit Super User and "log in as" privileges.
Step 4
School hardening and evidence
Use CISA and CoSN for K-12 program priorities, and NIST mSCP for Mac-specific security baseline generation and validation.
Source library
Official guidance links.
These are the references used by the checklist. Keep vendor-specific implementation details current from these pages.