1 of 65

goo.gle/use-edu-workspace

40+ ways �to use Google Workspace for Education Plus

2 of 65

This deck is a selection of popular use cases that are available if you’re using Google Workspace for Education Plus . These tools can help increase data security , teacher efficiency , student engagement , schoolwide collaboration ,and more.

The deck is organized by feature , followed by common use cases and simple how-to instructions for using the feature. Review the full deck and see how much you can do Google Workspace for Education Plus.

Classroom user guide for administrators

Administrators can learn how to create organizational groups, set permissions, and access audit logs and reports.

Get started with Google for Education

Explore our comprehensive set of resources to get you up and running quickly. Get help for Google for Education products, including links to the help center, help forums, our partners, and specialized support for IT administrators.

Companion resources

Explore other resources to �help support your institution.

Professional development

Learning never stops. Explore free-of-charge technology training and resources for educators.

Classroom user guide for teachers

Help teachers understand how to set up their classes, organize coursework, grade, provide rich feedback, and more.

Explore 100+ ways to use Gemini and NotebookLM in education for expert tips and guidance on how schools can getting started with gen AI.

Compare Google Workspace for Education editions

Add the enhanced capabilities you need for your institution.

How to use �this resource

3 of 65

Customize Google Workspace for Education � to meet the needs of your institution

Offering summary

1. Choose an edition for your entire domain

Education Fundamentals

Education Plus

A suite of innovative features and AI-driven �tools to create more personalized and engaging learning experiences on a secure platform.

Available at no cost for qualifying institutions

An all-in-one solution with advanced security �and analytics, premium teaching and learning features, and additional AI-driven tools.

$6/year/license (priced for all users)

Google AI Pro for Education

Teaching and Learning

Workspace Additional Storage

Endpoint Education Upgrade

Google AI Pro for Education

Workspace Additional Storage

Optional

2. Provide premium functionality for specific �users with add-ons

4 of 65

Add premium functionality for specific users �with Google Workspace for Education add-ons

Google Workspace for Education add-ons

Teaching and Learning

Enhance instructional impact with powerful AI-driven tools you can rely on. Enrich and personalize learning, create classroom efficiency, and enable teaching and learning from anywhere .

Google AI Pro for Education

Unleash your potential with our premium AI solution for education, integrating Gemini into the Workspace apps you’re already using every day - like Docs and Gmail - and providing expanded access to premium models and features in the Gemini app and NotebookLM.

Endpoint Education Upgrade

Get advanced mobile device management with enhanced security controls to help you manage devices and laptops that access your institution’s data.

Workspace Additional Storage

Meet your institution’s storage needs with Drive. Purchase as much additional pooled storage as you need – and easily manage it across your institution.

5 of 65

Advanced security

Protect your education community with advanced �tools that provide automatic protections, centralized �visibility and controls, and powerful analytics.

Your admin guide to strategic use cases �with Education Plus

Management and controls

Use granular management and access controls to easily provision accounts, enforce security policies, and monitor user activity across your educational domain.

Teaching and learning �tool management

Seamlessly manage teaching �and learning tools with flexible controls that empower you to enable add-ons and tailor access for your educators �and students.

6 of 65

Advanced

security

Get more control across your domain with proactive security tools that help you defend against threats, analyze security incidents, and protect student and faculty data.

7 of 65

Use cases

Security �dashboard

What is it?

The security dashboard is a centralized location where you can see an overview of your various security reports. By default, each security report panel displays data from the last seven days. You can customize the dashboard to view data from today, yesterday, this week, last week, this month, last month, or a specific number of days ago (up to 180 days).

8 of 65

Volume of spam

Suspicious attachments

And more

Spam

Phishing

Malware

The security dashboard provides a visual representation of activity across your Google Workspace for Education environment, including:

I want to be able to control excessive and unnecessary emails while reducing security threats for my school.”

Additional resources

9 of 65

External�file sharing

Number of sharing events to users outside of your domain for a specified time period

Number of views an external file received over a specified time period

Use the file exposure report from the security dashboard to see external file sharing metrics for your domain, including:

  • Files exposure report

Additional resources

I want to see external file sharing activity to prevent against sensitive data being shared with third parties.”

10 of 65

Third-party applications

Auth grants permission to third-party services to access a user’s account information without exposing the user’s password. You may want to limit which third-party apps have access.

Use the OAuth grant activity panel to monitor grant activity by app, scope, or user and to update grant permissions.

Manage access to unconfigured third-party apps, review the third-party apps that users designated as under 18 have requested access to, and grant access to apps.

Use the OAuth grant activity report from the security dashboard to monitor which third-party applications are connected to your domain and what data they can access.

I want to see the third-party applications that have access to my domain’s data.”

Additional resources

11 of 65

Phishing attempt

User reports allow you to view how users are marking their messages – whether they’re spam, not spam, or phishing – for a specific time period.

You can customize the graph to provide details about only certain types of messages – for example, filtering by whether the messages were sent internally or externally, by date range, and so on.

The user reports panel on the security dashboard allows you to view messages that were flagged as phishing or spam during a specific time period. You can view information about emails flagged as phishing, such as recipients and opens.

Users reported a phishing attempt. I want to be able to track when the phishing email came in, what exactly the email was that my user received, and what risk

they were exposed to.”

Additional resources

12 of 65

Security �Health page

What is it?

The security health page is a centralized location where you can see a comprehensive overview of the security posture of your Google Workspace environment, and it allows you to compare your configurations against recommendations from Google to proactively protect your organization.

Use cases

13 of 65

Security best practices

Recommendations for potential �risk areas in your domain

Recommendations on optimal settings �to increase security effectiveness

Direct links to the settings

Additional information and support articles

Open up the security health page to receive �best practices on security policies with:

Point me in the direction

of best practices or recommendations on how to set up security policies.”

Additional resources

14 of 65

Recommendations

for risk areas

Quickly identify areas of potential risk in your domain

Get recommendations on optimal settings to increase your security effectiveness

Read additional information and support articles on the recommendations

The security health page reviews your security configuration and flags recommended changes. On the security health page, you can:

I want a digestible snapshot of my domain’s security settings with actionable recommendations to address potential risk areas.”

Additional resources

15 of 65

Use cases

Investigation tool

What is it?

It’s a tool that helps you to identify, triage, and take action on security and privacy issues in your domain .

16 of 65

Abusive �material sharing

Search for documents by name, actor, owner, and more

Take action by changing file permissions or deleting the file

Search content that users create in Google Workspace and content they upload to Drive

View all of the log information related to that document

  • Date of creation
  • Who owns it, who viewed it, and who edited it
  • When it was shared

Drive log events within the investigation tool can help you find, track, and isolate or delete an undesirable file within your domain. By accessing Drive log events data , you can:

I know there’s a file containing abusive material being shared. I want to know who created it, when it was created, who shared it with whom, and who made edits to it – and I want to delete it.”

Additional resources

17 of 65

Accidentally shared files

Search for documents by name, actor, owner, and more

View all of the log information related to the document, �including who viewed it and when it was shared

Take action by changing permissions and disabling �download, print, and copy

Drive log events within the investigation tool can help you find, track, and isolate or delete an undesirable file within your domain. By accessing Drive log events data , you can:

There was a file shared accidentally with a group that should NOT have access to it. I want to remove their access to it.”

Additional resources

18 of 65

Email triage

Search for specific emails by subject, message ID, attachment, sender, and the like

View email details, including author, recipient, opens, �and forwards

Take action based on search results – actions on Gmail messages include delete, restore, mark as spam or �phishing, send to inbox, and send to quarantine

The Gmail logs within the investigation tool can help you identify and act on dangerous or abusive emails within your domain. By accessing your Gmail logs, you can:

Somebody sent an email that should not have been sent. We want to know who they sent it to, if the recipients opened it, if they responded, and we want to delete the email. I also want to know the content of the email.”

Additional resources

19 of 65

Phishing and

malware emails

Search email messages for specific content, including attachments

View information about specific emails, including recipients and opens

View the messages and the thread to determine if they’re malicious

Scan email attachments for detailed threat context and reputation data with VirusTotal reports

Take action by marking messages as spam or phishing, �sending to a specific inbox or quarantine, or deleting the

A phishing or malware email was sent to users. We want to see if users clicked on the link in the email or downloaded the attachment, because doing so has potential to expose the users and our domain to harm.”

Additional resources

Opening the investigation tool, specifically the Gmail logs, can help you find and isolate malicious emails within your domain. By accessing your Gmail logs, you can:

20 of 65

Stopping �malicious actors

Identify and investigate attempts to hijack user accounts in �your organization

Monitor which 2-step methods users in your organization are using

Learn more about failed sign-in attempts by users in your organization

Create activity rules with the investigation tool : Automatically �block messages and other malicious activities from specific actors

Protect high-profile users further with the � Advanced Protection Program

Restore or suspend users

A bad actor is constantly targeting high-profile users �within my domain, while I play whack-a-mole trying to �stop them.

How can I stop this?”

Additional resources

The user log within the investigation tool can help you:

21 of 65

Gaining deeper

security insights

Gain additional security insights into Gmail and Chrome log events

Analyze suspicious files, URLs, domains, and IP addresses

Access crowdsourced details on why an attachment or �website might be considered risky

Get assistance on decision-making as you address �security concerns

Students are staying on Google Meet calls after their class has ended. I need a way to end the Meet call for all everyone to prevent learning disruptions.”

Additional resources

VirusTotal reports expand on the results of a security investigation by providing a comprehensive overview, �allowing admins to check the security of a particular domain, file attachment, IP address, or URL based on crowdsourced insights.

22 of 65

Preventing unsupervised virtual meetings

The meeting will end for all users currently in the meeting, including those in breakout rooms

Prevents anyone from attending future instances of �that meeting without the host being present

Students are staying on Google Meet calls after their class has ended. I need a way to end the Meet call for everyone to prevent learning disruptions.”

Additional resources

Google Workspace administrators can use the End meeting for all action in the investigation tool to remove all users from any meeting within your organization. For their individual Google Meet calls, meeting hosts also have this ability.

23 of 65

Management

and controls

Use granular management and access controls to easily provision accounts, enforce security policies, and monitor user activity across your educational domain.

24 of 65

Use cases

Domain management and controls

Admins have access to Google Workspace advanced tools to manage their organization’s data, set controls, and monitor usage.

25 of 65

Control access to �Google services by age

To make it easier to tailor experiences for your users, you can �set access to some Google services based on age. The default age-based access setting depends on your institution type.

How can I limit student access to certain �Google tools?”

Primary and secondary education institutions: All users designated as under the age of 18 get an age-restricted experience for some Google services.

Higher education institutions: Users designated as 18 and older have no additional restrictions on Google services. However, administrators in these organizations are required to identify any users under the age of 18.

Users designated as under the age of 18 have restrictions in �some Google services when they’re signed in to their Google Workspace for Education account. Also, some services aren’t available to users under the age of 18.

Additional resources

26 of 65

Create usage

dashboards and reports

With BigQuery export and Looker Studio template ,admins can use Classroom activity logs to create custom dashboards and reporting with analytics tools like Looker Studio and third-party visualization partners integrated into BigQuery.

How can I understand Classroom usage �across my domain?”

Export Classroom log data from the Admin console to BigQuery and Looker Studio.

View usage and adoption reports quickly across your entire domain. Pinpoint who removed a student from a class, who archived a class on a certain date, and more.

Understand overarching trends and take action faster with customizable Looker Studio dashboard templates.

Additional resources

27 of 65

Automatically populate �department groups

Dynamic groups allow administrators to update schoolwide group membership with custom criteria.

How can I automate group membership so that every time a new educator joins our institution, they are included in my ‘educator’ email list?”

Create dynamic groups that manage membership automatically

Keeps groups up to date based on a membership query you create

Use dynamic groups as:

  • Email and distribution lists
  • Moderated groups and collaborative inboxes
  • Security groups

Additional resources

28 of 65

Manage �endpoint �devices

Using enterprise endpoint management can give you more control over your organization’s data through mobile devices. Restrict mobile device features, require device encryption, manage apps on Android devices or iPhones and iPads, and even wipe data from a device.

I need a way to manage and push policies to all types of devices – iOS, Windows 10, etc. – across my district, not just Chromebooks, especially if one is compromised.”

You can approve, block, unblock, or delete devices from the �Admin console.

If someone loses a device or is disenrolled from the school, you can wipe their account, their profile, or even all data from their specific managed mobile device. This data would still be available on a computer or web browser.

Additional resources

29 of 65

Manage �Microsoft Windows devices

Some of my educators use Windows 10 devices. How can I manage all of my institution’s devices in �the same place?”

Manage and secure your institution’s Windows 10 devices through the Admin console, just as you do for Android, iOS, and Chrome devices.

Enable single sign-on so users can more easily access Google Workspace on their Windows 10 devices

Ensure Windows 10 devices used to access Google Workspace are updated, secure, and within compliance standards by managing devices on the Admin console

Wipe a Windows 10 device, push configuration updates to it, and more from the cloud

Additional resources

30 of 65

Custom �settings for �Windows 10 devices

Using Google’s Windows device management, �admins can add custom settings to their fleet’s devices.

How can I set up �Wi-Fi profiles on my Windows 10 devices?”

Control custom device settings from the Admin console

Apply settings across:

  • De vice management
  • Security
  • Hardware and network
  • Software
  • Privacy

Additional resources

31 of 65

Automate �updates for �Windows 10 devices

Specify how and when your institution’s Windows 10 devices receive security updates and other important downloads through the Windows automatic updating service.

I want to ensure the Windows 10 devices in my fleet receive the latest updates.”

Set up notifications to download updates from the �Windows Update control panel, set hours where update �reboots are not scheduled, and much more

Apply settings to your entire institution or to specific �organizational units

Changes can take up to 24 hours, but typically �happen more quickly

Additional resources

32 of 65

Did you know?

Schools can access Gemini free of charge with added data protection �at gemini.google.com.

To empower educators and staff with generative AI across Gmail, Docs, Classroom, Slides and more – and access to Google AI Pro using our most capable AI models widely available today – upgrade to Google Workspace with Gemini .

Gemini

What is it?

Gemini is your AI-powered assistant for education. Chat with the Gemini app to brainstorm ideas for planning and content, answer questions quickly, summarize content and more – all in �a private and secure environment.

Use cases

33 of 65

Control �who uses Gemini

Institutions with Education Plus licenses have access to the Gemini app as a Core Service, which provides additional admin controls and reporting and is governed by the Google Workspace for Education Terms of Service. Admins can determine which users in their domain have access to this tool.

How can I grant certain users access to �gen AI tools?”

Gemini is included with all Google Workspace for Education editions free of charge with added data protection, and can be accessed at gemini.google.com.

Chats and uploaded files are not reviewed by anyone to improve AI models, used to train AI models, or shared with other users or institutions.

Students of all ages can now use Gemini. Strict content policies prevent users under 18 from seeing inappropriate or harmful responses.

Gemini onboarding for youth includes an AI literacy video, endorsed by ConnectSafely and the Family Online Safety Institute (FOSI), with tips on using gen AI responsibly.

Additional resources

34 of 65

Did you know?

Schools can access Gemini free of charge with added data protection �at gemini.google.com.

To empower educators and staff with generative AI across Gmail, Docs, Classroom, Slides, and more – and access to Google AI Pro using our most capable AI models widely available today – upgrade to Google Workspace with Gemini .

Gemini in Classroom

What is it?

Gemini in Classroom is a suite of gen AI tools that acts as a collaborative partner, supporting educators throughout their workflows so they can focus on the art of teaching, rather than administrative tasks. With access to over 35 Google AI tools, educators can quickly go from idea �to instruction and provide AI learning experiences for students.

Use cases

35 of 65

Control who �uses Gemini �in Classroom

Gemini in Classroom is on by default for users designated as �18 years of age and over in your domain. You can switch off access for the entire domain, or you can restrict access �to certain users.

How can I adjust �access to Gemini �in Classroom?”

Gemini in Classroom is available with all Google Workspace for Education editions

Additional resources

36 of 65

Did you know?

Schools can access NotebookLM free of charge with added data protection at notebooklm.google.com.

NotebookLM

What is it?

NotebookLM is your personalized AI expert, based only on the information that matters most to you. Upload your sources and NotebookLM instantly becomes an expert in them.

Use cases

37 of 65

Control �who uses NotebookLM

How can I manage access to NotebookLM?”

Google Workspace for Education users have access to NotebookLM with data protection – free of charge

NotebookLM is available to users of all ages

Data you enter into NotebookLM – including your source uploads, queries, and responses – is not human-reviewed or used to train AI models

  • Manage access to NotebookLM

Additional resources

38 of 65

Streamline workflows

Access advanced tools to help you streamline internal workflows, better manage files and storage, and more easily get signatures and approvals from staff and parents.

Use cases

39 of 65

Approve �internal �documents

With Approvals , your school community can send documents �in Google Drive through a formal approval process.

The science department is developing new curriculum.

How can they ensure their curriculum proposal is approved by all �department leaders?”

Reviewers can approve, reject, or leave feedback on the documents directly within Drive, Docs, and other Google Workspace apps

Manage approvals on a contract or new hire, approve changes for a document before publication, and more

  • Manage approvals

Additional resources

40 of 65

Send signature requests and �sign documents

With eSignature , your school community can create documents for signatures and send signature requests right in Google Docs and Google Drive.

I want to consolidate my tech stack. Can I use Google Workspace to manage permission slips, contracts, and other forms for my school?”

Request and add signatures to official contracts, directly in Docs or Drive, without having to switch tabs

Quickly request signatures, check the status of pending signatures, and find completed contracts

Create a new copy of the contract for each request so that you can use your document as a template and initiate multiple eSignature requests.

Additional resources

41 of 65

Manage �storage across

your domain

Institutions with Google Workspace for Education have a baseline of 100 TB of pooled storage; that’s enough storage for approximately over 100 million documents, 8 million presentations, or 400,000 hours of video. Manage pooled Drive storage to ensure your institution is using storage effectively.

I want to implement a �new storage management plan across my domain.”

Use administrator tools, reporting, and logs to:

  • Understand how much storage you’re using
  • Set storage limits
  • Identify accounts that use a disproportionate amount of storage

The Teaching and Learning add-on and Education Plus offer additional �storage capacity on top of the provided baseline storage:

  • Add 100 GB per license to the shared pool with the Teaching and �Learning add-on
  • Add 20 GB per license to the shared pool with Education Plus

Additional resources

42 of 65

Find files

more easily

With Cloud Search, educators in your institution can quickly find content throughout Google Workspace and third-party apps.

I need to track down permission slips submitted through Gmail, Chat, and Docs.

How can I find these files across my domain?”

Find the information you need from anywhere, using your laptop, mobile phone, or tablet

Search across Google Workspace apps – such as Drive, Contacts, and Gmail – and third-party data sources

Additional resources

43 of 65

Organize documents across your domain

Drive labels help users find, organize, and apply policies throughout their domain. Admins can create and manage �Drive labels to prevent file misuse and ensure student �data meets compliance requirements.

I want to apply sensitivity labels to my institution’s files to align with compliance requirements, prevent misuse, and improve file organization.”

Labels are metadata that can help organize sensitive education �files likes IEP, DOD, or compliance documents.

Only admins can create, define the structures of, and publish labels. Users in your organization can apply labels to the files they edit and set the field values.

Drive labels can be used to support automated � data loss prevention .

  • Manage Drive Labels

Additional resources

44 of 65

Data security and compliance controls

Keep your domain’s data protected with advanced controls that let you scan Gmail for potential threats, manage how your users share files, place specific limits on the apps your users can access, and more.

Use cases

45 of 65

Scan Gmail attachments for threats

Email attachments can include malicious software. To identify these threats, Gmail can scan attachments in Security Sandbox. Attachments identified as threats are sent to the �spam folder.

How can I better protect my domain against zero-day malware and ransomware threats?”

Detect malware by virtually “executing” it in a private, secure sandbox environment and analyzing the side effects to determine malicious behavior

Scan Microsoft Word, PowerPoint, PDF, and ZIP files – and more

Enable scanning for the entire domain, or create scanning rules based on specific conditions like sender, domain, and more

Additional resources

46 of 65

Create audiences for internal �file sharing

Target audience settings help improve the security of your organization’s data by reducing the potential for users to accidentally overshare files.

My staff is accidentally sharing documents with our entire organization, putting sensitive data at risk.

How can I help limit their sharing to a smaller, more relevant group?”

Ensure files are shared with just the right people, like a specific team or department

Target audiences are groups of people that admins can recommend users share their items with

Admins can add target audiences to users’ sharing settings to encourage sharing with a more specific audience

Available in Google Drive, Docs, and Chat

Additional resources

  • Create a target audience

47 of 65

Restrict �file sharing

Drive trust rules enable admins to set rules to control who can get access to Google Drive files, helping ensure the privacy of institutional data. Policies can apply to individual users, groups, organizational units, and domains.

How can I prevent my secondary students from sharing documents with primary students?”

Secure sensitive information and maintain compliance with industry standards and regulations.

Restrict internal or external domain sharing, or both. Admins can create a trust rule to only allow students to share Drive files within �your organization.

“Trust rules,” once enabled, replace existing “Sharing options” in the Google Drive admin controls.

Additional resources

48 of 65

Google Workspace

app restrictions

Using Context-Aware Access , you can create granular access-control policies for Google Workspace and third-party SAML (Security Assertion Markup Language) apps based on attributes such as user identity, location, device security status, and IP address. You can even restrict access to apps from outside the network.

I want to limit access to specific apps when users are on our network.”

You can apply Context-Aware Access policies to the core Google Workspace for Education services

For example, only allow access to Google Workspace apps from institution-issued devices or only allow access to Drive if a user storage device is encrypted

Set rules for how users and apps can access Google Workspace data through Google APIs

Additional resources

49 of 65

Data �regulations

As an admin, you can choose to store data in a specific geographic location, either the United States or UK/Europe, by using a data region policy .

With Education Plus and Education Standard, you can choose one data region for some of your users or assign different data regions to specific departments. You can also monitor the progress of data region migrations.

Put users in an organizational unit to apply the data region policy by department, or put them in a configuration group to apply the policy across or within departments.

Users who are not assigned an Education Standard or Education Plus license are not covered by data region policies.

My student, faculty, and staff data must remain in the EU due to regulatory laws.”

Additional resources

50 of 65

Grant �regulations

As an administrator, you can choose to store your faculty’s research in a specific geographic location, either the United States or Europe, by using a data region policy .

Data region policies cover the primary data at rest, including backups, for the majority of Google Workspace for Education Core Services – listed in this Help Center article

Consider the trade-offs before setting a data region policy, as users outside the region where their data is located might experience higher latency in some cases

My faculty’s research must remain in the United States due to grant regulations.”

Additional resources

51 of 65

Leverage client-side encryption

Google Workspace already uses the latest cryptographic standards to encrypt all data at rest and in transit between its facilities. With client-side encryption , admins have direct control of encryption keys and the identity provider used to access �those keys.

I know Google has the highest standards regarding data encryption, but I want to control the encryption keys for our university’s intellectual property and grant research.”

Use your own encryption keys to encrypt sensitive data, such as your institution’s intellectual property

Content encryption is handled in your browser before any data is transmitted or stored in Google’s cloud-based storage

Choose which users can create client-side encrypted content and share it internally or externally

Additional resources

52 of 65

Enable data classification labels for Gmail

Empower admins to define and apply custom data classification labels for Gmail at the app level within the Admin console, enabling more effective categorization and protection of �sensitive information.

How can I extend my existing data classification and protection policies to emails, ensuring sensitive information is automatically categorized and secure?”

Extended data classification: Admins can now apply data classification labels, including custom and existing Drive labels, to Gmail for a unified system of data protection

Automated protection and user education: The system uses auto-classification and data loss prevention rules to block sensitive emails and educate users on data protection policies in real time

Additional resources

53 of 65

Teaching and learning tool management

Seamlessly manage teaching and learning tools with flexible controls that empower you enable add-ons and tailor access for your educators and students.

54 of 65

What is it?

Google Classroom is where teaching and learning come together. Paid features in Classroom bring classroom tools together in one place to help personalize learning and deliver student performance insights faster, which empowers educators to help students unlock their potential.

Use cases

SIS integrations

Add-ons and APIs

Calendar

Docs

Sheets

Slides

Sites

Forms

AppSheet

Storage

Drive

Plagiarism detection

Originality reports

Visibility, analytics, �and access

Email and messaging

Gmail

Chat

Groups

Privacy and security

Vault

My Account

Admin

Looker Studio

BigQuery

Security

Center

Vids

Collaboration and productivity

Device and mobile �application management

Interoperability �and extensibility

55 of 65

Manage access �to Classroom add-ons

Determine which third-party education apps your institution can access with a domain allowlist . Enable educators to easily install add-ons and include them within student assignments, in just a few clicks.

I wish there was �a way for me to provide single sign-on access �to my educators’ favorite EdTech tools.”

Create an allowlist across your domain to determine which third-party apps educators can install from the Google Workspace Marketplace.

Support learning outcomes with supplemental education apps. Educators can assign, review, and grade right within �Google Classroom.

The Google Workspace Marketplace includes Adobe Creative Cloud Express, BookWidgets, CK-12, Formative, Genially, Google Arts & Culture, IXL, Kahoot!, Nearpod, Newsela, Pear Deck, SAFARI Montage, Sora, Wordwall, and more.

Additional resources

56 of 65

Create �classes �at scale

SIS roster import enables automatic class creation and keeps class lists in sync with your school’s student information system (SIS) with Clever.

I need a way to automate the setup of classes and manage student rosters in Google Classroom.”

Available to K-12 districts in the US and Canada using Education Plus

Admins can import class rosters from your SIS into Google Classroom to automatically set up classes

Automate and manage class lists in Google Classroom seamlessly

Additional resources

57 of 65

Designate users with temporary class access

As an admin, you can give designated users, such as school administrators or support staff, temporary access to visit classes in Classroom without having to add them as a permanent teacher or student to the class.

I want a way to allow �a curriculum leader, principal, or substitute teacher to visit a class without being made �a co-teacher.”

Available to districts using Education Plus

Designated users – such as principals, curriculum leaders, coaches, and school counselors – can temporarily visit a class to support a teacher or student

When designated users visit a class, they can do anything a co-teacher can do, including view student profiles, post announcements, and more

Admins can create an admin role with the Manage Classes privilege and assign it to designated users or security groups – and also restrict access to classes by organizational unit

Additional resources

58 of 65

Originality reports

What do they do?

Originality reports allow educators and students to check work for authenticity using Google Search to compare a student’s work against billions of webpages and over 40 million books. With Education Plus or the Teaching and Learning add-on, educators get unlimited originality reports and the ability to scan student submissions against a school-owned repository of past student work.

Use cases

59 of 65

Check originality against past �student work

School matches in originality reports enable educators to compare student work against past student submissions by scanning student assignments against your institution’s private repository of student work.

How can I enable teachers to compare �a student’s work for plagiarism against student work from past years?”

Compare student-to-student matches against current and previous student work to detect plagiarism with the Teaching and Learning add-on or Education Plus

Student work can be securely stored and backfilled within your private school-owned, domain-wide repository

Additional resources

60 of 65

Google �Meet

What is it?

Google Meet is a video conferencing tool with advanced features that include live streaming, breakout rooms, larger meetings, meeting recordings, and more.

Use cases

61 of 65

Broadcast assemblies, �school events, �and meetings

Live stream to up to 100,000 viewers with Education Plus. Participants can join by selecting the live stream link provided by the organizer in an email or Calendar invite.

We need the ability to live stream our staff and faculty meetings to a broad group of stakeholders and parents.”

Determine how broadly your live stream will be shared. Choose whether the stream is:

  • Only visible to users in your organization (in-domain)
  • Shared with other trusted Google Workspace domains
  • Available to watch with YouTube

It’s recommended that IT admins enable live streaming for only faculty and staff

If a user misses the live stream, they can access the replay after the meeting is completed

Add captions, polls, and Q&A to a live stream to increase inclusivity and engagement

Additional resources

62 of 65

Control the �Google Meet waiting room

Utilize a waiting room to fully manage attendee entry, including the power to push and pull individuals in and out. Configure all attendees to enter the waiting room before joining the main call.

We need the ability to control the entry and exit of attendees with the Google Meet waiting room.”

Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.

Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.

Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.

Coming in Q3/Q4 2025

63 of 65

Google Workspace LTI™

What is it?

Google Workspace LTI™ brings the �collaborative power of Workspace to your learning management system (LMS). It helps integrate workflows with Assignments, �Google Meet, and Drive – free of charge.

Schools with Education Plus and the Teaching �and Learning add-on get additional capabilities within Google Workspace LTI™. To use Assignments or Meet, admins must enable access to Google Workspace LTI™.

Use cases

64 of 65

Use �Google Meet �in your LMS

Google Meet LTI™ is an add-on application for LMSs that enables educators to start a class meeting directly in their Canvas or Schoology LMS. Meet is part of Google Workspace LTI™.

Our school trusts Meet for secure virtual meetings, but we want to access it more seamlessly.”

Meet is an easy-to-use, reliable, and secure video conferencing tool that helps connect your school community through classes, parent-teacher conferences, professional development, and more

With Google Meet LTI™, educators can prevent unwanted guests and control who can access meetings, preconfigure breakout rooms, and make Meet recordings and transcripts from directly within their LMS course.

Users with Education Plus or the Teaching and Learning add-on get access to breakout rooms, polls, and Q&As, along with live streaming, automatic meeting transcripts, and more premium video conferencing features.

Additional resources

65 of 65

Thank you

Create a Mobile Website
View Site in Mobile | Classic
Share by: