goo.gle/use-edu-workspace
40+ ways �to use Google Workspace for Education Plus
This deck is a selection of popular use cases that are available if you’re using Google Workspace for Education Plus . These tools can help increase data security , teacher efficiency , student engagement , schoolwide collaboration ,and more.
The deck is organized by feature , followed by common use cases and simple how-to instructions for using the feature. Review the full deck and see how much you can do Google Workspace for Education Plus.
Classroom user guide for administrators
Administrators can learn how to create organizational groups, set permissions, and access audit logs and reports.
Get started with Google for Education
Explore our comprehensive set of resources to get you up and running quickly. Get help for Google for Education products, including links to the help center, help forums, our partners, and specialized support for IT administrators.
Companion resources
Explore other resources to �help support your institution.
Learning never stops. Explore free-of-charge technology training and resources for educators.
Classroom user guide for teachers
Help teachers understand how to set up their classes, organize coursework, grade, provide rich feedback, and more.
Explore 100+ ways to use Gemini and NotebookLM in education for expert tips and guidance on how schools can getting started with gen AI.
Compare Google Workspace for Education editions
Add the enhanced capabilities you need for your institution.
How to use �this resource
Customize Google Workspace for Education � to meet the needs of your institution
Offering summary
1. Choose an edition for your entire domain
Education Fundamentals
Education Plus
A suite of innovative features and AI-driven �tools to create more personalized and engaging learning experiences on a secure platform.
Available at no cost for qualifying institutions
An all-in-one solution with advanced security �and analytics, premium teaching and learning features, and additional AI-driven tools.
$6/year/license (priced for all users)
Google AI Pro for Education
Teaching and Learning
Workspace Additional Storage
Endpoint Education Upgrade
Google AI Pro for Education
Workspace Additional Storage
Optional
2. Provide premium functionality for specific �users with add-ons
Add premium functionality for specific users �with Google Workspace for Education add-ons
Google Workspace for Education add-ons
Enhance instructional impact with powerful AI-driven tools you can rely on. Enrich and personalize learning, create classroom efficiency, and enable teaching and learning from anywhere .
Unleash your potential with our premium AI solution for education, integrating Gemini into the Workspace apps you’re already using every day - like Docs and Gmail - and providing expanded access to premium models and features in the Gemini app and NotebookLM.
Get advanced mobile device management with enhanced security controls to help you manage devices and laptops that access your institution’s data.
Meet your institution’s storage needs with Drive. Purchase as much additional pooled storage as you need – and easily manage it across your institution.
Advanced security
Protect your education community with advanced �tools that provide automatic protections, centralized �visibility and controls, and powerful analytics.
Your admin guide to strategic use cases �with Education Plus
Management and controls
Use granular management and access controls to easily provision accounts, enforce security policies, and monitor user activity across your educational domain.
Teaching and learning �tool management
Seamlessly manage teaching �and learning tools with flexible controls that empower you to enable add-ons and tailor access for your educators �and students.
Advanced
security
Get more control across your domain with proactive security tools that help you defend against threats, analyze security incidents, and protect student and faculty data.
Use cases
Security �dashboard
What is it?
The security dashboard is a centralized location where you can see an overview of your various security reports. By default, each security report panel displays data from the last seven days. You can customize the dashboard to view data from today, yesterday, this week, last week, this month, last month, or a specific number of days ago (up to 180 days).
Volume of spam
Suspicious attachments
And more
Spam
Phishing
Malware
The security dashboard provides a visual representation of activity across your Google Workspace for Education environment, including:
I want to be able to control excessive and unnecessary emails while reducing security threats for my school.”
Additional resources
External�file sharing
Number of sharing events to users outside of your domain for a specified time period
Number of views an external file received over a specified time period
Use the file exposure report from the security dashboard to see external file sharing metrics for your domain, including:
Additional resources
I want to see external file sharing activity to prevent against sensitive data being shared with third parties.”
Third-party applications
Auth grants permission to third-party services to access a user’s account information without exposing the user’s password. You may want to limit which third-party apps have access.
Use the OAuth grant activity panel to monitor grant activity by app, scope, or user and to update grant permissions.
Manage access to unconfigured third-party apps, review the third-party apps that users designated as under 18 have requested access to, and grant access to apps.
Use the OAuth grant activity report from the security dashboard to monitor which third-party applications are connected to your domain and what data they can access.
I want to see the third-party applications that have access to my domain’s data.”
Additional resources
Phishing attempt
User reports allow you to view how users are marking their messages – whether they’re spam, not spam, or phishing – for a specific time period.
You can customize the graph to provide details about only certain types of messages – for example, filtering by whether the messages were sent internally or externally, by date range, and so on.
The user reports panel on the security dashboard allows you to view messages that were flagged as phishing or spam during a specific time period. You can view information about emails flagged as phishing, such as recipients and opens.
Users reported a phishing attempt. I want to be able to track when the phishing email came in, what exactly the email was that my user received, and what risk
they were exposed to.”
Additional resources
Security �Health page
What is it?
The security health page is a centralized location where you can see a comprehensive overview of the security posture of your Google Workspace environment, and it allows you to compare your configurations against recommendations from Google to proactively protect your organization.
Use cases
Security best practices
Recommendations for potential �risk areas in your domain
Recommendations on optimal settings �to increase security effectiveness
Direct links to the settings
Additional information and support articles
Open up the security health page to receive �best practices on security policies with:
Point me in the direction
of best practices or recommendations on how to set up security policies.”
Additional resources
Recommendations
for risk areas
Quickly identify areas of potential risk in your domain
Get recommendations on optimal settings to increase your security effectiveness
Read additional information and support articles on the recommendations
The security health page reviews your security configuration and flags recommended changes. On the security health page, you can:
I want a digestible snapshot of my domain’s security settings with actionable recommendations to address potential risk areas.”
Additional resources
Use cases
Investigation tool
What is it?
It’s a tool that helps you to identify, triage, and take action on security and privacy issues in your domain .
Abusive �material sharing
Search for documents by name, actor, owner, and more
Take action by changing file permissions or deleting the file
Search content that users create in Google Workspace and content they upload to Drive
View all of the log information related to that document
Drive log events within the investigation tool can help you find, track, and isolate or delete an undesirable file within your domain. By accessing Drive log events data , you can:
I know there’s a file containing abusive material being shared. I want to know who created it, when it was created, who shared it with whom, and who made edits to it – and I want to delete it.”
Additional resources
Accidentally shared files
Search for documents by name, actor, owner, and more
View all of the log information related to the document, �including who viewed it and when it was shared
Take action by changing permissions and disabling �download, print, and copy
Drive log events within the investigation tool can help you find, track, and isolate or delete an undesirable file within your domain. By accessing Drive log events data , you can:
There was a file shared accidentally with a group that should NOT have access to it. I want to remove their access to it.”
Additional resources
Email triage
Search for specific emails by subject, message ID, attachment, sender, and the like
View email details, including author, recipient, opens, �and forwards
Take action based on search results – actions on Gmail messages include delete, restore, mark as spam or �phishing, send to inbox, and send to quarantine
The Gmail logs within the investigation tool can help you identify and act on dangerous or abusive emails within your domain. By accessing your Gmail logs, you can:
Somebody sent an email that should not have been sent. We want to know who they sent it to, if the recipients opened it, if they responded, and we want to delete the email. I also want to know the content of the email.”
Additional resources
Phishing and
malware emails
Search email messages for specific content, including attachments
View information about specific emails, including recipients and opens
View the messages and the thread to determine if they’re malicious
Scan email attachments for detailed threat context and reputation data with VirusTotal reports
Take action by marking messages as spam or phishing, �sending to a specific inbox or quarantine, or deleting the
A phishing or malware email was sent to users. We want to see if users clicked on the link in the email or downloaded the attachment, because doing so has potential to expose the users and our domain to harm.”
Additional resources
Opening the investigation tool, specifically the Gmail logs, can help you find and isolate malicious emails within your domain. By accessing your Gmail logs, you can:
Stopping �malicious actors
Identify and investigate attempts to hijack user accounts in �your organization
Monitor which 2-step methods users in your organization are using
Learn more about failed sign-in attempts by users in your organization
Create activity rules with the investigation tool : Automatically �block messages and other malicious activities from specific actors
Protect high-profile users further with the � Advanced Protection Program
Restore or suspend users
A bad actor is constantly targeting high-profile users �within my domain, while I play whack-a-mole trying to �stop them.
How can I stop this?”
Additional resources
The user log within the investigation tool can help you:
Gaining deeper
security insights
Gain additional security insights into Gmail and Chrome log events
Analyze suspicious files, URLs, domains, and IP addresses
Access crowdsourced details on why an attachment or �website might be considered risky
Get assistance on decision-making as you address �security concerns
Students are staying on Google Meet calls after their class has ended. I need a way to end the Meet call for all everyone to prevent learning disruptions.”
Additional resources
VirusTotal reports expand on the results of a security investigation by providing a comprehensive overview, �allowing admins to check the security of a particular domain, file attachment, IP address, or URL based on crowdsourced insights.
Preventing unsupervised virtual meetings
The meeting will end for all users currently in the meeting, including those in breakout rooms
Prevents anyone from attending future instances of �that meeting without the host being present
Students are staying on Google Meet calls after their class has ended. I need a way to end the Meet call for everyone to prevent learning disruptions.”
Additional resources
Google Workspace administrators can use the End meeting for all action in the investigation tool to remove all users from any meeting within your organization. For their individual Google Meet calls, meeting hosts also have this ability.
Management
and controls
Use granular management and access controls to easily provision accounts, enforce security policies, and monitor user activity across your educational domain.
Use cases
Domain management and controls
Admins have access to Google Workspace advanced tools to manage their organization’s data, set controls, and monitor usage.
Control access to �Google services by age
To make it easier to tailor experiences for your users, you can �set access to some Google services based on age. The default age-based access setting depends on your institution type.
How can I limit student access to certain �Google tools?”
Primary and secondary education institutions: All users designated as under the age of 18 get an age-restricted experience for some Google services.
Higher education institutions: Users designated as 18 and older have no additional restrictions on Google services. However, administrators in these organizations are required to identify any users under the age of 18.
Users designated as under the age of 18 have restrictions in �some Google services when they’re signed in to their Google Workspace for Education account. Also, some services aren’t available to users under the age of 18.
Additional resources
Create usage
dashboards and reports
With BigQuery export and Looker Studio template ,admins can use Classroom activity logs to create custom dashboards and reporting with analytics tools like Looker Studio and third-party visualization partners integrated into BigQuery.
How can I understand Classroom usage �across my domain?”
Export Classroom log data from the Admin console to BigQuery and Looker Studio.
View usage and adoption reports quickly across your entire domain. Pinpoint who removed a student from a class, who archived a class on a certain date, and more.
Understand overarching trends and take action faster with customizable Looker Studio dashboard templates.
Additional resources
Automatically populate �department groups
Dynamic groups allow administrators to update schoolwide group membership with custom criteria.
How can I automate group membership so that every time a new educator joins our institution, they are included in my ‘educator’ email list?”
Create dynamic groups that manage membership automatically
Keeps groups up to date based on a membership query you create
Use dynamic groups as:
Additional resources
Manage �endpoint �devices
Using enterprise endpoint management can give you more control over your organization’s data through mobile devices. Restrict mobile device features, require device encryption, manage apps on Android devices or iPhones and iPads, and even wipe data from a device.
I need a way to manage and push policies to all types of devices – iOS, Windows 10, etc. – across my district, not just Chromebooks, especially if one is compromised.”
You can approve, block, unblock, or delete devices from the �Admin console.
If someone loses a device or is disenrolled from the school, you can wipe their account, their profile, or even all data from their specific managed mobile device. This data would still be available on a computer or web browser.
Additional resources
Manage �Microsoft Windows devices
Some of my educators use Windows 10 devices. How can I manage all of my institution’s devices in �the same place?”
Manage and secure your institution’s Windows 10 devices through the Admin console, just as you do for Android, iOS, and Chrome devices.
Enable single sign-on so users can more easily access Google Workspace on their Windows 10 devices
Ensure Windows 10 devices used to access Google Workspace are updated, secure, and within compliance standards by managing devices on the Admin console
Wipe a Windows 10 device, push configuration updates to it, and more from the cloud
Additional resources
Custom �settings for �Windows 10 devices
Using Google’s Windows device management, �admins can add custom settings to their fleet’s devices.
How can I set up �Wi-Fi profiles on my Windows 10 devices?”
Control custom device settings from the Admin console
Apply settings across:
Additional resources
Automate �updates for �Windows 10 devices
Specify how and when your institution’s Windows 10 devices receive security updates and other important downloads through the Windows automatic updating service.
I want to ensure the Windows 10 devices in my fleet receive the latest updates.”
Set up notifications to download updates from the �Windows Update control panel, set hours where update �reboots are not scheduled, and much more
Apply settings to your entire institution or to specific �organizational units
Changes can take up to 24 hours, but typically �happen more quickly
Additional resources
Did you know?
Schools can access Gemini free of charge with added data protection �at gemini.google.com.
To empower educators and staff with generative AI across Gmail, Docs, Classroom, Slides and more – and access to Google AI Pro using our most capable AI models widely available today – upgrade to Google Workspace with Gemini .
Gemini
What is it?
Gemini is your AI-powered assistant for education. Chat with the Gemini app to brainstorm ideas for planning and content, answer questions quickly, summarize content and more – all in �a private and secure environment.
Use cases
Control �who uses Gemini
Institutions with Education Plus licenses have access to the Gemini app as a Core Service, which provides additional admin controls and reporting and is governed by the Google Workspace for Education Terms of Service. Admins can determine which users in their domain have access to this tool.
How can I grant certain users access to �gen AI tools?”
Gemini is included with all Google Workspace for Education editions free of charge with added data protection, and can be accessed at gemini.google.com.
Chats and uploaded files are not reviewed by anyone to improve AI models, used to train AI models, or shared with other users or institutions.
Students of all ages can now use Gemini. Strict content policies prevent users under 18 from seeing inappropriate or harmful responses.
Gemini onboarding for youth includes an AI literacy video, endorsed by ConnectSafely and the Family Online Safety Institute (FOSI), with tips on using gen AI responsibly.
Additional resources
Did you know?
Schools can access Gemini free of charge with added data protection �at gemini.google.com.
To empower educators and staff with generative AI across Gmail, Docs, Classroom, Slides, and more – and access to Google AI Pro using our most capable AI models widely available today – upgrade to Google Workspace with Gemini .
Gemini in Classroom
What is it?
Gemini in Classroom is a suite of gen AI tools that acts as a collaborative partner, supporting educators throughout their workflows so they can focus on the art of teaching, rather than administrative tasks. With access to over 35 Google AI tools, educators can quickly go from idea �to instruction and provide AI learning experiences for students.
Use cases
Control who �uses Gemini �in Classroom
Gemini in Classroom is on by default for users designated as �18 years of age and over in your domain. You can switch off access for the entire domain, or you can restrict access �to certain users.
How can I adjust �access to Gemini �in Classroom?”
Gemini in Classroom is available with all Google Workspace for Education editions
Additional resources
Did you know?
Schools can access NotebookLM free of charge with added data protection at notebooklm.google.com.
NotebookLM
What is it?
NotebookLM is your personalized AI expert, based only on the information that matters most to you. Upload your sources and NotebookLM instantly becomes an expert in them.
Use cases
Control �who uses NotebookLM
How can I manage access to NotebookLM?”
Google Workspace for Education users have access to NotebookLM with data protection – free of charge
NotebookLM is available to users of all ages
Data you enter into NotebookLM – including your source uploads, queries, and responses – is not human-reviewed or used to train AI models
Additional resources
Streamline workflows
Access advanced tools to help you streamline internal workflows, better manage files and storage, and more easily get signatures and approvals from staff and parents.
Use cases
Approve �internal �documents
With Approvals , your school community can send documents �in Google Drive through a formal approval process.
The science department is developing new curriculum.
How can they ensure their curriculum proposal is approved by all �department leaders?”
Reviewers can approve, reject, or leave feedback on the documents directly within Drive, Docs, and other Google Workspace apps
Manage approvals on a contract or new hire, approve changes for a document before publication, and more
Additional resources
Send signature requests and �sign documents
With eSignature , your school community can create documents for signatures and send signature requests right in Google Docs and Google Drive.
I want to consolidate my tech stack. Can I use Google Workspace to manage permission slips, contracts, and other forms for my school?”
Request and add signatures to official contracts, directly in Docs or Drive, without having to switch tabs
Quickly request signatures, check the status of pending signatures, and find completed contracts
Create a new copy of the contract for each request so that you can use your document as a template and initiate multiple eSignature requests.
Additional resources
Manage �storage across
your domain
Institutions with Google Workspace for Education have a baseline of 100 TB of pooled storage; that’s enough storage for approximately over 100 million documents, 8 million presentations, or 400,000 hours of video. Manage pooled Drive storage to ensure your institution is using storage effectively.
I want to implement a �new storage management plan across my domain.”
Use administrator tools, reporting, and logs to:
The Teaching and Learning add-on and Education Plus offer additional �storage capacity on top of the provided baseline storage:
Additional resources
Find files
more easily
With Cloud Search, educators in your institution can quickly find content throughout Google Workspace and third-party apps.
I need to track down permission slips submitted through Gmail, Chat, and Docs.
How can I find these files across my domain?”
Find the information you need from anywhere, using your laptop, mobile phone, or tablet
Search across Google Workspace apps – such as Drive, Contacts, and Gmail – and third-party data sources
Additional resources
Organize documents across your domain
Drive labels help users find, organize, and apply policies throughout their domain. Admins can create and manage �Drive labels to prevent file misuse and ensure student �data meets compliance requirements.
I want to apply sensitivity labels to my institution’s files to align with compliance requirements, prevent misuse, and improve file organization.”
Labels are metadata that can help organize sensitive education �files likes IEP, DOD, or compliance documents.
Only admins can create, define the structures of, and publish labels. Users in your organization can apply labels to the files they edit and set the field values.
Drive labels can be used to support automated � data loss prevention .
Additional resources
Data security and compliance controls
Keep your domain’s data protected with advanced controls that let you scan Gmail for potential threats, manage how your users share files, place specific limits on the apps your users can access, and more.
Use cases
Scan Gmail attachments for threats
Email attachments can include malicious software. To identify these threats, Gmail can scan attachments in Security Sandbox. Attachments identified as threats are sent to the �spam folder.
How can I better protect my domain against zero-day malware and ransomware threats?”
Detect malware by virtually “executing” it in a private, secure sandbox environment and analyzing the side effects to determine malicious behavior
Scan Microsoft Word, PowerPoint, PDF, and ZIP files – and more
Enable scanning for the entire domain, or create scanning rules based on specific conditions like sender, domain, and more
Additional resources
Create audiences for internal �file sharing
Target audience settings help improve the security of your organization’s data by reducing the potential for users to accidentally overshare files.
My staff is accidentally sharing documents with our entire organization, putting sensitive data at risk.
How can I help limit their sharing to a smaller, more relevant group?”
Ensure files are shared with just the right people, like a specific team or department
Target audiences are groups of people that admins can recommend users share their items with
Admins can add target audiences to users’ sharing settings to encourage sharing with a more specific audience
Available in Google Drive, Docs, and Chat
Additional resources
Restrict �file sharing
Drive trust rules enable admins to set rules to control who can get access to Google Drive files, helping ensure the privacy of institutional data. Policies can apply to individual users, groups, organizational units, and domains.
How can I prevent my secondary students from sharing documents with primary students?”
Secure sensitive information and maintain compliance with industry standards and regulations.
Restrict internal or external domain sharing, or both. Admins can create a trust rule to only allow students to share Drive files within �your organization.
“Trust rules,” once enabled, replace existing “Sharing options” in the Google Drive admin controls.
Additional resources
Google Workspace
app restrictions
Using Context-Aware Access , you can create granular access-control policies for Google Workspace and third-party SAML (Security Assertion Markup Language) apps based on attributes such as user identity, location, device security status, and IP address. You can even restrict access to apps from outside the network.
I want to limit access to specific apps when users are on our network.”
You can apply Context-Aware Access policies to the core Google Workspace for Education services
For example, only allow access to Google Workspace apps from institution-issued devices or only allow access to Drive if a user storage device is encrypted
Set rules for how users and apps can access Google Workspace data through Google APIs
Additional resources
Data �regulations
As an admin, you can choose to store data in a specific geographic location, either the United States or UK/Europe, by using a data region policy .
With Education Plus and Education Standard, you can choose one data region for some of your users or assign different data regions to specific departments. You can also monitor the progress of data region migrations.
Put users in an organizational unit to apply the data region policy by department, or put them in a configuration group to apply the policy across or within departments.
Users who are not assigned an Education Standard or Education Plus license are not covered by data region policies.
My student, faculty, and staff data must remain in the EU due to regulatory laws.”
Additional resources
Grant �regulations
As an administrator, you can choose to store your faculty’s research in a specific geographic location, either the United States or Europe, by using a data region policy .
Data region policies cover the primary data at rest, including backups, for the majority of Google Workspace for Education Core Services – listed in this Help Center article
Consider the trade-offs before setting a data region policy, as users outside the region where their data is located might experience higher latency in some cases
My faculty’s research must remain in the United States due to grant regulations.”
Additional resources
Leverage client-side encryption
Google Workspace already uses the latest cryptographic standards to encrypt all data at rest and in transit between its facilities. With client-side encryption , admins have direct control of encryption keys and the identity provider used to access �those keys.
I know Google has the highest standards regarding data encryption, but I want to control the encryption keys for our university’s intellectual property and grant research.”
Use your own encryption keys to encrypt sensitive data, such as your institution’s intellectual property
Content encryption is handled in your browser before any data is transmitted or stored in Google’s cloud-based storage
Choose which users can create client-side encrypted content and share it internally or externally
Additional resources
Enable data classification labels for Gmail
Empower admins to define and apply custom data classification labels for Gmail at the app level within the Admin console, enabling more effective categorization and protection of �sensitive information.
How can I extend my existing data classification and protection policies to emails, ensuring sensitive information is automatically categorized and secure?”
Extended data classification: Admins can now apply data classification labels, including custom and existing Drive labels, to Gmail for a unified system of data protection
Automated protection and user education: The system uses auto-classification and data loss prevention rules to block sensitive emails and educate users on data protection policies in real time
Additional resources
Teaching and learning tool management
Seamlessly manage teaching and learning tools with flexible controls that empower you enable add-ons and tailor access for your educators and students.
What is it?
Google Classroom is where teaching and learning come together. Paid features in Classroom bring classroom tools together in one place to help personalize learning and deliver student performance insights faster, which empowers educators to help students unlock their potential.
Use cases
SIS integrations
Add-ons and APIs
Calendar
Docs
Sheets
Slides
Sites
Forms
AppSheet
Storage
Drive
Plagiarism detection
Originality reports
Visibility, analytics, �and access
Email and messaging
Gmail
Chat
Groups
Privacy and security
Vault
My Account
Admin
Looker Studio
BigQuery
Security
Center
Vids
Collaboration and productivity
Device and mobile �application management
Interoperability �and extensibility
Manage access �to Classroom add-ons
Determine which third-party education apps your institution can access with a domain allowlist . Enable educators to easily install add-ons and include them within student assignments, in just a few clicks.
I wish there was �a way for me to provide single sign-on access �to my educators’ favorite EdTech tools.”
Create an allowlist across your domain to determine which third-party apps educators can install from the Google Workspace Marketplace.
Support learning outcomes with supplemental education apps. Educators can assign, review, and grade right within �Google Classroom.
The Google Workspace Marketplace includes Adobe Creative Cloud Express, BookWidgets, CK-12, Formative, Genially, Google Arts & Culture, IXL, Kahoot!, Nearpod, Newsela, Pear Deck, SAFARI Montage, Sora, Wordwall, and more.
Additional resources
Create �classes �at scale
SIS roster import enables automatic class creation and keeps class lists in sync with your school’s student information system (SIS) with Clever.
I need a way to automate the setup of classes and manage student rosters in Google Classroom.”
Available to K-12 districts in the US and Canada using Education Plus
Admins can import class rosters from your SIS into Google Classroom to automatically set up classes
Automate and manage class lists in Google Classroom seamlessly
Additional resources
Designate users with temporary class access
As an admin, you can give designated users, such as school administrators or support staff, temporary access to visit classes in Classroom without having to add them as a permanent teacher or student to the class.
I want a way to allow �a curriculum leader, principal, or substitute teacher to visit a class without being made �a co-teacher.”
Available to districts using Education Plus
Designated users – such as principals, curriculum leaders, coaches, and school counselors – can temporarily visit a class to support a teacher or student
When designated users visit a class, they can do anything a co-teacher can do, including view student profiles, post announcements, and more
Admins can create an admin role with the Manage Classes privilege and assign it to designated users or security groups – and also restrict access to classes by organizational unit
Additional resources
Originality reports
What do they do?
Originality reports allow educators and students to check work for authenticity using Google Search to compare a student’s work against billions of webpages and over 40 million books. With Education Plus or the Teaching and Learning add-on, educators get unlimited originality reports and the ability to scan student submissions against a school-owned repository of past student work.
Use cases
Check originality against past �student work
School matches in originality reports enable educators to compare student work against past student submissions by scanning student assignments against your institution’s private repository of student work.
How can I enable teachers to compare �a student’s work for plagiarism against student work from past years?”
Compare student-to-student matches against current and previous student work to detect plagiarism with the Teaching and Learning add-on or Education Plus
Student work can be securely stored and backfilled within your private school-owned, domain-wide repository
Additional resources
Google �Meet
What is it?
Google Meet is a video conferencing tool with advanced features that include live streaming, breakout rooms, larger meetings, meeting recordings, and more.
Use cases
Broadcast assemblies, �school events, �and meetings
Live stream to up to 100,000 viewers with Education Plus. Participants can join by selecting the live stream link provided by the organizer in an email or Calendar invite.
We need the ability to live stream our staff and faculty meetings to a broad group of stakeholders and parents.”
Determine how broadly your live stream will be shared. Choose whether the stream is:
It’s recommended that IT admins enable live streaming for only faculty and staff
If a user misses the live stream, they can access the replay after the meeting is completed
Add captions, polls, and Q&A to a live stream to increase inclusivity and engagement
Additional resources
Control the �Google Meet waiting room
Utilize a waiting room to fully manage attendee entry, including the power to push and pull individuals in and out. Configure all attendees to enter the waiting room before joining the main call.
We need the ability to control the entry and exit of attendees with the Google Meet waiting room.”
Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.
Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.
Add your text here. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et.
Coming in Q3/Q4 2025
Google Workspace LTI™
What is it?
Google Workspace LTI™ brings the �collaborative power of Workspace to your learning management system (LMS). It helps integrate workflows with Assignments, �Google Meet, and Drive – free of charge.
Schools with Education Plus and the Teaching �and Learning add-on get additional capabilities within Google Workspace LTI™. To use Assignments or Meet, admins must enable access to Google Workspace LTI™.
Use cases
Use �Google Meet �in your LMS
Google Meet LTI™ is an add-on application for LMSs that enables educators to start a class meeting directly in their Canvas or Schoology LMS. Meet is part of Google Workspace LTI™.
Our school trusts Meet for secure virtual meetings, but we want to access it more seamlessly.”
Meet is an easy-to-use, reliable, and secure video conferencing tool that helps connect your school community through classes, parent-teacher conferences, professional development, and more
With Google Meet LTI™, educators can prevent unwanted guests and control who can access meetings, preconfigure breakout rooms, and make Meet recordings and transcripts from directly within their LMS course.
Users with Education Plus or the Teaching and Learning add-on get access to breakout rooms, polls, and Q&As, along with live streaming, automatic meeting transcripts, and more premium video conferencing features.
Additional resources
Thank you