Best Practices For Using Chrome Browser Cloud Management
Best Practices For Using Chrome Browser Cloud Management
Table of Contents
Guides 06
Applying policies 16
Resources 19
Best Practices for using Chrome Browser Cloud 3
Management | August 2023
Introduction
Welcome to Chrome Browser Cloud Management.
This guide is meant to be a companion to the Chrome
Browser Cloud Management Deployment Guide.
Step 1 Step 3
Get access to the admin console (admin.google.com) Setup your admin accounts
Step 2 Step 4
Following this guide for the setup of Chrome Getting access to an existing
Browser Cloud Management is the best place to Google Admin console
start. It covers all of the initial setup steps. Chrome
Browser Cloud Management itself has no additional Check internally if your company has an existing
cost. Note that there are two options to get access Google Admin account before setting up your own.
to the admin console: Many companies have accounts set up for various
Google services like Chrome OS, Google Workspace
1● Use your own domain (no existing Google or others.
services associated)
● The Super Admin at your company would need
● Provides 10 admins accounts total
to set up your admin account to the console
● Can be associated directly with your where Chrome Browser Cloud Management is
enterprise domain (once you verify your located.
domain)
● They also will be required to add the
2● Use your own domain (Google Services already Chrome Browser Cloud Management
associated) license to the admin console which can be
● Admin console is already set up and verified enabled through going to the Manage
browser section and click the Get started
● Does not have any additional cost or use
button to add the no-cost license to your
any of your Google licenses
Google admin console.
● Number of admins accounts allowed will be
● The console does provide role-based
dependent on associated Google Service
administration so the Super Admin can provide
If it is possible to use your company’s existing you access just to what you need to manage
Google admin console, that is the best option. If the Chrome Browser.
console is already set up, Chrome Browser Cloud
● Note that a Super Admin account is required
Management is already present. You just need to
to generate additional admin accounts.
visit that section in the console and accept the
terms of service. ● Consider asking for a Super Admin account
for your team so you can generate your own
in the future if needed.
If your company does have an existing account but you are not the Super Admin,
here is the process of gaining access to Chrome Browser Cloud Management:
11. Have a Super Admin first log 22. Have the Super Admin either 4● Check the box next to
into admin.google.com and create an account with super Organizational Units to give
add the Chrome Browser admin rights and assign it to the following rights:
Cloud Management license you or if they just want to ● Read, Create,
to the admin console which provide access just to Update, Delete.
can be enabled through Chrome Browser
5● Under Chrome Management,
going to the Manage management, then they can
check the Settings box to
browser section and click the provide the following rights
provide all rights to Chrome
Get started button to add the in the admin console:
management.
no-cost license to your
3 ● Under Account>Admin
Google admin console
roles, click the create new
role button and give it a
name like “Chrome Browser
Management”.
Note: if your super admin wants to limit the rights even more on this admin account, they can create
an organizational unit just for Chrome browser management and assign the custom role there.
They can do this via the following steps:
Directory>Users and select management custom role that click on the pencil icon on
the user account that you was created in the previous the button that says “All
want to assign the Chrome steps and click on the button organizational units” and
browser management role to. to assign it to the user. select the organizational
unit(s) that you want to give
22. Scroll down and click on the
the admin access to.
Admin roles and privileges
section.
● Once the admin logs in, but will have full rights to do ● You can also view changes
they will not see any other Chrome management and create made in the console for
organizational units aside new Organizational units under auditing purposes. See Admin
from the ones that you the assigned OU. audit log.
have given them access to
Best Practices for using Chrome Browser Cloud 6
Management | August 2023
Guides
Setting up your
Organizational Units
Once you have access to the Google admin console, If you are an existing Workspace or Chrome OS
then the next step would be to set up the customer, it is recommended that you create a
Organizational Units that your devices will be separate Organizational Unit structure so there is
managed in. not any conflict in policies that are applied.
● These are the “buckets” that you will separate ● This is to prevent policies originally intended as
your different enrolled devices into so you set user policies inadvertently being applied to
grainlar policy to just those machines. newly enrolled browsers placed into those
organizational units.
● They are set up in a parent-child structure so
anything that is set at the top level will be applied
to the lower OUs.
Once you have your organizational units setup, then ● This section does have a view reports option,
you can start setting up accounts for your and when coupled with providing only the
administrators. read- only rights of Organizational Units in
step 3, it can provide a read-only
● This way you can delegate access to the
admin role.
various admins that need access.
● This is useful for admins that only need
● You can create admin accounts with just to view reports,
access not set policies.
to Chrome Browser Cloud Management, or to 5.
5 Hit the continue button and then the create role
The Chrome Browser Cloud Management role is a 77. Assign the role that you created in the previous
custom role and to create this you would need to do steps.
the following: ● If you want to limit the scope of this role,
select the pencil icon next to the scope of
11. Go to Account>Admin roles and click on the the role column and limit access to a specific
create new role link. Organizational unit.
● This way your admin will only have the
2.
2 Give the custom role a name like “Chrome
rights assigned above on the
Browser Cloud Management”.
Organizational units that you give them
3.
3 Check the box by Organizational units to give full access to.
rights (read/create/update/delete). ● This is great for shared environments to
● You can only provide read rights, but that will provide least rights to other OUs that
limit the management capabilities of your might have other Google services
4.
4 Under Chrome Management, check the box next
to “Settings” to give full rights of all of the Chrome
Browser Cloud Management features.
Best Practices for using Chrome Browser Cloud 10
Management | August 2023
Setting up
integration with
3rd party SAML SSO
You can set up a single sign-on for your Google Admin
console. For more information, please take a look at this
link. Note that super admin users are the only accounts
that are not supported for SAML.
Supporting Virtual
and Physical Machines
Non-persistent VMs Persistent VMs
11. Close Chrome. 33. Delete Machine-GUID and the new unique
machine guid will be generated as the key
22. Delete Device Token adds itself back in.
located in: ● This key is usually located in:
● HKLM\Software\Google\Chrome\ HKLM\Software\
Enrollment Microsoft\Cryptography\MachineGuid
String value name: dmtoken
44. Restart Chrome.
● Enrollment token can be left
behind unless you want to move
55. Chrome will read the existing enrollment
the device to a new OU location.
token (or new one if you pushed one out)
and will push down a new DMtoke
Best Practices for using Chrome Browser Cloud 13
Management | August 2023
The console fully supports physical machines, managed devices view by the last activity column
however, just note that since the uniqueness of the or click on the “search or add a filter button” and
device is tied to a unique SID (machine GUID), if the select Last activity.
machine is reimaged or if that GUID changes, it will
Decide a timeframe of how long you want
register as a new machine within the console.
machines to remain in the console after being
It is recommended if a machine is reimaged, that it is inactive (like 90 days , a year etc.) and consider
deleted from the console and then re-enrolled under deleting them out. You can also use the API to
the new image to prevent duplicate counts. Another remove these machines after a period. Refer to the
tool to prevent inactive machines from remaining in API support section for more information.
your console is to use the filter feature in the
Best Practices for using Chrome Browser Cloud 14
Management | August 2023
Once the devices are enrolled and present within ● It is also recommended to set the Managed
the console, you can start viewing the data that is browser reporting upload frequency to the
coming in. minimum of 3 hours to have reports come up
more frequently than the default 24 hours.
It is recommended that before you start applying
policies (especially around extensions) that you first Under the managed browsers section, you can
take a look at what is already present. select one of your enrolled devices and browse the
Applied Browser Policies section to see what
● You must turn on the cloud reporting feature in
policies are already in effect.
order for data to populate into the console.
Best Practices for using Chrome Browser Cloud 15
Management | August 2023
This view provides all of the extensions that are For a complete list of all extensions and further
present within your enrolled browsers. details, it is recommended to use the Extension
Takeout API.
Hitting the export button provides the ability to
export this list to a CSV file. Here is a link to instructions on how to set this up
and a link to an instructional video.
Best Practices for using Chrome Browser Cloud 16
Management | August 2023
Applying policies
Once you have your devices reporting into the ● If you want to combine policies from multiple
console, any policies that you currently have applied sources (admin console and local machine
within Group Policies will work with any policies that policy), you can use the policy mergelist policy to
are pushed from the cloud. Local policy will take combine them together: Entering in a * into this
precedence over cloud policy by default if there is a policy will automatically merge all supported
conflict. policies together.
● If you want to override this functionality, in the ● Refer to this link for more information about
admin console there is a policy named Policy policy precedence and policy merging.
precedence where you can change what occurs ● If you set a policy in the console, it will apply to
Nearly every setting in the console has API support. ● It has example augments that can move
For scaled management (like moving machines and browsers, delete out inactive browsers, pull
making bulk changes), it is recommended as information, and more.
a best practice to set up the API to make life easier
● It also has some helpful Powershell scripts to
for admins in the console.
wake the browser and force updates and
● For more information on how to setup the API in other useful Chrome Browser Cloud
Chrome Browser Cloud Management, refer to this Management enrollment related scripts.
guide.
● The Chrome Enterprise also has a Github repository
that provides tons of different scripts as well as a
C# framework called CBCM-CSharp that you can
use to learn, create, and solve complex use cases
through automation and integration.
Best Practices for using Chrome Browser Cloud 17
Management | August 2023
Troubleshooting issues
in Chrome Browser
Cloud Management
My machine is present in the admin console, ● Possible solution 3: The console marks
but no information is being populated (like machines as unique on Windows through the
extension, version etc). machine GUID and via serial number on Macs.
● Possible solution: Make sure that Cloud If you do not use sys-prep on your Windows
reporting is turned on in the Organizational images and the machine GUID is the same,
Unit that the device is enrolled in. then if a machine enrolls with the same
Machine GUID, it will replace the one that is
I pushed out the token to my machines already present in the console.
but many of them are not present in the console.
Refer to the section on supporting Persistent VMs
● Possible solution 1: Chrome needs to be
in this guide on how to change the Machine GUID
restarted or launched in order for it to enroll
on your machines to prevent this issue.
into the console. Usually this happens over
time but if you want to speed things along, you
I set a policy in the console and it has applied on
can use this script that will add the enrollment
the machine but it isn’t showing up in the devices
token, launch the browser in a system context
view in the managed browser section of managed
(users will not see the window being
browser.
displayed), wait 15 seconds for the enrollment
to complete, and then close Chrome. ● Possible solution: By default, policies that you
set in the console apply to the machine in a
● Possible solution 2: Google update is required
few moments, but reporting back into the
to be present on the machine for the
console by default is every 24 hours (you can
enrollment to take place. It does not require for
reduce this to every 3 hours via policy).
Autoupdate to be on. Make sure that Google
update is present on the machine and that the
URLs that are needed for its function are not
blocked. For a list of the URLS, check out this
link, but most importantly the URL that is most
used is: https://m.google.com/device
management/data/api
Best Practices for using Chrome Browser Cloud 18
Management | August 2023
I am seeing multiple instances of the same I have a lot of machines that are inactive
machine name in the managed browser ue to them being replaced or reimaged.
section of the console.
● Possible solution: Use the filter feature in the
● Possible solution: The console does not managed devices view by the last activity
support non-persistent VMs. If you enroll them column or click on the “search or add a filter
into the console, they will show up under the button” and select Last activity and delete
managed browser section, but once they are them out.
rebuilt they will receive a new Machine GUID
● Or you can set up the
which will have them show up as a duplicate
API and refer to the CBCM-Csharp section
entry, even if the machine name is the same.
on inactive browser deletion to automate
this.
Best Practices for using Chrome Browser Cloud 19
Management | August 2023
Resources