Stay organized with collections Save and categorize content based on your preferences.
Join our live Twitter Spaces discussion on March 16 to learn from the Googler who completed 10 certifications in 10 weeks. Register today.

Professional Google Workspace Administrator

Certification exam guide

A Professional Google Workspace Administrator transforms business objectives into tangible configurations, policies, and security practices as they relate to users, content, and integrations. Through their understanding of their organization’s infrastructure, Google Workspace Administrator enable people to work together, communicate, and access data in a secure and efficient manner. Operating with an engineering and solutions mindset, they use tools, programming languages, and APIs to automate workflows. They look for opportunities to educate end users and increase operational efficiency while advocating for Google Workspace and the Google toolset.

Related job roles: IT systems administrator, cloud solutions engineer, collaboration engineer, systems engineer.

Section 1: Object management

1.1 Manage user lifecycles with provisioning and deprovisioning processes. Considerations include:

    ●  Adding users (e.g., individual, bulk, automated)

    ●  Removing users (e.g., suspending, deleting, recovering)

    ●  Editing user attributes (e.g., renaming, passwords, aliases)

    ●  Creating administrative roles (e.g., default roles, custom roles)

1.2 Configure shared drives

1.3 Manage calendar resources

1.4 Configure and manage Google Groups for Business. Considerations include:

    ●  Configuring Google Groups

    ●  Adding users to groups

    ●  Implications of current Google Workspace APIs to development efforts

    ●  Using Apps Script to automate tasks

Section 2: Service configuration

2.1 Implement and manage Google Workspace configurations based on corporate policies. Considerations include:

    ●  Managing company profile settings

    ●  Modifying OU policies

    ●  Managing rollout of new Google functionality to end users

    ●  Troubleshooting Google Workspace services (e.g., performance issues for services suite, apps for OUs)

    ●  Scanning email with Data Loss Prevention (DLP)

    ●  Managing content compliance rules

    ●  Configuring security and data region

    ●  Monitoring security health check

    ●  Configuring security settings

    ●  Creating security records

    ●  Designing security integration and addressing objections

2.2 Demonstrate how to set up and configure Gmail. Considerations include:

    ●  Enabling email delegation for an OU

    ●  Managing Gmail archives

Section 3: Troubleshooting

3.1 Troubleshoot user reports of mail delivery problems

3.2 Collect log files or reports needed to engage with support

3.3 Classify and mitigate basic email attacks. Considerations Include:

    ●  Configuring attachment compliance

    ●  Configuring blocked senders

    ●  Configuring email allowlist

    ●  Configuring objectionable content

    ●  Configuring phishing settings

    ●  Configuring spam settings

    ●  Managing admin quarantine

    ●  Configuring Secure Transport compliance

    ●  Configuring safety settings

3.4 Troubleshoot workspace access and performance

Section 4: Data access and authentication

4.1 Configure policies for all devices (mobile, desktop, Chrome OS, Meet, Chrome Browser). Considerations include:

    ●  Company-owned vs. personal devices

    ●  Configuring personal device settings (e.g., password, Android, iOS, advanced, device approvals, app management, insights

4.2 Configure and implement data governance policies

4.3 Describe how to manage third-party applications. Considerations include: 

    ●  Configuring third-party SSO for Google Workspace

    ●  Integrating with third-party for provisioning

    ●  Integrating third-party marketplace apps to specific OUs in Google Workspace

    ●  Granting API access to applications that need access

    ●  Revoking third-party author access

    ●  Removing connected applications and sites

4.4 Configure user authentication. Considerations include:

    ●  Basic user security controls (e.g., password length enforcement and 2-Step Verification)

    ●  Security aspects of identity, perimeter security, and data protection

Section 5: Support business initiatives

5.1 Use Vault to assist legal teams. Considerations Include:

    ●  Setting retention rules (e.g., Setting retention rules, placing legal holds, searching your domain's data by user account, OU, date, or keyword, exporting data for additional processing and review, auditing reports)

    ●  Holding and exporting data

    ●  Running Vault audit reports

5.2 Interpret reports for the business

5.3 Describe how to import and export data