[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-03。"],[[["\u003cp\u003eEndpoint Verification helps security administrators manage secure access to their organization's resources by providing an overview of the security status of devices.\u003c/p\u003e\n"],["\u003cp\u003eThis tool collects device inventory information, such as encryption status and OS details, which helps administrators manage access control to company resources.\u003c/p\u003e\n"],["\u003cp\u003eEndpoint Verification integrates with Access Context Manager to enforce fine-grained access control based on device attributes.\u003c/p\u003e\n"],["\u003cp\u003eEndpoint Verification can also communicate with third-party clients like CrowdStrike and Microsoft Intune to collect device information and use it within Access Context Manager.\u003c/p\u003e\n"]]],[],null,["# Endpoint Verification overview\n\nThis document describes the basic concepts of Endpoint Verification.\n\nEndpoint Verification lets security administrators or security operations\nprofessionals secure Google Cloud, on-premises apps and resources, and\nGoogle Workspace apps.\n\nEndpoint Verification is part of Google Cloud\n[Chrome Enterprise Premium](/chrome-enterprise-premium/docs/overview) and is available to all\nGoogle Cloud, Cloud Identity, Google Workspace for Business, and\nGoogle Workspace for Enterprise customers.\n\nWhen to use Endpoint Verification\n---------------------------------\n\nUse Endpoint Verification when you want an overview of the security posture of the\ndevices that are used to access your organization's resources, such as laptops\nand desktops.\n\nAs a security administrator or security operations professional, your goal is to\nmanage secure access to your organization's resources. The employees of your\norganization can use either the company-owned devices or their unmanaged\npersonal devices to access the organization's resources. When Endpoint Verification\nis installed on the devices that access your organization's resources, it\ncollects and reports device inventory information. You can use this device\ninventory information to manage secure access to your organization's resources.\n\nWhen paired with the other offerings of Chrome Enterprise Premium, Endpoint Verification helps\nenforce fine-grained access control on your Google Cloud resources.\n\nHow Endpoint Verification works\n-------------------------------\n\nEndpoint Verification consists of a Chrome extension that collects and reports\ndevice inventory information by constantly syncing with Google Cloud.\nEndpoint Verification creates an inventory of devices with Chrome browser that\naccess your organization's data.\n\nFor example, after Endpoint Verification is deployed on devices that are used to\naccess Google Cloud resources, Endpoint Verification populates information\nabout those devices. As an administrator, you can review the\ndevice information including encryption status, OS, and other details, and use\nthis information to manage access control.\n\nFor more information, see [Device attributes collected by Endpoint Verification](/endpoint-verification/docs/device-information).\n\nHow Endpoint Verification works with Access Context Manager\n-----------------------------------------------------------\n\n[Access Context Manager](/access-context-manager/docs), which is part of Google Cloud\n[Chrome Enterprise Premium](/chrome-enterprise-premium/docs/overview),\nlets security administrators or security operations professionals define\nfine-grained and attribute-based access control for projects and resources in\nGoogle Cloud and resources in Google Workspace.\n\nAccess Context Manager references the device attributes collected by Endpoint Verification to\nenforce fine-grained access control with [access levels](/access-context-manager/docs/overview#access-levels).\n\nThe following diagram shows how Endpoint Verification works with Access Context Manager:\n\nHow Endpoint Verification works with third-party clients\n--------------------------------------------------------\n\nIn [Chrome Enterprise Premium and third-party client integrations](/chrome-enterprise-premium/docs/integration-docs),\nthird-party clients such as CrowdStrike and Microsoft Intune collect\nreal-time device information. Endpoint Verification communicates with these\nthird-party clients to collect their device information and makes them available\nfor [Access Context Manager](/access-context-manager/docs).\n\nAccess Context Manager references the device attributes collected by Endpoint Verification and\nthird-party clients to enforce fine-grained access control with [access levels](/access-context-manager/docs/overview#access-levels).\n\nThe following diagram shows how Endpoint Verification and third-party clients work\nwith Access Context Manager:\n\nWhat's next\n-----------\n\n- [Quickstart: Set up Endpoint Verification on your devices](/endpoint-verification/docs/quickstart)\n- [Device attributes collected by Endpoint Verification](/endpoint-verification/docs/device-information)\n- [Deploy Endpoint Verification](/endpoint-verification/docs/deploying-with-admin-console)"]]