How to Set Up Google Workspace for Your Virtual Assistant

VirtualAssistantVA Team·

Google Workspace is the operational backbone of most remote businesses. When set up properly for a virtual assistant, it gives them a professional email address, access to the right files, a shared calendar, and communication tools - all under one account you fully control. When set up poorly, it creates security gaps, access confusion, and headaches when the relationship ends.

This guide walks through how to set up Google Workspace specifically for VA access, from account creation through day-to-day usage and eventual offboarding.

Creating a Google Workspace Account for Your VA

The first decision is whether to add your VA as a user on your Google Workspace domain or to share access from your own account. For any ongoing VA relationship, adding them as a user on your domain is the right call. This gives them a branded email address (like [email protected] or [email protected]), and it puts you in the admin seat with full control over their access.

In your Google Workspace Admin Console, go to Users and create a new account. Set a strong temporary password and require a reset on first login. Assign the user a role - the "User" role is appropriate for most VAs, reserving admin privileges for yourself. Avoid making VAs co-admins unless absolutely necessary.

If your VA will be handling email on your behalf, consider creating a role-specific address (hello@, support@, or info@) rather than a personal-name address. This makes offboarding cleaner and the inbox easier to hand off.

Configuring Drive Access - Shared Drives vs. Folder Sharing

The most common mistake with Drive setup is sharing folders from your personal My Drive rather than using Shared Drives. When you share from My Drive, you own the files. If your account has issues or you revoke access, the VA loses everything. If the VA accidentally moves files, they can end up in unintended locations.

Shared Drives (formerly Team Drives) fix this. Files belong to the organization, not to any individual. Set up one Shared Drive per client or per functional area (Operations, Marketing, Client Files). Add your VA as a Member with Contributor or Content Manager access depending on how much editing and organization they need to do.

Restrict external sharing in the Shared Drive settings. This prevents your VA from inadvertently sharing client files outside your organization without your approval. You can set this at the Shared Drive level without affecting your broader Workspace settings.

Setting Up Gmail and Calendar Access

For email, there are two common configurations. If your VA will manage an inbox on your behalf, create a dedicated shared inbox (like [email protected]) and add it to the VA's Gmail through delegation. This gives them full send-as and read access without sharing your personal credentials.

Alternatively, if your VA has their own user account, you can grant them delegation access to your personal inbox from your Gmail settings under "Grant access to your account." This lets them read, send, and manage your email while messages still show as coming from you.

For Calendar, share your Google Calendar with your VA's account and grant them the ability to make changes and manage sharing if they'll be booking appointments. For VAs handling scheduling, also share any resource calendars (like a meeting room or team calendar) they'll need to manage.

Set working hours in your Calendar and ask your VA to do the same. This prevents confusion about availability across time zones, which is common in remote VA relationships.

Google Admin Controls - What to Configure Before Day One

The Admin Console gives you tools that most business owners don't use but should. Before your VA starts, configure the following.

Set a password policy requiring strong passwords and regular rotation. Enable 2-Step Verification enforcement so VAs can't log in without a second factor - this is critical for account security.

Review the Apps settings to control which third-party apps your VA's account can connect to Google Workspace. Restrict access to unreviewed apps so a VA can't accidentally authorize a malicious third-party tool with access to your Drive or Gmail.

Set up audit logs so you can see login activity, Drive access, and email actions. Under Reports in the Admin Console, you can view who accessed which files and when. This audit trail is valuable for both security and accountability.

Offboarding a VA From Google Workspace

When a VA contract ends, offboarding from Google Workspace should happen the same day. In the Admin Console, suspend the account first (don't delete it immediately). This revokes access while preserving data.

Transfer ownership of any files they created in their personal My Drive to your account before deleting. If they used Shared Drives correctly, this step is unnecessary - files already belong to the organization.

Check for any third-party app authorizations on the account, forwarding rules in Gmail, or scheduled Google Calendar events they were managing. Remove delegations, revoke app access, and audit the inbox for any forwarding rules that might route email to an external address.

After 30 days, you can safely delete the suspended account. Export any relevant data to your own Drive first using Google Takeout from the admin panel.

Ready to Build Your VA-Powered Tech Stack?

A well-configured Google Workspace makes every remote collaboration smoother and more secure. Stealth Agents provides experienced virtual assistants who are fluent in Google Workspace and can integrate with your existing setup from day one. Visit virtualassistantva.com to find a VA who's ready to hit the ground running inside your systems.

Related Articles

Need Help With Your Business?

Get a free consultation — our VA experts will match you with the right assistant.

Ready to Hire a Virtual Assistant?

Let a dedicated VA handle the tasks that slow you down. Get matched in 24 hours.