Your organization relies on Google Workspace Enterprise Edition for authentication. Concerned about the risk posed by employees leaving their laptops unattended for extended periods after logging into Google Cloud, you aim to prevent malicious individuals from exploiting unattended laptops to tamper with employee environments. What action should you take?