During a security audit at your-company.com, you discover that a number of users have installed unauthorized extensions that could potentially access their Google Workspace data. You need to ensure that going forward, only extensions from a pre-approved list are allowed. What action should you take to comply with this policy?