Depending on your Google Workspace edition, you might have access to the security investigation tool, which has more advanced features. For example, super admins can identify, triage, and take action on security and privacy issues. Learn more
As your organization's administrator, you can run searches and take action on security issues related to Admin data action log events. You can view a record of actions performed in the Google Admin console or the Google Workspace Admin SDK Reports API, such as when an administrator accessed, removed, and restored sensitive data from any events.
Forward log event data to Google Cloud
You can opt in to share log event data with Google Cloud. If you turn on sharing, data is forwarded to Cloud Logging where you can query and view your logs and control how you route and store your logs.
The type of log event data you can share with Google Cloud depends on your Google Workspace, Cloud Identity, or Essentials account.
Run a search for log events
(Advanced) If you want to automate queries when you run a search, you can use the Admin SDK Reports API instead. For details, go to Reports API Overview.
Your ability to run a search depends on your Google edition, your administrative privileges, and the data source. You can run a search on all users, regardless of their Google Workspace edition.
Attribute descriptions
For this data source, you can use the following attributes when searching log event data:
Attribute | Description |
---|---|
Actor | Email address of the user who performed the action |
Target Event Data Source |
Application from which data was accessed, removed, or restored An event can be uniquely identified by 3 fields:
|
Date | Date and time of the event (displayed in your browser's default time zone) |
Target Event IDs |
Event IDs of the data that was accessed, removed, or restored An event can be uniquely identified by 3 fields:
|
Search Query | Filters applied in the query used to fetch or process data |
Justification | If justification text was required for the action, explanation provided by the admin |
Target Event Date |
Date which the target event occurred An event can be uniquely identified by 3 fields:
|
Manage log event data
Take action based on search results
Manage your investigations
Supported editions for this feature: Frontline Standard and Frontline Plus; Enterprise Standard and Enterprise Plus; Education Standard and Education Plus; Enterprise Essentials Plus; Cloud Identity Premium. Compare your edition