Depending on your Google Workspace edition, you might have access to the security investigation tool, which has more advanced features. For example, super admins can identify, triage, and take action on security and privacy issues. Learn more
Note: If there’s no data for user log events during the previous 6 months, User log events might not be displayed in the left navigation menu.
Forward log event data to Google Cloud
You can opt in to share log event data with Google Cloud. If you turn on sharing, data is forwarded to Cloud Logging where you can query and view your logs and control how you route and store your logs.
The type of log event data you can share with Google Cloud depends on your Google Workspace, Cloud Identity, or Essentials account.
Run a search for log events
Your ability to run a search depends on your Google edition, your administrative privileges, and the data source. You can run a search on all users, regardless of their Google Workspace edition.
Attribute descriptions
For this data source, you can use the following attributes when searching log event data:
Attribute | Description |
---|---|
Actor group name |
Group name of the actor. For more information, go to Filtering results by Google Group. To add a group to your filtering groups allowlist:
|
Actor organizational unit | Organizational unit of the actor |
Affected user | Email address of the affected user |
Challenge type* |
The type of challenge used to verify the user, such as Password or Security Key Note: Newly added challenge types such as passkey may cause inconsistencies with existing challenge type called other for audit logs created before September 30, 2024. |
Date | Date and time of the event (displayed in your browser's default time zone) |
Domain* | The domain where the action occurred |
Email forwarding address | Email address to forward the Gmail messages to |
Event |
The logged event action, such as 2-step verification enroll or Suspicious login Note: For the Logout event, even if the user signed in with login types other than Google Password, (such as Exchange, Reauth, SAML, or Unknown), the Login type for Logout events is displayed as Google Password. |
IP address | IP address that the user used to sign in. Usually the address is the user's physical location, but it can be a proxy server or a Virtual Private Network (VPN) address. |
Is second factor* | True if the user signed in with 2-factor authentication False if the user didn't sign in with 2-factor authentication |
Is suspicious* | True if the sign-in attempt was suspicious and successful, otherwise false. Applicable only to the login_success event |
Login time | If a Suspicious login event is blocked, this field displays the date and time the user tried to sign in. |
Login type |
Authentication method the user used:
|
User | Email address of the user who performed the action |
* You cannot create reporting rules with these filters. Learn more about reporting rules versus activity rules.
** Note for SAML users using the SSO profile for your organization (legacy SAML): If the SAML login attempt originates from an unknown device or IP address, or if there's a higher risk assessment, a failed login with the type Google Password is recorded in the log event. This occurs even if your SAML login is successful, because the system flags the initial attempt as suspicious. This failed login entry is then followed by a successful SAML login event. In legacy SAML, two login sessions are generated for a single SAML login. The first, often irrelevant session, is filtered out only if it's deemed non-suspicious.Note: If you gave a user a new name, you will not see query results with the user's old name. For example, if you rename OldName@example.com to NewName@example.com, you will not see results for events related to OldName@example.com.
Manage log event data
Take action based on search results
Manage your investigations
Supported editions for this feature: Frontline Standard; Enterprise Standard and Enterprise Plus; Education Standard and Education Plus; Enterprise Essentials Plus; Cloud Identity Premium. Compare your edition