As your organization's administrator, you can monitor your users' exposure to data compromise by opening a security report. Under User Reports, the Security report provides a comprehensive view of how people share and access data and whether they take appropriate security precautions. For example, you can review who installs external apps, shares numerous files, skips 2-Step Verification, and uses security keys.
Step 1: Open the security report
-
Sign in with an administrator account to the Google Admin console.
If you aren’t using an administrator account, you can’t access the Admin console.
-
Go to Menu
Reporting > User Reports > Security.
Requires having the Reports administrator privilege.
Step 2: Review the data
The Security report is based on the following user data.
Notes:
- Depending on your Google Workspace edition, you might not have access to some of the activity reports.
- Admin status is no longer available in reports. To view admin information in your Google Admin console (at admin.google.com), go to Account > Admin Roles > View Admins next to the relevant role. To view roles assigned to a specific user, you can also access admin information at Director > Users > User > Admin Roles and privileges or use the API.
Expand section | Collapse all & go to top
Step 3: Customize the data in the report
- Open your report as described above.
- Click Settings
.
- (Optional) To add columns to the chart, next to Add new column, click the Down arrow
and select options from the list.
- (Optional) To remove an item from the chart, next to that item, click Remove
.
- (Optional) To rearrange columns, drag and drop an item to a new position.
- Click Save.