Notification

Duet AI is now Gemini for Google Workspace. Learn more

Požadovaná stránka aktuálně není k dispozici ve vašem jazyce. V dolní části stránky však můžete vybrat jiný jazyk, případně pomocí funkce překladu integrované v prohlížeči Google Chrome jakoukoli stránku okamžitě přeložit do vybraného jazyka.

About the security center

Security dashboard, investigation tool, and security health

Supported editions for this feature: Frontline Standard; Enterprise Standard and Enterprise Plus; Education Standard and Education Plus; Enterprise Essentials Plus.  Compare your edition

The security center provides advanced security information and analytics, and added visibility and control into security issues affecting your domain. 

The security center expands on advanced settings in the Google Admin console to surface your security data through insightful, customizable reports that you can share with colleagues in your organization. Administrators can also monitor the configuration of Google Admin console settings from the security health page. Additionally, admins can use the investigation tool to identify, triage, and take action on security and privacy issues in your domain.

See the sections below for more details:

Note: You must have the necessary privileges to access the security center. See Admin privileges for the security center.

Security dashboard reports

On the security dashboard, you can see an overview of data from several security center reports. The reports and charts you see depend on what type of managed Google Account you have (for details, see About the security dashboard). 

Note: Data in security dashboard reports is updated every 15 minutes. New data is shown within 15 minutes of the logs first being recorded.

Investigation tool

Use the security investigation tool to identify, triage, and take action on security and privacy issues in your domain.

For example, you can use the investigation tool to:

  • Access data about devices.
  • Access device log data to get a clear view of the devices and applications being used to access your data.
  • Access data about Gmail messages, including email content. 
  • Access Gmail log data to find and erase malicious emails, mark emails as spam or phishing, or send emails to users’ inboxes.
  • View search results that list suspended users.
  • Access Drive log data to investigate file sharing in your organization, investigate the creation and deletion of documents, investigate who accessed documents, and more.

For more details and instructions, see About the security investigation tool.

Security health page

The security health page enables you to monitor the configuration of your Admin console settings from one location. For example, you can check the status of settings like automatic email forwarding, device encryption, Drive sharing settings, and much more. 

The security health page provides visibility into your Admin console settings to help you better understand and manage security risks. If needed, you can make adjustments to your domain’s settings based on general security guidelines and best practices, while balancing these guidelines with your organization’s business needs and risk management policy.

Note: The exact security health settings you receive depend on your edition. For details and instructions, see Get started with the security health page.

Was this helpful?

How can we improve it?
Search
Clear search
Close search
Main menu
3214541230577880795
true
Search Help Center
true
true
true
true
true
73010
false
false