About the security investigation tool

Supported editions for this feature: Enterprise; Enterprise for Education.  Compare your edition

As a super administrator, you can use the security investigation tool to identify, triage, and take action on security and privacy issues in your domain.

For example, you can use the investigation tool to:

  • Access data about devices.
  • Access device log data to get a clear view of the devices and applications being used to access your data.
  • Access data about Gmail messages, including email content. 
  • Access Gmail log data to find and erase malicious emails, mark emails as spam or phishing, or send emails to users’ inboxes.
  • View search results that list suspended users.
  • Access Drive log data to investigate file sharing in your organization, investigate the creation and deletion of documents, investigate who accessed documents, and more.

Administrator queries and actions in the investigation tool can be reviewed in the Admin audit log (for more details, see Admin auditing for the security center).

Note: To use the investigation tool, delegated admins must have an Enterprise license assigned to them. Some features in the the security investigation tool—for example, data related to Gmail and Drive—are not available with Cloud Identity Premium.

Was this helpful?
How can we improve it?

Need more help?

Sign in for additional support options to quickly solve your issue