As an administrator, you might become aware of a malicious email that several users in your organization have received.
Using the investigation tool, you can identify all users in your domain that have received the message (for example, a phishing email). You can then use the investigation tool to delete the email from your users' Gmail inboxes (note that log data might take up to a few minutes to become available in the investigation tool).
You can also use the investigation tool to take other actions, such as marking an email as spam or phishing or sending it to the user's inbox.
Your access to the security investigation tool
- Supported editions for the security investigation tool include Enterprise Plus, Education Standard, Education Plus, and Enterprise Essentials Plus.
- Admins with Cloud Identity Premium, Frontline Standard, Enterprise Standard, and Education Standard can also use the investigation tool for a subset of data sources.
- Your ability to run a search in the investigation tool depends on your Google edition, your administrative privileges, and the data source. If you're unable to run a search in the investigation tool for a specific data source, you can use the audit and investigation page instead.
Note: You can run a search in the investigation tool on all users, regardless of the Google edition they have.
Note: Some features in the security investigation tool—for example, data related to Gmail and Drive—are not available with Cloud Identity Premium or Enterprise Standard editions. For details see Data sources in the investigation tool.
Find and delete malicious emails1. Get started with your investigation
- On the left of the Admin console Home page, click SecuritySecurity centerInvestigation tool.
- Click Data source and select Gmail log events.
- Click Add Condition.
- Click AttributeTo (Envelope).
- Click ContainsIs.
- For To (Envelope), enter the username that received the malicious email—for example, firstname.lastname@example.org.
- Click Add Condition.
- Click Attribute Subject and make sure the condition is set to Contains (the default option).
- For Subject, enter words that match the subject of the malicious email—for example, Dancing Santa.
The words in your search don't need to be an exact match of the email's subject.
- Click Add Condition.
- For Condition, click Date.
- Change the condition to After.
- For Date, enter the earliest date and time when the suspicious email was received by your users.
- Click Search.
After you finish the above steps, the search results display in a table at the bottom of the page. The table shows the date and time the message was sent, the message ID, the subject, the sender's email address, and the recipient's email address.
To export these search results to your My Drive folder, click Export all at the top of the table.
For more details, see View search results in the investigation tool.
- To remove the Recipient condition from the above search criteria, click. Your search will then include only the Subject and Date criteria.
- To search for other users that may have received the malicious email, click Search.
The search results are displayed in a table at the bottom of the page. Similar to the search results in step 1 above, the table displays the date and time the message was sent, the message ID, the subject, the event type, and the sender's email address. However, the results also include the email addresses of other users in your organization that received the malicious email.
- To export these search results to your My Drive folder, click the Export icon at the top of the table.
- In the table at the bottom of the investigation tool, click the checkbox to select all. This automatically checks each box in the current page of the search results.
- From the Actions menu, click Delete messages.
- Type in a justification for the deletion task for example, “Suspected malicious emails,”
- Click Delete.
This action deletes messages from users’ inboxes that match the message ID and owner, either sender or receiver depending on the event type, corresponding to the selected Gmail log events. Erased messages will still be subject to any applicable retention rules and holds set in Vault (for more details about retention rules and holds, see the Vault Help Center).
Note: In addition to erasing an email, you also have the option to take other actions such as marking the email as spam, marking it as phishing, or sending to the user's inbox.