Chrome log events

Audit and investigation page: View Chrome events in the Admin console
The audit log page has been replaced with a new audit and investigation page. For information about this change, go to Improved audit and investigation experience: What's new in Google Workspace.

You can use the audit and investigation page to run searches related to Chrome log events. There you can view a record of actions to track events related to managed Chrome browsers and ChromeOS devices. For example, you can see when there has been an unsafe site visit.

For a full list of services and activities that you can investigate, such as Google Drive or user activity, read through the data sources for the audit and investigation page.

Before you begin

To see all Chrome events:

  • The browser must be managed by either Chrome Browser Cloud Management or a ChromeOS device that has been enrolled into a domain.
  • To see these events, you must set up Chrome Security events. For more information, see Manage Chrome Enterprise reporting connectors.

Open the audit and investigation page

Access Chrome log event data

  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in

  2. On the left, click Reportingand thenAudit and investigationand thenChrome log events.

Filter the data

  1. Open the log events as described above in Access Chrome log event data.
  2. Click Add a filter, and then select an attribute.
  3. In the pop-up window, select an operatorand thenselect a valueand thenclick Apply.
  4. (Optional) To create multiple filters for your search:
    1. Click Add a filter and repeat step 3.
    2. (Optional) To add a search operator, above Add a filter, select AND or OR.
  5. Click Search.

Note: Using the Filter tab, you can include simple parameter and value pairs to filter the search results. You can also use the Condition builder tab, where the filters are represented as conditions with AND/OR operators.

Attribute descriptions

For this data source, you can use the following attributes when searching log event data:

Attributes common to all events

Attribute Description
Date Date and time of the event (displayed in your browser's default time zone)
Device name The name of the device
Device platform The OS that the browser is running
Device user The user's name as reported by the OS
Event The logged event action, such as Content unscanned, Unsafe site visit, or Password reuse
Event reason Details about the action, such as File is password protected

Additional attributes specific to certain events

Attribute Description
Actor group name Group name of the actor
Actor organizational unit Organizational unit of the actor
Browser version Number assigned to the version of Chrome browser, such as 69.0.3497.23
Client type
Content hash The SHA256 hash of the content
Content name The name of the content downloaded, such as a filename
Content size The size of the downloaded content, in bytes
Content type The media (MIME) type of content downloaded, such as text/html
Directory API ID Device ID returned by the directory API
Domain The domain where the action occurred
Event result The result of the event based on the policies and rules set. Can be one of the following: Bypassed, Blocked, Warned, Allowed, or Detected.
Profile user The Chrome browser profile username
Scan ID Scan ID of the content analysis scan that triggered the event
Trigger type The user action that triggered the event, such as Unknown, File upload, File download, or Web content upload
Trigger user The username relating to the event:
  • Password reuse—The username that the password belongs to
  • Password reset—The username that the password is reset for
URL The URL that generated the event
User agent The user agent string of the browser used to access the content. For example, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4140.0 Safari/537.36.
Virtual device ID The ID of the device. The value is platform-specific.

Filter data by threat or data protection events

Note: Chrome content transfer, content unscanned, and sensitive data transfer events are available only for customers who have purchased BeyondCorp Enterprise.

For more information about BeyondCorp and how to set it up, go to Protect Chrome users with BeyondCorp Threat and Data Protection.

  1. Open the log events as described above in Open Chrome log event data.
  2. Click Add a filterand thenEvent.
  3. Select the operator.
  4. From the drop-down list, select an option.
  5. Click Apply.

Chrome Threat event descriptions

Event value Description
Malware transfer The content uploaded or downloaded by the user is considered to be malicious, dangerous, or unwanted
Password changed

The user resets their password for the first-signed-in user account

Password reuse The user has entered a password into a URL that’s outside of the list of allowed enterprise login URLs
Unsafe site visit The URL visited by the user is considered to be deceptive or malicious

Chrome Data Protection event descriptions

Event value Description
Content transfer Content was uploaded or downloaded from Chrome and sent for Malware or Sensitive data scanning
Content unscanned There are multiple reasons why a file is unscanned, including
  • File is password protected
  • File is too large
  • DLP scan was unsuccessful
  • Malware scan was unsuccessful
  • Malware scan unsupported file type
  • Service unavailable
Sensitive data transfer The content uploaded, downloaded, or pasted by the user is considered to contain sensitive data, as detected by the Data Protection rules

ChromeOS Security event descriptions

Event value Description Required policy
ChromeOS login failure The user failed to sign in to their ChromeOS device Report device telemetry > Login/Logout status
ChromeOS login success The user successfully signed in to their ChromeOS device Report device telemetry > Login/Logout status
ChromeOS logout The user successfully signed out of their ChromeOS device Report device telemetry > Login/Logout status
ChromeOS user added A user account was added to a ChromeOS device Report device telemetry > Login/Logout status
ChromeOS user removed A user account was removed from a ChromeOS device Report device telemetry > Login/Logout status
ChromeOS device boot state change

A ChromeOS device’s boot state has been switched to either Developer or Verified mode

  • Devices must be enrolled in a managed domain both before and after switching boot state to generate a boot state change event
Report device os information > OS boot mode

Manage log event data

Manage search results column data

You can control which data columns appear in your search results. 

  1. At the top-right of the search results table, click Manage columns"".
  2. (Optional) To remove current columns, click Remove"".
  3. (Optional) To add columns, next to Add new column, click the Down arrow""and select the data column.
    Repeat as needed.
  4. (Optional) To change the order of the columns, drag the data column names.
  5. Click Save.

Export search result data

  1. At the top of the search results table, click Export all.
  2. Enter a nameand thenclick Export.
    The export displays below the search results table under Export action results.
  3. To view the data, click the name of your export.
    The export opens in Google Sheets.

Create reporting rules

Go to Create and manage reporting rules.

When and how long is data available?

Go to Data retention and lag times.

Related topics

Was this helpful?
How can we improve it?

Need more help?

Sign in for additional support options to quickly solve your issue

Clear search
Close search
Google apps
Main menu
Search Help Center