Common uses for the investigation tool
- Take action based on search results
- Search and investigate user log events
- Investigate reports of malicious emails
- Investigate file sharing
- Investigate a user across data sources
- Use the investigation tool to end meetings
- Use the investigation tool to view sensitive message content
- Transfer a Drive file from an unknown owner
- Investigate Chat messages to moderate content and protect your data