Security center: Prevent, detect, and remediate security threats
Overview
Security dashboard reports
- Before you get started with security dashboard reports
- Use the security dashboard
- Customize your security dashboard
- File exposure report
- Authentication report
- Custom settings report
- Top policy incidents report
- Encryption report
- Message delivery report
- Spam filter report
- User report
- Failed device password attempts report
- Compromised device events report
- Suspicious device activities report
- OAuth grant activity report
- OAuth grants to new apps report
- Suspicious attachments report
- Spoofing report
- User login attempts report
- Create a custom chart based on an investigation
- Start an investigation based on a dashboard chart
- OAuth scope grants by product
- Chrome threat protection summary report
- Chrome data protection summary report
- Chrome high risk users report
- Chrome high risk domains report
Security health page
- Get started with the security health page
- Threat types
- Monitor the health of your Gmail settings
- Monitor the health of your Drive settings
- Monitor the health of your device management settings
- Monitor the health of your security settings
- Monitor the health of your classic Hangouts settings
- Monitor the health of your Groups settings
- Monitor the health of your Marketplace apps settings
- Monitor the health of your Calendar settings
- Monitor the health of your Sites settings
Investigation tool
- About the security investigation tool
- Customize searches within the investigation tool
- Save, share, and change ownership of investigations
- View search results in the investigation tool
- Take action based on search results
- Search and investigate user log events
- Configure settings for your investigations
- Require reviewers for bulk actions
- View Gmail message content
- Start an investigation based on a dashboard chart
- Create a custom chart based on an investigation
- Start an investigation from the alert center
- Find and delete malicious emails
- Investigate file sharing
- Investigate a user across data sources
- Delete a search
- Change the timezone in the investigation tool
- Admin privileges for the investigation tool
- Create activity rules with the investigation tool