Google Workspace Security Investigation Tool

Ahmed Musaad
Ahmed Musaad
Google Workspace Security Investigation Tool

If you are a security person who works with Google Workspace, this tool is indispensable. It allows you to review logs for many of the Google services and to remedy security or privacy concerns.

Google Workspace is one of the most popular productivity suites available on the market at the moment with hundreds of millions of users and a rather decent set of services covering a wide range of daily activities (document editing, presentations, meetings, ...).

I used Google services a lot and even administrated a Google Workspace tenant for a student organization at one point in my life, but I never got to see and experiment with the tools Google makes available to Enterprise customers, one of which is the topic of this blog post, the security investigation tool.

If you are a security administrator who works with Google services or aids other administrators who do, this tool is indispensable. It allows you to review logs for many of the Google services (e.g. Gmail, Drive, Meet, ...) and take actions to remedy security or privacy concerns (e.g. delete malicious messages, detect unauthorized documents access, and many more).

The security investigation tool is a resource in the Google Workspace security center that can help you identify, triage, and take action on security and privacy issues in your domain. (Soruce)
Delete malicious emails from user inboxes (Soruce)

Sam Lugani, the Head of Security for GCP Platform & Google Workspace, published a blog post back in 2019 detailing how the various features of the investigation tools can be used to detect and respond to attacks. I highly recommend reading that blog post and watching the YouTube video, they are very informative.

It's quite a pity this wonderful tool is only available for Enterprise users, but if you manage to get your hands on it as part of your daily work, I highly recommend make the best use of it to strength your Google Workspace security and privacy tooling.


Cover image from Link



Great! Next, complete checkout for full access to Ahmed Musaad
Welcome back! You've successfully signed in
You've successfully subscribed to Ahmed Musaad
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated