June 28, 2021 | Suraj Bawane

Google Workspace Investigation Tools

partner of the year

The Security Center Detection Tool is not just any other tool that searches for and removes email logs. It is not a reporting tool that displays logs and helps create fancy reports.

It is not just a device that a user can see for a device and erase it. Furthermore, it is not just a tool that checks a user’s failed login checks and suspends the user.

investigation-tool1

investigation-tool2

It is a centralized tool used to manage any alerts and logs related to all users, devices, email and drive events.

How is it different?

Unlike other cloud solutions within the Security and Compliance Center for DLP, data governance, record management, etc. there is no need to have separate tabs.

Ultimately, it boils down to an investigative device in all Google Workspace – which will be the security center.

Whether it is looking for email sent by a specific user or checking access permissions on a particular user’s drive document, or remote wipe of a user device, All this can be done with a central device.

This can be an ideal place to start looking for an IP address from where an email is originating or clicked on a link to a user’s email to find out as granular Can.

It is also strongly integrated with the Security Alert Center, The way that a particular alert can be triggered can be checked directly from there.

investigation-tool3

Drive Events

This usually becomes a case where an administrator can actually suspend a user or delete a document that is shared externally, When they detect or suspect data leaks. But this is not the case when customers are powered by Google Workspace.

When searching for sheets or docs shared by users, it is possible to retrieve not only the document list, but also revoke or edit a particular user’s access permissions for a particular document.

It is also possible to implement disabling of download, print and copy for the document directly by the administrator.

investigation-tool4

With a single search query, it is possible to retrieve all documents that can be shared externally.

investigation-tool5

Another very common scenario in drive-related probes is when file visibility changes within drive or shared drive permissions. The options for investigation are simply numerous.

1. Mail related events

Whether it is searching for an original IP address or searching for emails based on the attached hash, the same can be done from the Granular Lookup Check Center. Emails with a particular content can be searched or deleted in all mailboxes of the organization at once, or any item from a single user mailbox.

investigation-tool6

Whether it is a link click or an attachment saved to a link or even a drive within an attachment click, events can still be excluded.

investigation-tool7

Search is also done from the same location based on spam classification.

2. Device event

Whether it is a probe based on device model, owner, sync state, password, or other device specific details, or whether it is device log related events such as failed password events or compromised states or many more, this re-check center There are about 40 related equipment first level options available for testing. Device actions can be taken based on several details populated for the event such as remote wipe off or quarantining the device.

investigation-tool8

3. User event

Depending on the user’s first name, password change status, 2FA status and many other options, events can also be searched and actions taken in the user’s account accordingly.

4. Advance usage scenario

Google is bringing more and more enhancements in this area. There is a latest feature edition (beta release) that will enable entry with 2 additional capabilities within the Google Workplace Safety Center testing tool Save and share probes in the security check tool Create rules inside the Safety Center to perform automated actions

investigation-tool9

  •  
  •  
  •  
  •  
  •  
  •  

Related Articles

  • thumbnail

    Pluto7 Wins the “The 2021 Supply Chain Digital Transformation Award” by USC Marshall School

    Readmore
  • thumbnail

    Supply Chain Twin: Building Resilient, Adaptable and Intelligent Supply chain

    Readmore
  • thumbnail

    Top 10 use cases for Machine Learning in Supply Chain

    Readmore

Talk to an Expert

Transform your business by leveraging the power of Machine Learning Artificial Intelligence, Analytics, and IoT solutions.

Contact Us