Security centre
Actionable security insights for Google Workspace
- Protect your organisation with security analytics and best practice recommendations from Google. The security centre is included with Google Workspace Enterprise edition.
Actionable security insights for Google Workspace
Get insights into external file sharing, visibility into spam and malware targeting users within your organisation, and metrics to demonstrate your security effectiveness in a single, comprehensive dashboard.
Identify, triage, and take action on security and privacy issues in your domain. Perform organization-wide bulk actions to delete malicious email. Examine file sharing to spot and stop potential data exfiltration.
Stay ahead of threats with the quick-start guide, which provides recommended security settings, and gives customised advice on security best practices for content, communication, mobility and user security.
Understand which files have been shared outside your domain and which shared files have triggered DLP rules.
Find out how many messages don’t meet authentication standards, such as DMARC, DKIM and SPF.
Ensure that messages sent by your domain are encrypted using TLS.
See what percentage of incoming messages were accepted and whether whitelisting allowed suspicious messages to get delivered.
Analyse messages deemed to be spam, phishing, suspicious or containing malware.
Evaluate whitelists by reviewing whether users have tagged delivered messages as spam or phishing.
Set security checks on automatic email forwarding, DMARC settings, POP/IMAP access and whitelists.
Apply policies for file sharing, Drive add-ons, offline availability and stringent sign-in requirements.
Get a comprehensive action list for Mobile Device Management policies.
Gain visibility into how 2-step verification is being used across users and admins.
Check whether out-of-domain warnings are in place for all users.
Review group sharing options and evaluate public groups on a case-by-case basis.
Conduct organization-wide searches across multiple data sources such as Gmail, Drive and Device logs.
Identify & delete malicious emails from user inboxes.
Examine Drive files being shared externally and take action to stop potential misuse.
Pivot across searches to connect results.
Suspend accounts or wipe devices that are compromised or running a vulnerable OS version.
Execute domain-wide access changes and set IRM controls on Drive files.