Security Command Center analyzes various logs for potential threats that affect Google Workspace resources. For recommended responses to these threats, see Respond to Google Workspace threat findings.
The following log-based detections are available with Event Threat Detection:
Persistence: Strong Authentication Disabled
Initial Access: Account Disabled Hijacked
Initial Access: Disabled Password Leak
Initial Access: Government Based Attack
Initial Access: Suspicious Login Blocked
Persistence: SSO Enablement Toggle
Persistence: SSO Settings Changed
Persistence: Two Step Verification Disabled
What's next
- Learn about Event Threat Detection.
- Learn how to respond to Google Workspace threat findings.
- Refer to the Threat findings index.