Security Command Center analyzes various logs for potential threats that affect Google Workspace resources. For recommended responses to these threats, see Respond to Google Workspace threat findings.
The following log-based detections are available with Event Threat Detection:
Persistence: Strong Authentication DisabledInitial Access: Account Disabled HijackedInitial Access: Disabled Password LeakInitial Access: Government Based AttackInitial Access: Suspicious Login BlockedPersistence: SSO Enablement TogglePersistence: SSO Settings ChangedPersistence: Two Step Verification DisabledWhat's next
- Learn about Event Threat Detection.
- Learn how to respond to Google Workspace threat findings.
- Refer to the Threat findings index.