You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?
A.
Analyze the audit log in the Admin console for device and application activity.
B.
Analyze the security investigation tool to access device log data.
C.
Analyze the Google Workspace reporting section of the Admin console.
D.
Analyze the User Accounts section in the Google Admin console.
• The Security Investigation Tool in Google Workspace (available in Enterprise editions) provides advanced, real-time visibility into device access, user activity, and app usage.
• It allows you to query device logs, filter by user, app, and timeframe, and investigate suspicious behavior, making it the most powerful tool for data breach investigations.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
schamorroa
1 month, 1 week ago