Security center

Actionable security insights for Google Workspace

  • Protect your organization with security analytics and best practice recommendations from Google. The security center is included with Google Workspace Enterprise edition.

Unified security dashboard

Get insights into external file sharing, visibility into spam and malware targeting users within your organization, and metrics to demonstrate your security effectiveness in a single, comprehensive dashboard.

Google Workspace Security full dashboards

Take action against threats

Identify, triage, and take action on security and privacy issues in your domain. Perform organization-wide bulk actions to delete malicious email. Examine file sharing to spot and stop potential data exfiltration.

Dashboard Investigation Tool

Reduce risk by adopting security health recommendations

Stay ahead of threats with the quickstart guide, which provides recommended security settings and gives customized advice on security best practices for content, communication, mobility, and user security.

Security full health tooltips

Gain insights from the security center

folder_shared

File exposure

Understand which files have been shared outside your domain and which shared files have triggered DLP rules.

verified_user

Authentication

Find out how many messages don’t meet authentication standards, like DMARC, DKIM, and SPF.

enhanced_encryption

Encryption

Ensure that messages sent by your domain are encrypted using TLS.

email

Email delivery

See what percentage of incoming messages were accepted and whether whitelisting allowed suspicious messages to get delivered.

book

Spam and malware classification

Analyze messages deemed to be spam, phishing, suspicious, or containing malware.

user_attributes

User perception

Evaluate whitelists by reviewing whether users have tagged delivered messages as spam or phishing.

Get actionable security recommendations

Gmail

Set security checks on automatic email forwarding, DMARC settings, POP/IMAP access, and whitelists.

Drive

Apply policies for file sharing, Drive add-ons, offline availability, and stringent sign-in requirements.

Device Management

Get a comprehensive action list for Mobile Device Management policies.

Security

Gain visibility into how 2-step verification is being used across users and admins.

Meet

Check whether out-of-domain warnings are in place for all users.

Sites and Groups

Review group sharing options and evaluate public groups on a case-by-case basis.

Triage and act against threats with the investigation tool

search

Comprehensive Queries

Conduct organization-wide searches across multiple data sources such as Gmail, Drive and Device logs.

delete_forever

Delete Malicious Email

Identify & delete malicious emails from user inboxes.

file_upload

Monitor File Sharing

Examine Drive files being shared externally and take action to stop potential misuse.

compare_arrows

Correlation

Pivot across searches to connect results.

perm_device_information

Device Analysis

Suspend accounts or wipe devices that are compromised or running a vulnerable OS version.

folder_mydrive

Scale Actions

Execute domain-wide access changes and set IRM controls on Drive files.

Start today - it's easy.

If you need help there's 24/7 email, chat, and phone support from a real person.

Get started