You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?
A.
Analyze the audit log in the Admin console for device and application activity.
B.
Analyze the security investigation tool to access device log data.
C.
Analyze the Google Workspace reporting section of the Admin console.
D.
Analyze the User Accounts section in the Google Admin console.
The audit log in the Google Admin console provides detailed information about device and application activity, which is crucial for investigating a potential data breach. You can see which devices have accessed corporate data, as well as which applications were used, giving you a comprehensive view of any unauthorized or suspicious activities. This is the most appropriate and efficient tool for this investigation.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit