Google Workspace Admin Audit Events

Cloud & SaaSIdentity & DirectoryGoogle WorkspaceCloud Control PlaneSIEM / Log Aggregator

Location

Google Admin Console > Reporting > Audit and investigation > Admin log events

Description

Administrative audit events covering privileged changes in Google Workspace, including admin-role updates, security-setting changes, application configuration changes, and delegated-admin actions.

Forensic Value

Admin audit events are the primary source for reconstructing attacker changes in Google Workspace. They show who changed tenant settings, which admin role was used, the originating IP address, and which controls were weakened or disabled during the compromise window.

Tools Required

Google Admin ConsoleReports APISIEM

Collection Commands

Google Admin Console

Reporting > Audit and investigation > Admin log events > Filter by actor, event name, and date range > Export to CSV or Google Sheets

Reports API

GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/admin?startTime=2026-03-01T00:00:00.000Z

Collection Constraints

  • Available event families and lookback depth depend on Google Workspace edition, retention settings, and delegated admin privileges.
  • Exports capture audit metadata, not the underlying document or mailbox content.

MITRE ATT&CK Techniques

T1098T1484T1078.004

Related Blockers