Google Workspace Drive Audit Log Events
Cloud & SaaSData Access & StorageGoogle WorkspaceCloud Control PlaneSIEM / Log Aggregator
Location
Google Admin Console > Reporting > Audit and investigation > Drive log eventsDescription
Google Drive and shared-drive audit events covering file access, downloads, external sharing, permission changes, ownership transfers, and bulk data movement indicators.
Forensic Value
Drive audit events are high-value evidence for insider threat, token abuse, and data-exfiltration cases. They identify exactly which documents were accessed or shared, by whom, from which IP, and whether sharing or permission changes expanded exposure.
Tools Required
Google Admin ConsoleReports APISIEM
Collection Commands
Google Admin Console
Reporting > Audit and investigation > Drive log events > Filter by actor, owner, shared-drive, and document ID > Export evidence
Reports API
GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/drive?startTime=2026-03-01T00:00:00.000Z
Collection Constraints
- •Drive audit logging shows file actions and sharing metadata, not a preserved copy of the document content.
- •Shared-drive and cross-domain visibility depends on admin scope and retention settings at export time.
MITRE ATT&CK Techniques
T1213.002T1530T1567