Google Workspace Gmail Log Events

Cloud & SaaSEmail SecurityGoogle WorkspaceCloud Control PlaneSIEM / Log Aggregator

Location

Google Admin Console > Reporting > Audit and investigation > Gmail log events

Description

Email-activity logs covering message delivery, route changes, spam/phish actions, mailbox access context, and selected message-handling metadata within Google Workspace.

Forensic Value

Gmail log events are essential for phishing, BEC, and data-exfiltration cases. They help determine which mailboxes were touched, whether suspicious forwarding or transport actions occurred, and which sending infrastructure or delivery path was involved.

Tools Required

Google Admin ConsoleGmail log searchSIEM

Collection Commands

Google Admin Console

Reporting > Audit and investigation > Gmail log events > Filter by sender, recipient, IP, and message ID > Export the result set

Gmail log search

Apps > Google Workspace > Gmail > Gmail log search > Search by sender/recipient/message ID and export the results for the incident window

Collection Constraints

  • Gmail log events provide message-routing and audit context, not full mailbox content; content preservation requires Vault or mailbox export workflows.
  • Some searches and exports are limited by admin role, license, and retention boundaries.

MITRE ATT&CK Techniques

T1114T1566.001T1534