[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-03 (世界標準時間)。"],[],[],null,["# Respond to Sensitive Actions notifications\n\n| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nSensitive actions can have a negative effect on your business if they are taken\nmaliciously or in error.\n\nInvestigate the activity\n------------------------\n\nConsider reaching out to the owner of the user account that performed the action\nto make sure that the owner took the action themselves and that the action was\nintentional.\n\nYou can use Cloud Logging to view other actions taken by the same user\naccount. For example, the following query searches for Admin Activity Audit Logs\nthat mention `user@domain.com`: \n\n logName:cloudaudit.googleapis.com%2Factivity AND \"user@domain.com\"\n\nBy default, you can view Admin Activity Audit Logs in only a single project,\nfolder, or organization at a time. To aggregate logs across your organization,\nsee\n[Aggregate and store your organization's logs](/logging/docs/central-log-storage).\n\nRespond to an unrecognized activity\n-----------------------------------\n\nIf you determine that the action was not legitimate, it is possible that the\nacting user account is compromised.\n\n- If you use Google Workspace as your identity provider, your Google Workspace administrator can take steps to [secure the account](https://support.google.com/a/answer/2984349).\n- If you use a third-party identity provider, check their documentation for what steps you can take.\n- Consider taking steps to undo the action. For example, if a sensitive role was unintentionally granted at the organization level, you should remove this role.\n\nWhat's next\n-----------\n\n- Learn about [Sensitive Actions logs](/advisory-notifications/docs/sensitive-actions-logs).\n- Learn how to [opt in to or out of notifications](/advisory-notifications/docs/opt-in-out-notifications)."]]