[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-05 (世界標準時間)。"],[],[],null,["| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis document offers informal guidance on how you can respond to findings of suspicious\nactivities in your Google Workspace resources. The recommended steps might not be appropriate for all\nfindings and might impact your operations. Before you take any action, you should investigate the\nfindings; assess the information that you gather; and decide how to respond.\n\nThe techniques in this document aren't guaranteed to be effective against any previous, current,\nor future threats that you face. To understand why Security Command Center does not provide official\nremediation guidance for threats, see [Remediating threats](/security-command-center/docs/how-to-investigate-threats#remediating_threats).\n\nBefore you begin\n\n1. [Review the\n finding](/security-command-center/docs/how-to-investigate-threats#reviewing_findings).\n2. To learn more about the finding that you're investigating, search for the finding in the [Threat findings\n index](/security-command-center/docs/threat-findings-index).\n\nFindings for Google Workspace are only available for organization-level\nactivations of Security Command Center. Google Workspace logs can't be\nscanned for project-level activations.\n\nGeneral recommendations\n\nIf you're a Google Workspace administrator, you can use the service's\nsecurity tools to resolve these threats:\n\n- [Google Workspace Alert Center](https://workspace.google.com/products/admin/alert-center/)\n- [Google Workspace Security Center](https://workspace.google.com/products/admin/security-center/)\n\nThe tools include alerts, a security dashboard, and security recommendations.\nThese tools can help you investigate and respond to Google Workspace\nthreats.\n\nIf you're not a Google Workspace administrator, do the following:\n\n- Instruct the affected user to [change or reset their\n password](https://support.google.com/accounts/answer/41078) and [turn on\n 2-Step Verification](https://support.google.com/accounts/answer/185839).\n- [Contact your Google Workspace\n administrator](https://support.google.com/accounts/answer/6208960) or the team in your company that manages your Google Workspace account. Use these findings as an indication that an account might be compromised.\n\nWhat's next\n\n- Learn [how to work with threat\n findings in Security Command Center](/security-command-center/docs/how-to-investigate-threats).\n- Refer to the [Threat findings index](/security-command-center/docs/threat-findings-index).\n- Learn how to [review a\n finding](/security-command-center/docs/how-to-investigate-threats#reviewing_findings) through the Google Cloud console.\n- Learn about the [services that\n generate threat findings](/security-command-center/docs/concepts-security-sources#threats)."]]