Collecting Evidence from Google Workspace
- 2 hours ago
- 4 min read

Let’s talk about something that often comes up during Google Workspace investigations: how do we actually collect logs and evidence properly?
If you’ve ever worked an incident involving Google Workspace, you already know that the platform gives you a lot of data—but not all of it is equally easy to collect or analyze. Broadly speaking, there are two main ways to collect evidence from Google Workspace:
Using the Workspace Admin interface (UI)
Using the Workspace Admin SDK / APIs
On paper, both give you access to similar information. In reality, they behave quite differently—and those differences really matter during forensic analysis
Let’s break this down in a simple, practical way.
-------------------------------------------------------------------------------------------------------------
Option 1: Using the Google Workspace Admin Interface
The Admin interface is usually where everyone starts—and honestly, it’s not a bad place to begin.
It gives you a visual and human-friendly way to explore logs. You can click through different sections, filter events, and clearly see what’s going on. '
This is especially useful when:
You’re doing a quick triage
You need to show evidence to a manager, legal team, or client
You want to visually confirm suspicious activity
The downside?
All the useful data is scattered across different screens.
If you want to investigate a full Workspace compromise, you’ll likely need to:
Jump between Drive logs
Check login and authentication activity
Review OAuth and third‑party app access
Inspect Admin console changes
Each of these lives in a different place. That means a lot of clicking, filtering, exporting, and repeating the process again and again. It works—but it’s slow.
Export limitations
There are a few important limitations to keep in mind:
You can only export 10,000 or 100,000 events per log type.
If you exceed that limit, you must split your search into smaller time ranges
Logs are exported only as Google Sheets (GSheet) from the UI
You can later convert those sheets into CSV, but it’s an extra step—and not ideal if you’re planning to ingest logs into a SIEM or timeline tool.
-------------------------------------------------------------------------------------------------------------
Option 2: Collecting Logs via the Workspace Admin SDK (API)
Now this is where things get really interesting for forensic work.
The Workspace Admin SDK allows you to collect logs programmatically using API calls. Once set up, this becomes the fastest and most consistent way to gather evidence.
Yes, the initial setup takes some effort—you’ll need:
A Service Account
The right Workspace permissions
Some basic scripting knowledge
But once that’s done, everything becomes repeatable and scalable.
Types of reports you can collect
Using the API, you can pull two main types of reports:
1. Activity Reports
These tell you what actually happened across Workspace services, including:
Google Drive activity
Authentication and login events
OAuth and third‑party application access
Admin console changes
These are gold during investigations because they help you track changes, abuse, and attacker actions.
2. Usage Reports
These focus more on how user accounts are being used over time. They’re great for spotting anomalies or misuse patterns.
Why investigators prefer API logs
There are several big advantages here:
No event limits like the UI exports
Logs are returned in JSON format, which is perfect for:
SIEM ingestion
Timeline creation
Custom parsing and analysis
All timestamps are in UTC, which avoids time zone confusion
Collection can be fully scripted, ensuring consistency every time
In short: if you’re doing a serious investigation, the API approach is hard to beat.
-------------------------------------------------------------------------------------------------------------
Option 3: Sending Google Workspace Logs to Google Cloud Logging
There’s a third option that often gets overlooked—but it’s extremely powerful.
Google Workspace can send certain logs directly to Google Cloud Logging. This allows you to:
Retain logs for a much longer period
Query them using Cloud Log Explorer
Correlate Workspace logs with other Google Cloud activity
You Must enabled the sharing which is disabeld by default

The catch
Not all Workspace logs are sent to Google Cloud.
Only five log types are forwarded—and while these are some of the most valuable ones for investigations, they don’t always tell the full story.
For example:
Email transit and email access logs are not included
You cannot customize which logs are sent
Google decides what gets forwarded—you only choose whether forwarding is enabled or not
So while this method is fantastic for long‑term visibility, it should be seen as a complement, not a replacement, for API‑based collection.
-------------------------------------------------------------------------------------------------------------
Permissions: A Common Roadblock
If you try to search Workspace logs in Google Cloud and run into permission errors—don’t panic.
This usually means your account doesn’t have enough rights to query logs.
The fix is simple:
Go to IAM & Admin in Google Cloud
Grant the appropriate role (typically Logging Admin or equivalent)

Once that’s done, Log Explorer will start behaving as expected.
Log Explorer Example

Querying Workspace Logs in Google Cloud
When Workspace logs arrive in Google Cloud, they are spread across a few service names. To search them together, you can use a query like this in Log Explorer:
protoPayload.serviceName = (
"admin.googleapis.com" OR
"cloudidentity.googleapis.com" OR
"login.googleapis.com" OR
"oauth2.googleapis.com"
)Example:
protoPayload.serviceName = (
"login.googleapis.com"
)
One important thing to remember: you need to be viewing logs at the root organization level in Google Cloud.
-------------------------------------------------------------------------------------------------------------
Final Thoughts
If we simplify everything:
Admin UI → great for quick checks and visual walkthroughs
Admin SDK / API → best for fast, consistent, forensic‑grade evidence collection
Google Cloud Logging → excellent for long‑term retention and centralized querying
In real investigations, the strongest approach is usually a combination of all three.
------------------------------------------Dean-------------------------------------------------------------


Comments