Investigating Data Exposure in Google Drive
- 2 hours ago
- 3 min read

If you’ve worked in Google Workspace long enough, you already know this truth:
Google Drive is where data leaks love to happen.
Not always malicious. Sometimes it’s just:
“Oops, shared it publicly”
“Oops, shared it with the wrong domain”
“Oops, didn’t realize Anyone with the link means literally anyone”
So when data exposure happens, we usually care about two questions:
What happened to the file?
Can we still access or recover it?
That’s where Google Drive investigation tools come in.
-------------------------------------------------------------------------------------------------------------
Tool 1: Google Drive Log Events (Your Timeline, Not Your Files)
Think of the Drive Log Events as your CCTV footage, not the evidence locker.
What it’s good at:
Showing who did what
Showing when it happened
Showing permission changes
Near real-time visibility (usually within minutes)
What it’s not good at:
Accessing files
Showing file contents
Tracking anonymous viewers or downloads
Key Things to Know About Drive Log Events
Let’s break this down simply:
Keeps 6 months of history
Logs actions like:
File creation
Sharing changes
Permission updates
Deletions
Does NOT give you the file itself
CSV export is limited to 100,000 rows
Unauthenticated access is only logged for editing
Viewing or downloading by anonymous users? ❌ Not logged
So if a file was publicly shared and downloaded 1,000 times anonymously — the audit log will not tell you that.
Painful, but important to know upfront.
Where Are Drive Log events Now?
Earlier, Drive log events lived in their own section. That changed.
Today, Drive Log Events live inside in the Google Admin Console.

Inside Investigator, you can:
Filter events
Use AND / OR logic
Group by fields (user, document, event type)
Search using partial matches
One warning though ⚠️Even though logs are generated quickly, some events can lag up to 12 hours before showing up.
------------------------------------------------------------------------------------------------------------
Tool 2: Google Vault (This Is Where the Files Live)
If Audit Logs are the timeline, Vault is the evidence room.
Vault is what you use when:
You actually need the document
A file was deleted
A user “accidentally” removed something important
But Vault comes with conditions.
What Vault Can Do
Access files in user Drives
Access deleted files
Apply holds
Enforce retention rules
What Vault Cannot Do
Give you an audit trail
Tell you who did what and when
It’s access, not visibility.
Deletion Timelines (This Matters a LOT)
Here’s the reality of deleted files:
When a user deletes a file → it goes to Trash
Trash keeps files for 30 days
Once removed from Trash:
Admins have 25 more days to recover (without Vault)
With Vault, recovery can extend further
Custom retention rules or holds = files stay longer
If Vault is enabled, you can often recover files without restoring the user account.
------------------------------------------------------------------------------------------------------------
Alternate File Recovery Scenarios (The “Oh No” Cases)
Case 1: Active User Deleted Files
Trash keeps files for 30 days
After Trash deletion:
Admins have 25 days to restore
Restore options:
Original location
Shared Drive
No Vault license? After 25 days — game over.
Case 2: Deleted User Account
This one catches teams off guard.
Deleted user accounts can be restored for 20 days
Files can only be recovered if:
The user account is restored first
Or Vault is used
Ownership transfer is another option:
Files move to another user’s Drive
Again — Vault makes life easier here.
------------------------------------------------------------------------------------------------------------
Exporting Drive Logs

------------------------------------------------------------------------------------------------------------
Important Fields You’ll Actually Use During an Investigation
Let’s translate the useful ones into investigator language:

Document ID
This is gold.
Unique across all Google Workspace tenants
Same ID you see in the document URL
Perfect for matching phishing URLs to actual Drive files
Owner vs Actor

Owner: Who owns the file
Actor (User field): Who performed the action
These are often not the same person.
Visibility & Prior Visibility
This tells the real story.
Prior Visibility → what access looked like before
Visibility → what access looks like now

This is how you catch:
Private → Public changes
Internal → External sharing
Domain-wide exposure
IP Address
Extremely useful for:
Geo anomalies
Impossible travel
Correlation with other Workspace logs
------------------------------------------------------------------------------------------------------------
Final Thoughts (The Big Picture)
When investigating Google Drive exposure, remember:
Drive log events tell you the story
Vault gives you the evidence
Timing is everything
Anonymous access visibility is limited
Exports are clunky but necessary
Drive investigations are rarely about one log or one tool — it’s about stitching together:
---------------------------------------------Dean-----------------------------------------------------------


Comments