Security centre

Actionable security insights for G Suite

  • Protect your organisation with security analytics and best practice recommendations from Google. The security centre is included with G Suite Enterprise edition.
Get Started Now Contact sales

Unified security dashboard

Get insights into external file sharing, visibility into spam and malware targeting users within your organisation, and metrics to demonstrate your security effectiveness in a single, comprehensive dashboard.

G Suite Security dashboards

Examine security analytics to flag threats

Analyse email messages that do not meet your organisation's authentication standard. Proactively gain insights on which Drive files are triggering Data Loss Protection (DLP) rules and determine the course of action against potential data exfiltration.

Dashboard details authentication

Reduce risk by adopting security health recommendations

Stay ahead of threats with the quick-start guide, which provides recommended security settings, and gives customised advice on security best practices for content, communication, mobility and user security.

Security health tooltips

Gain insights from the security centre


File exposure

Understand which files have been shared outside your domain and which shared files have triggered DLP rules.



Find out how many messages don’t meet authentication standards, such as DMARC, DKIM and SPF.



Ensure that messages sent by your domain are encrypted using TLS.


Email delivery

See what percentage of incoming messages were accepted and whether whitelisting allowed suspicious messages to get delivered.


Spam and malware classification

Analyse messages deemed to be spam, phishing, suspicious or containing malware.


User perception

Evaluate whitelists by reviewing whether users have tagged delivered messages as spam or phishing.

Get actionable security recommendations


Set security checks on automatic email forwarding, DMARC settings, POP/IMAP access and whitelists.


Apply policies for file sharing, Drive add-ons, offline availability and stringent sign-in requirements.

Device Management

Get a comprehensive action list for Mobile Device Management policies.


Gain visibility into how 2-step verification is being used across users and admins.

Hangouts Meet

Check whether out-of-domain warnings are in place for all users.

Sites and Groups

Review group sharing options and evaluate public groups on a case-by-case basis.