
Summary
The 'GSuite Device Suspicious Activity' rule is designed to detect potentially suspicious activities related to user devices within the GSuite environment. This rule monitors GSuite Activity Events, specifically filtering for events marked as suspicious. The primary function of the rule is to identify if any device activity events do not conform to expected patterns, such as a user synchronizing their device under unusual circumstances. The rule uses a condition to trigger alerts based on specific log entries, primarily concentrating on device update events. If a suspicious activity event is detected, the severity is categorized as low, implying that while the activity is noteworthy, it may not indicate an immediate threat. To validate the alert, a runbook is provided which recommends confirming with the user whether the activity was expected or not. The rule is currently enabled and actively monitoring for unusual device activity, which aids in securing user sessions and protecting sensitive information.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2022-09-02