Audit reports for data regions are now available in the Admin console

What’s changing Using the security investigation tool, admins can now access a new data set: policy compliance log events. Admins can use these logs to view a list of their Assured Controls users, their assigned data regions, and any advanced data region settings. Policy compliance log events in the security investigation toolWho’s impactedAdminsWhy it’s importantPolicy compliance log events help admins quickly generate detailed reports of users assigned to specific data regions, which are critical for ensuring and providing data region settings are in line with internal policies and external regulatory guidelines. Querying these logs in the security investigation tool streamlines the auditing process, saving time and effort.Getting startedAdmins: Visit the Help Center to learn more about policy compliance log events and the security investigation tool.End users: There is no end user impact or action required.Rollout paceRapid Release and Scheduled Release domains: Available now.AvailabilityAvailable for Google Workspace:Enterprise Plus and Frontline Plus customers with Assured Controls and Assured Controls PlusResourcesGoogle Workspace Admin Help: Policy compliance log eventsGoogle Workspace Admin Help: About the security investigation tool

Jun 9, 2025 - 19:29
 0
Audit reports for data regions are now available in the Admin console

What’s changing 

Using the security investigation tool, admins can now access a new data set: policy compliance log events. Admins can use these logs to view a list of their Assured Controls users, their assigned data regions, and any advanced data region settings.

Policy compliance log events in the security investigation tool

Who’s impacted

Admins

Why it’s important

Policy compliance log events help admins quickly generate detailed reports of users assigned to specific data regions, which are critical for ensuring and providing data region settings are in line with internal policies and external regulatory guidelines. Querying these logs in the security investigation tool streamlines the auditing process, saving time and effort.

Getting started

Rollout pace

Availability

Available for Google Workspace:

Resources