workspace-administrator video for your company has experienced unauthorized file access attempts in Google Drive. As part of the security protocol, you need to
Your company has experienced unauthorized file access attempts in Google Drive. As part of the security protocol, you need to review and analyze Drive audit logs to identify the extent and source of these attempts. What is the most effective way to create and review audit logs for this investigation?