Your organization suspects that an unauthorized user may have gained access to Google Vault and performed actions within the system. You need to run an audit report to determine if any unauthorized Vault activities have occurred within the last three months. What type of report should you run to identify potential security breaches?