Changing the spoofing protection to deliver the emails to spam instead of quarantining them allows users to review the emails more easily. Quarantining emails makes it challenging for users to access and determine whether the messages are legitimate or not. Delivering to spam still provides a level of protection by flagging the messages as potentially harmful, but it allows users to quickly check their spam folder and move legitimate emails to their inbox if necessary. This reduces internal complaints while maintaining security.
As the Workspace Administrator, the appropriate action to preserve the user's Drive data and ensure that only the marketing manager can access it is to transfer the ownership of the documents during the user deletion process. Specifically, you should select 'Transfer' in the data in other apps section and add the manager's email address. This method ensures that all the user’s Drive documents are transferred directly to the marketing manager, keeping them secure and restricted in visibility as required.
To review all the third-party apps that have been authorized to access Google Workspace data, the correct path is to open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access. This path allows an administrator to view and manage the access permissions of third-party apps within the organization.
To gain more visibility into the actions performed by Google support staff with regard to the support cases you have opened, you should access the Access Transparency Logs. These logs provide a detailed record of actions taken by Google staff when accessing your data. This feature is available from the Google Admin Panel under the Audit section.
To protect users from future unknown malware in email attachments, enabling the Security Sandbox is the best approach. The Security Sandbox allows Gmail to scan or run attachments in a virtual environment, identifying threats that might be missed by traditional antivirus programs. This includes scanning file types like Microsoft Office documents, which can contain embedded macros used in sophisticated malware attacks. By providing an additional level of scrutiny beyond conventional malware protection, the Security Sandbox helps prevent potential malware from affecting users' devices and the organization's network.